2012 SC Awards U.S. [SC Magazine] - Insurance News | InsuranceNewsNet

InsuranceNewsNet — Your Industry. One Source.™

Sign in
  • Subscribe
  • About
  • Advertise
  • Contact
Home Now reading Newswires
Topics
    • Advisor News
    • Annuity Index
    • Annuity News
    • Companies
    • Earnings
    • Fiduciary
    • From the Field: Expert Insights
    • Health/Employee Benefits
    • Insurance & Financial Fraud
    • INN Magazine
    • Insiders Only
    • Life Insurance News
    • Newswires
    • Property and Casualty
    • Regulation News
    • Sponsored Articles
    • Washington Wire
    • Videos
    • ———
    • About
    • Meet our Editorial Staff
    • Advertise
    • Contact
    • Newsletters
  • Exclusives
  • NewsWires
  • Magazine
  • Newsletters
Sign in or register to be an INNsider.
  • AdvisorNews
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Exclusives
  • INN Magazine
  • Insurtech
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Video
  • Washington Wire
  • Life Insurance
  • Annuities
  • Advisor
  • Health/Benefits
  • Property & Casualty
  • Insurtech
  • About
  • Advertise
  • Contact
  • Editorial Staff

Get Social

  • Facebook
  • X
  • LinkedIn
Newswires
Newswires RSS Get our newsletter
Order Prints
April 26, 2012 Newswires
Share
Share
Post
Email

2012 SC Awards U.S. [SC Magazine]

Anonymous
By Anonymous
Proquest LLC

The Judges

CO-CHAIR

Illena Armstrong

VP, editorial director, SC Magazine

CO-CHAIR

Rich Baich

principal, Deloitte & Touche

CO-CHAIR

Scott Sysol

VP, IT risk management and architecture services, U.S. Foods

Rebecca Bace

president and CEO, Infi del

Deven Bhatt

VP and CISO, Wright Express

Dennis Brixius

VP risk management & CSO, The McGraw-Hill Cos.

Jaime Chanaga

CEO, The CSO Board

Rufus Connell

VP - information and communication technology, Frost & Sullivan

Dave Cullinane

CISO and VP, eBay

Jerry Dixon

director of analysis, Team Cymru

Patricia Edfors

partner, Banrion Consulting

Gene Fredriksen

global CISO, Tyco International

Stephen Fridakis

senior IT offi cer - IT security, FAO (Food and Agriculture Organization of the United Nations)

Stephen Fried

CISO, People's United Bank

Stanton Gatewood

chief, information security & ePrivacy, University System of Georgia

André Gold

VP and CISO, MoneyGram International

Rob Goldberg

VP and global internal audit services, IT, Wal-Mart

Stacey Halota

VP, information security and privacy, The Washington Post Co.

Michael Higgins

CSO, The New York Times Co.

John Johnson

senior security program manager, John Deere

Steve Katz

president and founder, Security Risk Solutions

Daniel Lohrmann

CSO, state of Michigan

Randolph Sanovic

CEO, RNS Consulting

Justin Somaini

CISO, Yahoo!

Mark Weatherford

VP & CSO, North American Electric Reliability Corp. (NERC)

Larry Whiteside

CISO, Spectrum Health Systems

The Sponsors

SC Magazine would like to thank all of our sponsors for their generous support of the 2012 SC Awards U.S. Their involvement has made this event possible, which helps raise professional standards in the information security industry worldwide.

Cisco

www.cisco.com/go/security

Cisco simplifi es the task of addressing today's security requirements, regardless of application or service.

HP Enterprise Security

www.hpenterprisesecurity.com

HP is a leading provider of security and compliance solutions for enterprises that want to mitigate risk in their hybrid environments.

Qualys

www.qualys.com

Qualys solutions are deployed in hours anywhere, providing customers a continuous view of their security and compliance postures.

Schwartz MSL

www.schwartz-pr.com

Schwartz MSL, the technology innovation fi rm, drives strategic communications programs for some of the most successful security companies.

Splunk

www.splunk.com

Splunk software collects, indexes and harnesses the massive machine data generated by websites, applications, servers, networks and mobile device.

Teleperformance

www.teleperformance.com

Teleperformance develops and manages customer acquisition, customer care, technical support and debt collection programs around the world.

Trend Micro

www.trendmicro.com

A global cloud security leader, creates a world safe for exchanging digital information with its content security and threat management solutions.

