If you have questions or need assistance, contact Angel Scott at +202.789.4458.

Best Security Solution

Recognizes the best innovative solution designed to protect networks and other IT systems. Include authentication, firewalls, virtual private networks, encryption, intrusion detection, policy-based management, managed services, anti-virus products, identity management, etc.

AirWatch MDM/MCM/MAM software solution - AirWatch

AirWatch is the global leader in mobile device security and management (MDM) systems, and, with 6,000 customers and nearly 1,200 global associates, is more than twice the size of any other MDM company. Having no outside capital, AirWatch is predominately funded by operating cash flow, resulting in an estimated install base four to five times larger than any other MDM provider. The largest customer base, combined with the largest research and development team in the industry, allows AirWatch to provide the broadest functionality at the lowest cost. This, combined with a scalable high-availability architecture, results in virtually every mobility project with more than 20,000 devices being managed by AirWatch. Examples of this market leadership include the top four global Fortune companies, nine of the top 10 US retailers, six of the top 10 global airlines, the top four global energy companies, six of the top 10 global pharmaceutical companies, seven of the top 10 global CPG companies, three of the top five US medical device companies, five of the top 10 global luxury goods companies and two of the top three global hotel groups.

  • Go To AirWatch's Web Site
  • Go To Product Site
  • Additional information can be found online at:

     
    AirWatch Logo

    AlienVault Unified Security Management Platform - AlienVault

    SIEM is meant to be the capstone for visibility into network and security controls, providing context unseen in the tunnel-vision of any particular control or host, and building actionable observations from that context. AlienVault's Unified Security Management (AV-USM) platform provides all the necessary controls and information (Host, Network and Intelligence) in an integrated package that allows organizations to intelligently respond to hostile activity on their network directly after deployment. The AV-USM stands on top of open, well-documented technology that is familiar across the security field. Other SIEM products run on an assumption that they will operate in homogenous environments where the SIEM will dictate other solutions; AV-USM is built knowing that integration between a wide variety of devices is always necessary, and the platform is designed to extend out to integrate with other technologies beyond what is provided out of the box. AlienVault’s Open Threat Exchange (OTX), the largest community-sourced threat intelligence feed and database, is built into our Unified Security Management platform. OTX enables members of the AlienVault community to share information related to the source and nature of attacks, allowing all members to quickly isolate malicious or compromised hosts.

  • Go To AlienVault's Web Site
  • Go To Product Site
  • Additional information can be found online at:

    CloudLock for Google Apps - CloudLock, Inc.

    The largest Google Apps customers in the world trust CloudLock to secure their data.

    When companies move to cloud collaboration suites like Google Apps, they are not just moving their data, they're also fundamentally changing how employees, external collaborators, and third party applications gain access to that data. The shift to the cloud creates a new, distributed security perimeter.

    CloudLock's Information Security Suite lets enterprises adopt cloud platforms by applying the appropriate security safeguards in place. Those safeguards are needed to meet privacy regulations, protect sensitive data (e.g IP, PCI, PII ) and protect user accounts and identities from being compromised. With CloudLock, enterprises can significantly increase the ROI of their cloud investments.

    CloudLock Collaboration Security protects data stored in Google Drive by providing enterprise-class DLP, auditing and compliance, data management, and end-user driven security.

    CloudLock Apps Firewall gives IT the peace of mind that employees can use the apps they want securely, establishing safeguards around apps that access accounts and data. CloudLock Apps Firewall discovers all web and mobile apps authorized by users, provides the ability to classify them based on risk and Community Trust Rating, increases employee awareness with email alerts, and lets IT revoke apps in bulk.

  • Go To CloudLock, Inc.'s Web Site
  • Go To Product Site
  • Additional information can be found online at:

     
    CloudLock, Inc. Logo

    Coverity® Security Advisor - Coverity, Inc.

    Coverity® Security Advisor surfaces security defects in the developer workflow, with accuracy and actionable remediation guidance. Security Advisor arms developers with the information they need to fix the security defects that matter, quickly and efficiently, without requiring them to become security experts.
    Security Advisor surfaces security defects identified by the Coverity® Static Analysis Verification Engine (Coverity SAVE). Coverity SAVE intelligently tests code changes with a deep understanding of behavior and criticality to accurately identify security defects in both C/C++ and Java applications, including buffer overflows, integer overflows, format string errors, SQL injection and cross-site scripting (XSS).
    One of the primary reasons that legacy security tools have failed in development is due to high false positives, or inaccurate results. We designed and built our engine from the ground up to address the complexity of today's modern applications which leads to more accurate results.
    Coverity SAVE analysis innovations for Java web application security include:
    •Enterprise Framework Analyzer: augment source code analysis by providing a deep understanding of modern web applications including entry points, dependency injection and the MVC paradigm.
    •White Box Fuzzer: automatically validate that data sanitization routines perform sufficient sanitization of untrusted data and are used in the right context.

  • Go To Coverity, Inc.'s Web Site
  • Go To Product Site
  • Additional information can be found online at:

    Mandiant Intelligent Response (v2.2) - MANDIANT

    Mandiant Intelligent Response (MIR) is an enterprise-grade incident response solution designed to detect and remediate advanced, targeted attacks. Data from our own incident response services work tells us the median number of days that attackers are present on a compromised network before detection is 416 days; in every case valid user credentials are used by the attackers; and 94 % of compromised organizations are notified by an external entity. Time is of the essence when dealing with a breach. So Mandiant focused on introducing new elements into MIR that would enable customers to both automate how they detect, respond, and contain advanced attacks, and to be able to easily scale their most qualified security expert to investigate thousands of endpoints to scope the impact of an incident. In the latest version of MIR (v2.2) the introduction of more automated processes enables the customer to automatically collect information and analyze suspicious systems based on alerts generated by the customer’s security information event manager (SIEM), ticketing system or other applications. By automating processes, Mandiant and MIR help security teams rapidly sweep endpoints for indicators of compromise, extract evidence of an intrusion, determine incident scope and impact, and stop sophisticated threats faster.

  • Go To MANDIANT's Web Site
  • Go To Product Site
  • Additional information can be found online at:

    NetWrix Change Reporter Suite - NetWrix

    NetWrix Change Reporter Suite is an integrated solution that helps maintain a secure IT infrastructure and sustain compliance by the means of automated compliance auditing. No matter who changed what and where - be it Active Directory, Microsoft Exchange, file servers, filer appliances such as NetApp or EMC, virtual and physical infrastructure, SQL Server databases, SharePoint and more - everything is centrally audited, consolidated, and presented in easy to understand reports, scheduled for ongoing review of day-to-day administrative activities by your security team and periodic inspections by compliance auditors. All changes made to the IT infrastructure are collected and stored automatically making sure you are ready for a regulatory audit. The Suite already helps thousands of satisfied customers worldwide adhere to compliance requirements for SOX, HIPAA, GLBA, PCI, FISMA. All the information is stored centrally and can be reported on as needed. Two-tier storage approach secures your audit data for up to 7 years allowing you to generate reports for compliance auditors for any time period and facilitating detailed forensic analysis. The Suite is recognized by thousands of satisfied customers for the broadest platform coverage in the industry as well as the low TCO.

  • Go To NetWrix's Web Site
  • Go To Product Site
  • Additional information can be found online at:


     
    CODiE Winner