Best Email Security Solution
Email security addresses the ability to exchange email messages with assurance, as well as the ability to filter email messages based on content, source or other criteria. Solutions should ensure the privacy of sensitive messages, limit the repercussions of email forgery, and manage other aspects of safeguarding email within the organization. These products are enterprise-centric and should have, but are not required to have, some form of centralized management. They may include spam filters, junk mail filters, malware filters, unauthorized content (sometimes called “extrusion protection” or “data leakage protection”), phishing and other types of undesirable content. However, these are not simply anti-spam filters. These email security products should be evaluated on their effectiveness, manageability, non-intrusiveness, ease of use and other factors that impact the implementation of this type of product in the enterprise environment. They typically provide features such as email encryption, digital signatures, automatic shredding of messages and attachments, and more.
Proofpoint for Proofpoint Enterprise Protection Solution
FireEye for FireEye EX series
Cisco for Cisco's Email Security Appliance (ESA)
HP Data Security for HP SecureMail
Raytheon|Websense for Raytheon|Websense TRITON® AP-EMAIL
Best UTM Security Solution
Given the continuous convergence of the market, we've decided to retire some categories this year and integrate a number of individual categories from previous years into this unified threat management (UTM) category. The former categories – Best Enterprise Firewall, Best Intrusion Detection System/Intrusion Prevention System Product, Best IPsec/SSL VPN, Best Anti-Malware Gateway and Best Web Content Management – are now integrated here. As formerly, contenders in the UTM security category should take an “in-depth” defense approach. Entrants should have an integrated, multifunction endpoint/UTM offering – not a single-function product. These products typically aggregate a wide variety of threat data into a single unified tool. Many organizations define those threat categories as anti-malware, content management, IDS/IPS and spam filtering, along with firewall/VPN. Entrants should meet this minimum functionality and can include anti-malware gateway, anti-spam gateway and anti-phishing gateway, as well as provide web content filtering for laptops, desktops and, optionally, servers that blocks or filters objectionable websites and content.
Barracuda for Barracuda NG Firewall
EdgeWave for EPIC Next Generation Firewall
Network Box USA for Network Box USA UTM Security Solution
RedShift Networks, Inc. for UCTM Appliances
Sophos for Sophos SG Series UTM
EXCELLENCE AWARDS
Best Emerging Technology
What cutting-edge technologies with some innovative capabilities are bursting onto the scene to address the newest information security needs facing organizations? This new category welcomes both new vendors and old pros looking to provide products and services that look to help shape the future by addressing fast-evolving threats through the creation of these types of offerings. Solutions should have just hit the market in the last six to 12 months, and entries should have some customers available who can act as references. The company should also have an office in North America and provide ready support and service to customers in this country.
Bay Dynamic for Risk Fabric
CipherCloud for CipherCloud Platform
SentinelOne for SentinelOne Endpoint Protection Platform
Soltra for Soltra Edge
Twistlock for Container Security
PROFESSIONAL CATEGORIES
Best Security Team
Contenders should only include teams from end-user companies that have executed and are managing exceptional and strong security programs, which they have built from virtually non-existent ones. The team should have successfully established and implemented an integral and/or innovative/cutting-edge component of their security program, and should have spearheaded various areas of support for its success, such as strong end-user awareness training, good configuration management, and more.
Please note: Professionals who work for an IT security vendor, IT reseller or IT consultancies are not eligible for this category.
Goodwill
Voya Financial
Zuora
CSO of the Year
Contenders should include those who work for end-user companies only. No vendor CSOs will be considered. Nominees are the cream of the crop, having spearheaded a viable IT security program, gained the support of their company's executive leaders, as well as their colleagues, and helped – through their indefatigable efforts – to propel the CISO/CSO position to a footing of influence within their organization and the corporate world as a whole. Specific projects and undertakings, as well as over-arching security programs to propel these various goals, should be noted. Nominees should be prepared to answer further questions during the judging process, offer at least two references, and be open to holding confidential interviews with members of the SC Magazine editorial team, if warranted.
Please note: Professionals who work for an IT security vendor, IT reseller or IT consultancies are not eligible for this category.
Bruce Wignall, CISO, Teleperformance
Michael Echols , CISO, Maricopa County
Michael Roling, CISO, State of Missouri, Office of Administration
Pritesh Parekh, VP, Chief Security Officer, Zuora