F5 Networks

www.f5.com

F5 Networks helps the world's largest enterprises realize the full value of virtualization, cloud computing and on-demand IT.

IBM

www.ibm.com

IBM's security portfolio provides the security intelligence to help organizations holistically protect its people, infrastructure, data and applications.

RSA

www.rsa.com

RSA is a provider of security, risk and compliance solutions, helping organizations succeed by solving their most sensitive security challenges.

Solutionary

www.solutionary.com

Solutionary reduces the information security and compliance burden, providing fl exible managed security and compliance services.

Symantec

www.symantec.com

A leader in security, storage and systems management solutions to help secure and manage information and identities.

Tenable Network Security

www.tenable.com

Developed a unifi ed security monitoring approach based on the Nessus scanner engine for securing enterprise networks worldwide.

Reader Trust Awards

BEST ANTI-MALWARE GATEWAY

WINNER

Cisco for Cisco Web Security

www.cisco.com

Cisco Web Security enables organizations to capture the potential of the web as a collaboration and productivity tool while mitigating risks and protecting users from malware delivered via the web while enforcing acceptable use and data security policies, according to the company.

A multilayer threat defense protects users from malware. Web Reputation and Outbreak Intelligence combined with anti-malware engines, provide protection and accuracy against zero-hour threats.

As well, application controls provide visibility and granular controls over Web 2.0 and social networking apps. Reporting and tracking ensure that customers have in-depth visibility and forensics.

Integration with Cisco networking and security products, such as the ISR G2 router and AnyConnect Secure Mobility client, seamlessly protect branch offi ces, mobile users and devices, however they access the web, the company says.

Additionally, choice of appliance, cloud and hybrid deployments provide customers with fl exibility to meet the specifi c needs of their organization.

Cisco Security Intelligence Operations (SIO) gathers telemetry from 700,000-plus sensors and 600-plus third-party threat intelligence feeds. Cisco SIO delivers web reputation, stopping more than 70 percent of malicious transactions, as well as Outbreak Intelligence, a content-based zero-day threat detection technology. Cisco SIO technology is layered on top of multiple thirdparty anti-malware signature scanners to provide 35 percent better threat detection than any single engine, according to the company.

Finalists 2012

* Cisco for Cisco Web Security

* McAfee for McAfee Web Protection

* SonicWALL for SuperMassive E10100

* Symantec for Symantec Web Gateway 5.0

* Websense for Websense Triton Security Gateway Anywhere

Reader Trust Awards

BEST ANTI-MALWARE MANAGEMENT

WINNER

ESET for ESET Smart Security

www.ESET.com

With the rise of high-profi le hackers, 2011 has proven to be one of the biggest years for cyber attacks that the online community has ever seen, reaffi rming the need for proactive security solutions.

ESET's Smart Security is a complete security solution produced from the fi rm's long-term effort to combine maximum protection with a minimal system footprint. The product has an extremely effi cient code base, which eliminates the unnecessary size and extra components found in competitive products. This means faster, more accurate scanning that won't slow down one's computer and network, according to the company. ESET Smart Security detects and blocks new, unknown threats for multiple platforms, while providing malware protection.

In addition to anti-malware protection, the product includes anti-spyware, personal fi rewall, anti-spam, host-based intrusion prevention and internet security training. These features work together to provide maximum protection for a complete computing experience.

The ESET solutions' small footprint and detection method provide effective malware protection without compromising system performance, according to the company. ESET has long been recognized as a leader in proactively detecting and blocking new threats without relying strictly on existing virus signatures. Advanced heuristics extend the standard capabilities of ESET Smart Security and allow detection of a high percentage of new threats.

Overall, for the customer, security is not about collecting data, but rather about separating the wheat from the chaff so their IT staff can take action to mitigate risks.

