Customers' favorite security hardware and software

With hundreds of information security products available, choosing the right one can be daunting. Here are the top products chosen by "Information Security" magazine readers -- your customers.

Products are only one part of a holistic information security strategy. They must be accompanied by policy, process and people. But you can't sell your customers just any security appliance, hardware or software and expect their policies, processes and people to pick up the slack. All four elements should work in sync, toward the same goal.

With literally hundreds of hardware and software vendors offering information security products, choosing the right ones can be daunting. We recommend taking a look at the results of Information Security magazine's Reader's Choice Awards. Our sister publication asked readers – your customers – to rate the security products used and deployed within their organizations. More than 1,600 readers weighed in on more than 360 products. Below you will find the top winners in 15 categories with links to reviews of the products. Use the information to re-evaluate your line card and recommend security appliances, hardware and software to your customers.

Top information security products
  Antimalware
  Application Security
  Authentication
  Email
  Identity and Access Management
  Intrusion Detection/Prevention
  Mobile Data Security
  Network Access Control
  Network Firewall
  Secure Remote Access
  Security Information Management
  Unified Threat Management
  Vulnerability Management
  Wireless Security
  Emerging Technologies




Antimalware


Desktop and gateway enterprise antimalware products

 

 

Application Security


Source code and Web application scanners and appliances

 

 

Authentication


Digital identity verification

 

 

Email Security


Desktop and server messaging security

 

 

Identity and Access Management


User identity and access management and provisioning

 

 

Intrusion Detection/Prevention


Network intrusion detection/prevention appliances and software

 

 

Mobile Data Security


Protection for handheld devices and laptops

 

 

Network Access Control


Pre- and post-connect network access control

 

 

Network Firewall


Appliances and software-based network firewall products

 

 

Secure Remote Access


IPsec and SSL VPN, thin clients

 

 

Security Information Management


Security information and/or security event management systems

 

 

Unified Threat Management (UTM)


Unified threat management appliances

 

 

Vulnerability Management


Vulnerability assessment and management systems

 

 

Wireless Security


Wireless security products

 

 

Emerging Technologies


Three product categories failed to gain sufficient responses to provide a reasonable basis for designating awards. They are, however, important security tools that are making their presence felt.

 

Want to compare this year's winners to last year's? Visit SearchSecurity.com's 2007 Readers' Choice Awards.

This was first published in April 2008

Dig deeper on Network security products, technologies, services

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

MicroscopeUK

SearchCloudProvider

SearchSecurity

SearchStorage

SearchNetworking

SearchCloudComputing

SearchConsumerization

SearchDataManagement

SearchBusinessAnalytics

Close