Best Security Solution
Recognizes the best innovative solution designed to protect networks and other IT systems. Include authentication, firewalls, virtual private networks, encryption, intrusion detection, policy-based management, managed services, anti-virus products, identity management, etc.
AirWatch MDM/MCM/MAM software solution - AirWatchAirWatch is the global leader in mobile device security and management (MDM) systems, and, with 6,000 customers and nearly 1,200 global associates, is more than twice the size of any other MDM company. Having no outside capital, AirWatch is predominately funded by operating cash flow, resulting in an estimated install base four to five times larger than any other MDM provider. The largest customer base, combined with the largest research and development team in the industry, allows AirWatch to provide the broadest functionality at the lowest cost. This, combined with a scalable high-availability architecture, results in virtually every mobility project with more than 20,000 devices being managed by AirWatch. Examples of this market leadership include the top four global Fortune companies, nine of the top 10 US retailers, six of the top 10 global airlines, the top four global energy companies, six of the top 10 global pharmaceutical companies, seven of the top 10 global CPG companies, three of the top five US medical device companies, five of the top 10 global luxury goods companies and two of the top three global hotel groups. Additional information can be found online at:
|
|
AlienVault Unified Security Management Platform - AlienVaultSIEM is meant to be the capstone for visibility into network and security controls, providing context unseen in the tunnel-vision of any particular control or host, and building actionable observations from that context. AlienVault's Unified Security Management (AV-USM) platform provides all the necessary controls and information (Host, Network and Intelligence) in an integrated package that allows organizations to intelligently respond to hostile activity on their network directly after deployment. The AV-USM stands on top of open, well-documented technology that is familiar across the security field. Other SIEM products run on an assumption that they will operate in homogenous environments where the SIEM will dictate other solutions; AV-USM is built knowing that integration between a wide variety of devices is always necessary, and the platform is designed to extend out to integrate with other technologies beyond what is provided out of the box. AlienVault’s Open Threat Exchange (OTX), the largest community-sourced threat intelligence feed and database, is built into our Unified Security Management platform. OTX enables members of the AlienVault community to share information related to the source and nature of attacks, allowing all members to quickly isolate malicious or compromised hosts. Additional information can be found online at: |
|
CloudLock for Google Apps - CloudLock, Inc.The largest Google Apps customers in the world trust CloudLock to secure their data. Additional information can be found online at: |
|
Coverity® Security Advisor - Coverity, Inc.Coverity® Security Advisor surfaces security defects in the developer workflow, with accuracy and actionable remediation guidance. Security Advisor arms developers with the information they need to fix the security defects that matter, quickly and efficiently, without requiring them to become security experts. Additional information can be found online at:
|
|
Mandiant Intelligent Response (v2.2) - MANDIANTMandiant Intelligent Response (MIR) is an enterprise-grade incident response solution designed to detect and remediate advanced, targeted attacks. Data from our own incident response services work tells us the median number of days that attackers are present on a compromised network before detection is 416 days; in every case valid user credentials are used by the attackers; and 94 % of compromised organizations are notified by an external entity. Time is of the essence when dealing with a breach. So Mandiant focused on introducing new elements into MIR that would enable customers to both automate how they detect, respond, and contain advanced attacks, and to be able to easily scale their most qualified security expert to investigate thousands of endpoints to scope the impact of an incident. In the latest version of MIR (v2.2) the introduction of more automated processes enables the customer to automatically collect information and analyze suspicious systems based on alerts generated by the customer’s security information event manager (SIEM), ticketing system or other applications. By automating processes, Mandiant and MIR help security teams rapidly sweep endpoints for indicators of compromise, extract evidence of an intrusion, determine incident scope and impact, and stop sophisticated threats faster. Additional information can be found online at: |
|
NetWrix Change Reporter Suite - NetWrixNetWrix Change Reporter Suite is an integrated solution that helps maintain a secure IT infrastructure and sustain compliance by the means of automated compliance auditing. No matter who changed what and where - be it Active Directory, Microsoft Exchange, file servers, filer appliances such as NetApp or EMC, virtual and physical infrastructure, SQL Server databases, SharePoint and more - everything is centrally audited, consolidated, and presented in easy to understand reports, scheduled for ongoing review of day-to-day administrative activities by your security team and periodic inspections by compliance auditors. All changes made to the IT infrastructure are collected and stored automatically making sure you are ready for a regulatory audit. The Suite already helps thousands of satisfied customers worldwide adhere to compliance requirements for SOX, HIPAA, GLBA, PCI, FISMA. All the information is stored centrally and can be reported on as needed. Two-tier storage approach secures your audit data for up to 7 years allowing you to generate reports for compliance auditors for any time period and facilitating detailed forensic analysis. The Suite is recognized by thousands of satisfied customers for the broadest platform coverage in the industry as well as the low TCO. Additional information can be found online at: |
![]() |