Finalists 2012

* Bit9 for Bit9 Parity Suite

* ESET for ESET Smart Security

* GFI Software for GFI VIPRE Anti-virus Business

* IBM for IBM Tivoli Endpoint Manager

* Sophos for Sophos Endpoint Security and Data Protection v9.7

Reader Trust Awards

BEST CLOUD COMPUTING SECURITY

WINNER

IBM for IBM Cloud Security Solutions

www.ibm.com

IBM's cloud security solutions span multiple domains including risk and compliance, application and data security, physical and logical infrastructure security and identity and access management. Taking into account unique challenges of cloud computing - like multitenancy, virtualization, rapid provisioning and federated identities - IBM has designed security solutions specifi c to the cloud. Additionally, it has adapted other offerings to meet cloud security needs, including cloud security strategy and assessment services for the development of cloud strategy based on business goals, security requirements and best practices; professional security services for the assessment and penetration testing of cloud applications and infrastructures, assessment and design of identity management controls, cloud based risk/compliance assessment, and policy management; host and network intrusion prevention solutions for the protection of networks and hosts within the cloud infrastructure from attack or misuse; and managed security services, which reduces costs, improves cloud security and assists with compliance through outsourcing management to IBM experts, according to the company.

IBM's history coupled with experience in developing and delivering its own cloud solutions, such as SmartCloud Enterprise, Lotus Live, and more, are big differentiators, the company says.

Its cloud capabilities span all security domains with the ability to deliver security end-to-end - from strategy and design, to implementation and management, to assessment and continuous monitoring.

Finalists 2012

* IBM for IBM Cloud Security Solutions

* McAfee for McAfee Cloud Security Platform

* RSA Security for RSA Solution for Cloud Security and Compliance

* Symantec for SEP.cloud

* Trend Micro for Trend Micro SecureCloud

Reader Trust Awards

BEST COMPUTER FORENSIC TOOL

WINNER

RSA for RSA NetWitness 9.6

www.rsa.com

By performing full-packet capture and session recreation, RSA NetWitness provides network forensics and situational awareness for organizations.

The information security market faces two major problems. First, the vast majority of innovation is narrowly focused on chasing the latest threats, not broader risk profi les. Second, merger and acquisition and threat research plug together disparate, proprietary systems and sources, perpetuating a closed model, while the criminal community benefi ts from widely shared technologies, techniques and resources. Additionally, with nearly 100,000 new malware samples discovered daily, the ability for cyber adversaries to quickly adapt has rendered signature-dependent malware defenses obsolete. It also severely challenges the effi cacy of newer approaches that still look exclusively for "bad," based on previous attacks. This leaves a world of activity with little scrutiny - which malicious actors exploit with great success. NetWitness changes the game by allowing organizations to know everything.

Numerous security software makers have realized the signifi cant fi nancial value of the software solution produced at NetWitness, and are attempting to retool their traditional products to compete, according to the company. Although many of these vendors may have the ability to capture network traffi c, none have demonstrated any capability whatsoever to perform in-depth applicationlayer analysis, particularly of an automated and real-time nature. Ultimate value to an enterprise requires pervasive adoption of a solution - not just the purchase of one or two network appliances.

Finalists 2012

* AccessData Group for Forensic Toolkit

* Guidance Software for EnCase

* MANDIANT for MANDIANT Intelligent Response 2.0

* Quest Software for Quest ChangeAuditor

* RSA for RSA NetWitness 9.6

Reader Trust Awards

BEST DATABASE SECURITY SOLUTION

WINNER

McAfee for McAfee Database Security

www.mcafee.com

Enterprises store their most sensitive information in databases - yet breaches announced almost weekly tell us that perimeter protection and the basic security that comes with these systems is not enough. McAfee's database security solutions include vulnerability assessment, comprehensive audit and database activity monitoring, virtual patching with real-time intrusion prevention, integrity monitoring/change control and end-user accountability.

By implementing the McAfee database security solutions, customers gain visibility into where their databases are, which ones contain sensitive information, and how secure they are, as well as comprehensive protection against all database threats. Out-of-the-box templates and reports for PCI-DSS, HIPAA/HITECH, Sarbanes- Oxley and other regulations, allow organizations to quickly and easily meet compliance standards governing sensitive data, while minimizing the risks of a damaging breach, according to the company.

By delivering a complete family of products, fully integrated through McAfee ePolicy Orchestrator's dashboard, McAfee simplifi es the deployment and monitoring of the security infrastructure. McAfee Vulnerability Manager for Databases provides comprehensive testing, with more than 4,000 checks of potential weaknesses across the most popular database platforms. McAfee Database Activity Monitoring requires no changes to the database itself, and no confi guration changes to the network, and yet can provide real-time alerting or session termination with minimal overhead, according to the company.

