Round one: Best Advanced Persistent Threat (APT) Protection
The hot topic of the past year has been advanced persistent threat (APT). Few now doubt the reality of advanced and well-resourced attackers, from nation states to criminal entities, working away across all vectors, month after month, to infiltrate, exfiltrate and disrupt. What are the best products and services that we are coming up with to tackle this new threat?
Lancope StealthWatch System- Best APT Solution
CyberArk Privileged Account Security solution (v8)
Websense TRITON Enterprise
Trend Micro Deep Discovery
Zscaler for APTs
Lumension Endpoint Management and Security Suite
Round Two: Best Cloud Computing Security Solution
The cloud has too many benefits - in terms of flexibility and cost saving - to be ignored. But it brings with it a host of new security issues that have to be addressed. How can you take advantage of cloud computing while meeting your compliance requirements and ensuring your data is kept safe?
Trend Micro Deep Security
British Telecommunications Cloud Security Futures
Blue Coat Global Cloud Infrastructure
Round Three: Best Web Content Management Solution
For many companies, the website is not just a shop window, it is the engine room – whether they be an online retailer, information provider or online bank. But the increasing complexity of information, customer and client data, and real world transactions mean that security of web content is paramount.
Websense Web Security Gateway Anywhere
Clearswift SECURE Web Gateway
Trustwave Secure Web Gateway
Blue Coat PacketShaper
Round Four: Best Data Leakage Prevention (DLP) Solution
Whether it is malicious or accidental, the impact of data leaks can be financial or reputational, and include increasingly punitive fines from regulators. This all adds to security pressure so the race is on to plug those leaks, permanently.
Websense Data Security Suite
Round Five: Best Email Security Solution
While email is unlikely to be the intentional delivery mechanism for sensitive information, the fact is that a lot our valuable data does travel via email, and it needs to be protected when intended, and prevented when not.
Websense Email Security Gateway Anywhere
AirWatch Mobile Email Management
SonicWALL Hosted Email Security
Halon E-mail Security
Boldon James Email Classifier
Mimecast Email Security
McAfee Email Security
Proofpoint Email Security Solution Award Entry
Round Six: Best Encryption Solution
Everyone wants their data encrypted now that the number of prying eyes, and their technical capabilities, have become more prevalent and more competent. But what approach best suits your needs, is internal encryption necessary and does the customer have to be the only one with the key?
Boole Server Best Encryption
Round Seven: Best Identity Management Solution
Identity verification is, for many, the crux of ensuring security of data, so that only the chosen few are given access to particular information. But the most secure data has no access whatsoever, and the most accessible has no security, so where on the continuum of usability versus security is the optimum?
CyberArk Privileged Account Security solution (v8)
Lieberman Software: Enterprise Random Password Manager
NetIQ Identity Manager 4
Evidian IAM Suite
Centrify Server Suite (Centrify)
Universal Key Manager
Round Eight: Best Managed Security Service
Outsourcing may not absolve the tech team of responsibility for breach, but it can greatly increase the scope and depth of capabilities and expertise they are able to deploy, in a way that is scale-able and in line with growth of a business. But the problem is ensuring that you find a partner who understands your business, and who can provide the most appropriate, up-to-date and cost-effective approach to tackling the threats your network faces.
Becrypt Remote End User Device Service
F-Secure Protection Service
WideAngle MSS (NTT Com Security)
DOSarrest Security Service
Verdasys Managed Service for Information Protection
Round Nine: Best Mobile Security Solution
Everything is mobile, and if you're under 25, it always was. While the advantages of mobile access devices are self-evident, some of the security downsides are not always as obvious – at least to users. From BYOD to personal apps and social networking, the lines are blurring between work and home. As such, smartphones and increasingly popular tablets, like the iPad, all need to be catered for and made secure. Banning them just doesn't work.
Arxan Technologies - Mobile Application Integrity Protection
Becrypt iOS Mobile Device Management
IronKey Workspace W500
AirWatch Enterprise Mobility Management
Good for Enterprise
Round Ten: Best Multi-factor Solution
Passwords may be passe, but authentication remains a key element in ensuring a secure system, with multi-factor solutions demanded for sensitive information, for if the wrong people have access to your most valuable data, then all your spend elsewhere is simply by-passed.
HID Global ActivID Authentication Appliance
Swivel Secure Multifactor Authentication Solution
M-Pin Multifactor Authentication Platform
Encap - Next Generation Authentication Technology
Round Eleven: Best NAC Solution
Network Access Control (NAC) solutions are increasing in sophistication to unify endpoint technology, and while much focus is now on insider threats, the perimeter still needs to be defended by anti-virus, host intrusion, vulnerability assessment, authentication and network security enforcement. And although that approach may be seen as traditional, the options are keeping pace with rapid development of new threats.
Bradford Networks' Network Sentry
Round Twelve: Best Risk/ Policy Management Solution
Most data breaches are not failures of technology, but of people, either because the correct policies were not in place, were not communicated or not followed. So what are the components of a policy that people will follow, that lets them do their job without compromising security at the least – and ideally, enhancing it? And what level of risk is acceptable for your business? Have you even calibrated your risk factors?
QualysGuard Policy Compliance
Venafi Director Platform
AlgoSec Security Management Suite
Skybox Security Risk Policy Solution
Blue Coat Security and Policy Enforcement Center
Round Thirteen: Best SIEM Solution
Security Information and Event Management (SIEM) technology continues to advance with new ways to ensure the generation and analysis of network security alerts in real-time. Whether via software, appliances or managed services, data is increasingly inspected not only for perimeter breach, but to locate and remediate anomalous internal traffic and activity, as well as ensure credible reports are generated for compliance purposes.
LogRhythm's SIEM and Security Intelligence Platform
McAfee Enterprise Security Manager
AlienVault's Unified Security Management (USM)
Round Fourteen: Best UTM Solution
As the range and sophistication of threats increases, so does the complexity of unified threat management (UTM) options. These primary network gateway defence solutions continue to offer multiple security functions within a single appliance, handling antivirus, content filtering, intrusion prevention and spam filtering functions in line with the more complex threat environment now faced.
WatchGuard XTM 800 Series
Dell™ SonicWALL™ SuperMassive™ Series
McAfee Next Generation Firewalls (Stonesoft)
Round Fifteen: Best Vulnerability Management Solution
Finding and fixing vulnerabilities is a basic part of ensuring network integrity, and while it may be routine work for a security team to identify, classify, remediate, and mitigate vulnerabilities in their network, the software and firmware options to assist have continued to proliferate and increase in capability, from vulnerability scanners to test automation and patching.
Secunia CSI 7.0
QualysGuard Vulnerability Management
GFI LanGuard 2014
Tenable Network Security - SecurityCenter Continuous View
Skybox Security Vulnerability Management
Lumension Patch and Remediation
More finalists to be announced on Monday 24th February...