Finalists 2012

* Application Security for DbProtect

* BeyondTrust for PowerBroker Database

* IBM for IBM InfoSphere Guardium

* Idera for Idera SQL Secure

* McAfee for McAfee Database Security

* NitroSecurity, now part of McAfee, for NitroView DBM

Reader Trust Awards

BEST DATA LEAKAGE PREVENTION (DLP)

WINNER

Symantec for Symantec Data Loss Prevention

www.symantec.com

Symantec Data Loss Prevention delivers a unifi ed solution to discover, monitor and protect confi dential data wherever it is stored or used. Symantec offers comprehensive coverage of confi dential data across endpoint, network and storage systems - whether the users are on or off the corporate network. By measurably reducing risk, Symantec gives organizations new confi dence to demonstrate compliance while protecting their customers, brand and intellectual property (IP), according to the company.

In order to protect their IP, organizations must know where it is. This has been a challenge for organizations because IP is spread out across the enterprise and there can be subtle differences between what is sensitive and what is not, so fi nding it is timeconsuming and costly.

Symantec Data Loss Prevention 11 is the current version of Symantec's leading data security suite. It features Vector Machine Learning technology to automate the process of identifying unstructured data, particularly IP, and effectively enables organizations to protect sensitive documents from theft and loss. Symantec DLP 11 provides companies with a defense-in-depth approach to their security strategy and, with the addition of Vector Machine Learning, provides content-aware data leakage prevention capabilities.

Symantec pioneered data leakage prevention technology through its acquisition of Vontu, and has been a leader in the market for many years. Symantec is also the fi rst and only vendor to apply machine learning to data leakage prevention for document analysis, according to the company.

Finalists 2012

* CA Technologies for CA DLP

* NextLabs for NextLabs Enterprise Data Protection

* Symantec for Symantec Data Loss Prevention

* Trustwave for Trustwave DLP

* Websense for Websense Data Security Suite

Reader Trust Awards

BEST EMAIL CONTENT MANAGEMENT

WINNER

Proofpoint for Proofpoint Enterprise Protection/Proofpoint Enterprise Privacy

www.proofpoint.com

An increasingly complex regulatory environment, a heightened awareness of data leakage risks, and a rising tide of increasingly malicious and hard-to-detect email threats this past year has heightened enterprise concerns around email content management. These concerns are driving increased demand for both inbound and outbound email security solutions. Proofpoint Enterprise addresses this market with a solution that delivers unifi ed inbound/ outbound email security, data leakage prevention and email encryption features, according to the company. The solution is designed to meet the security and performance demands of even the largest enterprises, and Proofpoint's fast-growing customer base includes some of the world's largest companies.

Proofpoint offers all gateway email security delivery models. It uniquely offers an ECM suite that can be deployed as SaaS ("public cloud"), on-premises virtual ("private cloud"), on-premises appliances or in hybrid-SaaS/ on-premises confi gurations with identical features and functions, controlled by the same graphical administration interface, according to the company.

Proofpoint makes it easy for customers to manage inbound email and outbound policies for both email and HTTP - the two most critical data leakage vectors - from one location. Accurate content analysis, wide variety of dispositions, support for multiple routes/channels, and the ability to enforce different policies at global, group and individual levels make for a powerful, fl exible system.

Finalists 2012

* Cisco Systems for Cisco IronPort Email Security

* Fortinet for FortiMail-100C

* Proofpoint for Proofpoint Enterprise Protection/Enterprise Privacy

* Symantec for Symantec Messaging Gateway 9.5

* Websense for Websense Email Security Gateway Anywhere

Reader Trust Awards

BEST EMAIL SECURITY

WINNER

Sophos for Astaro Security Gateway v8.2

www.sophos.com

Astaro Security Gateway offers complete UTM protection, and can be installed as either hardware, software or a virtual appliance. For more sophisticated deployment scenarios, the company offers additional Gateway Accessories that enable new functionality for the gateway.

The Astaro Security Gateway uses a combination of antispam, encryption and anti-virus scanning, such as a reputation service with spam outbreak detection, recipient verifi cation, reverse-DNS and HELO syntax checks, dual independent virus scanners with multiple detection methods and more.

Version 8.2 of Astaro Security Gateway includes several new features, including application control, log management and several other enhancements. These improvements will help organizations protect their network from modern threats, according to the company. It simplifi es security by making it easy to deploy and manage while still being powerful enough to protect against email, web, network and web app threats, as well as wireless security.

Astaro says it is the only VMware-ready certifi ed UTM vendor. This distinction allows organizations of all sizes to take advantage of Astaro's network protection in the deployment model that best fi ts their organization's needs. The Astaro Security Gateway also offers an easy-to-use graphical interface that makes administrating the appliances simple. Another advantage is Astaro's integration of not only network, web and mail subscriptions, but also web application security, next-generation fi rewall functions, log management, wireless security and Astaro RED integration.

Finalists 2012

* Cisco Systems for Cisco Business Class Email

* GFI Software for GFI MailEssentials Complete

* McAfee for McAfee Email Protection

* SonicWALL for SonicWALL Email Security Appliance 8300

* Sophos for Astaro Security Gateway

* Symantec for Symantec Email Security.cloud

Reader Trust Awards

BEST ENTERPRISE FIREWALL

WINNER

Barracuda Networks for Barracuda NG Firewall

www.barracudanetworks.com

Barracuda NG Firewall enables customers to take full control over their entire network by integrating Layer 7 application control of rogue applications with full integrated user awareness. The solution optimizes network traffi c fl ow via intelligent adaptive WAN routing, while extending security and application control to every location - be it small offi ces or large headquarters. Further, it provides integrated easy-to-manage and full-featured network access control (NAC), and saves considerably on management overhead via complete, scalable and centralized management of all functions and lifecycle that was built in, according to the company.

While most of these features would be available via the deployment of individual point products, the combined benefi ts - such as vastly reduced administrative overhead, a stabilized network, and a consistent security posture across the whole network - are now available with the Barracuda NG Firewall.

The platform has early development roots not only in centralized confi guration, policy and reporting, but also in site-to-site WAN traffi c management capabilities. The Barracuda NG Firewall is designed to optimize both the availability and performance of the WAN, with lower administrative overhead than competing solutions.

Combined with its unique capabilities for large-scale centralized management and intelligent traffi c management for site-to-site WAN connectivity, the Barracuda NG Firewall is one of the most advanced solutions of its kind at any price.

Finalists 2012

* Barracuda Networks for Barracuda NG Firewall

* Check Point Software Technologies for Check Point R75.20

* Cisco Systems for Cisco Catalyst 6500 Series ASA Services Module

* McAfee for McAfee Firewall Enterprise

* Palo Alto Networks for Palo Alto Networks PA-5000 Series

Reader Trust Awards

BEST FRAUD PREVENTION

WINNER

IronKey for IronKey Trusted Access

www.ironkey.com

IronKey's Trusted Access enables banks to provide their customers with a secure browsing solution for online banking and e-commerce that keeps customers safe on their own PCs, even if they are infested with fi nancial malware. It prevents online fraud by innovating in three layers of technology: a secure portable device, virtualization and a cloud-based secure network.

With Trusted Access, banks deliver to clients a customized, secure web browser protected in a fully virtualized, readonly environment tailored to work exclusively with IronKey's Trusted Network and the bank's systems to protect online banking sessions from known and unknown crimeware. It also offers Trusted Bookmarks, a safe way to access websites by using a "whitelist" managed by the bank. When shopping online, the service assures customers that they are accessing an authentic site and that payments are not being monitored or tampered with, according to the company.

Trusted Access protects online banking even if the client's computer is infected with the latest zero-day attack that would go undetected by anti-virus and other software. Anti-virus and fi rewalls cannot detect and stop new criminal attacks not seen before, so cyber thieves create new attacks to stay ahead of security tool updates. And, today the detection rate for new malware is less than 30 percent, according to spyeyetracker.abuse.ch.

IronKey delivers a complete secure browser application that is a read-only virtualized environment with its own encrypted keyboard driver. This architecture keeps it isolated from any malware on the host PC.

Finalists 2012

* CA Technologies for CA RiskMinder (formerly CA Arcot RiskFort)

* Entrust for Entrust TransactionGuard

* Guardian Analytics for FraudMAP

* IronKey for IronKey Trusted Access

* Trustwave for Trustwave Fraud Prevention

Reader Trust Awards

BEST IDENTITY MANAGEMENT APPLICATION

WINNER

CA Technologies for CA IdentityMinder

www.ca.com

As organizations move through the process of hiring, transferring, acquiring and/or restructuring, it is diffi cult to keep track of ever-changing users and the access they have to business applications. With pressures to improve operational effi ciencies, reduce costs, mitigate risks and ease compliance, IT organizations are challenged to limit access based on users' business roles over time. This includes removal when users leave, effi ciently managing users' fl uctuating access needs, and validating appropriate access to address compliance requirements.

CA Identity Manager enables organizations to improve business effi ciency, security and compliance by governing and automating identity lifecycle processes, while adopting the next-generation technologies that help make IT fl exible and business more agile. CA Technologies delivers a fl exible solution that includes provisioning, identity governance, role management and service requests in an integrated, proven and scalable solution across physical, virtual and cloud environments.

Scalability and depth of experience is evident in CA Identity Manager with implementations around the globe - all who require advanced capabilities, such as multilevel delegated administration, web services access and scalability to hundreds of millions.

CA Identity Manager also offers customization without coding for fast time to value. It offers visual tools and wizards to set up and change business policies, workfl ow and system connections in hours instead of weeks, advanced analytics to build a role model, and connectivity to a wide range of platforms and applications.

Finalists 2012

* CA Technologies for CA IdentityMinder (formerly CA Identity Manager)

* Cyber-Ark Software for Privileged Identity Management Suite/ Privileged Session Management

* IBM for IBM Tivoli Identity and Access Assurance

* NetIQ for Novell Identity Manager by NetIQ

* Quest Software for Quest One Identity Solutions

Reader Trust Awards

BEST IPS/IDS PRODUCT

WINNER

Check Point Software Technologies for Check Point IPS Software Blade

www.checkpoint.com

Today's threat landscape is dynamic, evolving and includes organized groups creating sophisticated attacks that specifi cally target the security weaknesses of their business target. Enterprises want to protect their business against the multitude of threats while simplifying their security deployment and reducing costs.

The Check Point IPS Software Blade provides complete, integrated, next-generation fi rewall intrusion prevention capabilities at multi-gigabit speeds, resulting in IPS security and performance. The IPS Software Blade provides complete threat coverage for clients, servers, OS and other vulnerabilities, malware/worm infections, and more. The Multi-Tier Threat Detection Engine combines signatures, protocol validation, anomaly detection, behavioral analysis, and other methods, including identity and application awareness, to provide the highest levels of network IPS protection, according to the company. By fi ltering 90 percent of incoming traffi c without requiring deep inspection, the IPS engine inspects for attacks only on relevant sections of the traffi c, thus reducing overhead and increasing accuracy.

The Check Point Software Blade Architecture and the IPS Software Blade help customers increase their security, reduce their security complexity, while also reducing security costs.

The business and technical advantages include unmatched fl exibility and expandability. The Software Blade Architecture and the IPS Software Blade allows customers to deploy more security, while simplifying their environment and reducing costs, according to the company.

Finalists 2012

* Check Point Software Technologies for Check Point IPS Software Blade

* Cisco Systems for Cisco Intrusion Prevention System

* HP Enterprise Security for HP TippingPoint S6100N Intrusion Prevention System

* McAfee for McAfee Network Security Platform

* Sourcefi re for Sourcefi re IPS

Reader Trust Awards

BEST IPSEC/SSL VPN

WINNER

Cisco Systems for Cisco AnyConnect Secure Mobility Solution

www.cisco.com

Over the past several years, the workforce has become increasingly mobile, requiring anywhere/anytime access to the corporate network using a broad range of mobile devices. This has led to an era of "bring your own device" (BYOD), where employees at all levels are using their phones, tablets, laptops and other consumer devices to access the corporate network - with an expectation that IT will support them.

And since many of these devices are owned by the individual, IT has no control over what resides on the device, and it has little-to-no insight into the security posture of the device, prior to connection.

Cisco AnyConnect Secure Mobility Solution addresses these challenges by providing users with secure remote access to the corporate network using their device of choice, regardless of their physical location, to easily and securely use the applications and information they need to do their jobs.

Cisco AnyConnect Secure Mobility scales to 5 Gbps of VPN throughput or 100,000 users leveraging Cisco ASA security appliances, or Cisco ASR or ISR routers, for comprehensive secure connectivity. In addition, AnyConnect uses Cisco Ironport Web Security Appliances or Cisco ScanSafe in the cloud to integrate web security.

Always-on connectivity and the intelligence of AnyConnect automatically selects the most optimal network access and adapts its tunneling protocol, even accommodating latency sensitive traffi c. This keeps mobile workers effi cient and productive as they roam between locations, according to the company.

Finalists 2012

* Certes Networks for TrustNet Manager

* Cisco Systems for Cisco AnyConnect Secure Mobility

* F5 Networks for BIG-IP Edge Gateway

* NCP Engineering for NCP Secure Enterprise Solution

* SonicWALL for SonicWALL/Aventail E-Class Secure Remote Access EX7000

Reader Trust Awards

BEST MANAGED SECURITY SERVICE

WINNER

Dell SecureWorks

www.secureworks.com

Dell SecureWorks provides thousands of customers with managed security services, security and risk consulting and threat intelligence to combat current and emerging cyber threats. It offers a wide range of information security and compliance services, including SIM on-demand, log monitoring and retention, IPS/ IDS, fi rewall management, web application fi rewall, host IPS, vulnerability management, web application scanning, security and risk consulting, and threat intelligence services.

To meet organizations' requests for fl exible security solutions, Dell SecureWorks delivers a wide range of services and integrated options, including full outsourcing, co-management, monitoring and reporting only, and ondemand software-as-a-service. Its proprietary, purpose-built security platform enables them to fi lter, correlate and analyze more than 15 billion events across its customer base every day. That, coupled with the company's Counter Threat Unit research team, a team of well-trained and certifi ed security experts, provide leading customer service, support and protection.

Ranked as a leader in managed security services by both Gartner and Forrester, Dell SecureWorks processes more than 15 billion security events across thousands of networks all around the world. Its purpose-built scalable technology works with companies of all sizes.

Dell SecureWorks' customer renewal rate is higher than 90 percent, and it has a worldwide presence across six continents in more than 70 countries for a global view of the security environment, according to the company.

Finalists 2012

* Dell SecureWorks for Best Managed Security Service

* IBM for IBM Managed Security Services

* MANDIANT for MANDIANT Threat Management Services

* SunGard Availability Services for SunGard Managed Security Service

* Symantec for Symantec Managed Security Services

Reader Trust Awards

BEST MOBILE/PORTABLE DEVICE SECURITY

WINNER

Symantec for PGP Whole Disk Encryption from Symantec

www.symantec.com

Information security professionals face considerable challenges protecting information on mobile computing devices, such as laptops and removable storage. In order to ensure that a lost or stolen device does not lead to unauthorized access to information, it is imperative to encrypt the data.

PGP Whole Disk Encryption from Symantec provides data protection for all information on a mobile computing device, including the user fi les, application data, operating system and swap partitions. A range of authentication options are available to ensure that only proper users access the data on the drive. The client can be centrally managed through PGP Universal Server in order to simplify administration, policy and reporting.

PGP Whole Disk Encryption works together with a range of encryption solutions from Symantec, ensuring that an organization can address immediate needs for data protection straight away, and address new needs over time. It offers broad platform support, including Windows, Windows Server 2K8 and 2K3, Mac OS X, Linux Ubuntu, CentOS and Red Hat.

Further, strong management tools offer key management, and consolidated security management console with Symantec Protection Center.

The tool provides advanced support for Intel encryption technology. It works with Intel vPro for anti-theft and deprovisioning, and supports AES-NI crypto acceleration in all OS's.

In addition, it provides validations/certifi cations with the toughest cryptographic and security standards, including EAL 4-plus, FIPS 140-2, plus DIPCOG approved and CAPS approved.

Finalists 2012

* Good Technology for Good for Enterprise

* IronKey for IronKey Trusted Access

* McAfee for McAfee Enterprise Mobility Management

* Sophos for Sophos Mobile Control

* Symantec for PGP Whole Disk Encryption from Symantec

Reader Trust Awards

BEST MULTIFACTOR PRODUCT

WINNER

Entrust for Entrust IdentityGuard

www.entrust.com

Entrust IdentityGuard enables organizations to implement strong authentication to employees, partner, contractors and authorized third parties - and only when it makes sense.

It offers one of the widest ranges of strong authentication options on the market today, which includes physical or non-physical approaches, and can be transparent to users or take advantage of existing mobile devices, according to the company.

It represents a more affordable approach to deploying a wide range of authentication capabilities at a fraction of the cost of traditional, singlepurpose solutions.

It provides fl exibility to tailor authentication to user preference, transaction risk and cost. And, it minimizes user impact, enabling a choice of authentication methods, only performing authentication when needed to reduce risk.

Entrust IdentityGuard Mobile helps enterprises strongly authenticate endusers without requiring specialized security hardware, such as one-time-passcode (OTP) hardware tokens.

Effi cient and non-invasive for end-users, the solution is an award-winning strong authentication tool that is affordable for wide-scale enterprise deployment. The platform, which offers one of the widest ranges of authenticators on the market, easily integrates with existing environments and minimizes the impact of security on employees, customers and partners.

As well, the platform approach allows customer to deploy a range of different authenticators based on the unique requirements of various user communities.

Finalists 2012

* CA Technologies for CA AuthMinder (formerly CA Arcot WebFort) with ArcotID

* Entrust for Entrust IdentityGuard

* IBM for IBM Tivoli Access Manager for Enterprise Single Sign-On

* Quest Software for Quest Defender

* Symantec for Symantec VIP (Validation and ID Protection Service)

Reader Trust Awards

BEST NAC PRODUCT

WINNER

ForeScout Technologies for ForeScout CounterACT

www.forescout.com

The ForeScout Counter- ACT NAC solution is easy, integrated, interoperable and automated - delivering real-time visibility and broad control over all users, devices, OSs and applications before appropriate access to network resources is granted - without requiring agents and using existing infrastructure. ForeScout's network-based NAC delivers rich user and device classifi cation and built-in and extensible policies to determine who the user is (and what directory group association), what is the device, what is the confi guration and security posture of the device (active and current client security, patches, approved software, and more), as well as when and what network resources are being requested. Available as a scalable appliance or virtual appliance family, CounterACT's built-in advanced device classifi cation, infrastructure plugs-ins, 802.1x support, policies, gust registration, actions, remediation and reporting address evolve NAC requirements and accelerate time-to-value, according to the company.

CounterACT offers rich network access control, guest networking, endpoint compliance, mobile security, remediation and reporting.

It is fully integrated and interoperable, supporting the majority of network and infrastructure. It does not require multiple components to manage, or predefi ned knowledge of the endpoint. As well, there is no need to change or update network or endpoint devices, to deploy agents, nor manage 802.1x devices.

CounterACT offers robust network discovery and automated device classifi cation with rich device fi ngerprinting.

Finalists 2012

* Bradford Networks for Network Sentry

* Cisco for Cisco Identity Services Engine

* ForeScout Technologies for ForeScout CounterACT

* McAfee for McAfee NAC

Reader Trust Awards

BEST POLICY MANAGEMENT SOLUTION

WINNER

Tripwire for Tripwire Enterprise Solution 8.1

www.tripwire.com

Tripwire Enterprise 8.1 is a security confi guration management suite whose solutions work as standalone offerings or in tight integration to prevent, detect and correct issues affecting IT system integrity. It assesses confi gurations against relevant security policies and standards, detects fi le or confi guration changes that can impact system integrity, and corrects noncompliant confi gurations. The Compliance Policy Manager in Tripwire Enterprise helps customers meet the numerous security standards and regulations with which organizations must maintain continuous compliance, from PCI to SOX to in-house security requirements. Each policy assesses confi gurations against these standards, which are security best practices taken from more than 20 different recognized sources, such as the Center for Internet Security (CIS) or the National Institute of Standards and Technology (NIST). With broad coverage for numerous platforms and devices - currently more than 240 policy/platform combinations - Tripwire Enterprise policies cover almost any asset within organizations' IT infrastructure.

Further, Tripwire Enterprise's agent-based Policy Manager can continually assess IT confi gurations against scores of policies and standards, platforms, hardware types and devices, removing the "uncertainty gap" that comes with periodic, external mega-scans.

And, because Tripwire Enterprise's Policy Manager is integrated "out of the box" with its File Integrity Manager, Tripwire Enterprise has the ability to re-test confi guration settings based on detected changes, and provide truly "continuous" monitoring.

Finalists 2012

* Cisco for Cisco Identity Services Engine

* McAfee for McAfee ePolicy Orchestrator

* SonicWALL for SonicWALL E-Class Universal Management Appliance (UMA) EM5000

* Symantec for Symantec Control Compliance Suite 10.5

* Tripwire for Tripwire Enterprise Solution 8.1

Reader Trust Awards

BEST SECURITY INFORMATION/EVENT MANAGEMENT (SIEM) APPLIANCE

WINNER

HP for HP ArcSight Express

www.hp.com

HP ArcSight Express combines SIEM, log management and user activity monitoring on a single appliance, moving beyond perimeter security to monitor what truly matters to HP ArcSight customers, according to the company.

It collects from any data source, consolidates the information for maximum storage effi ciency, and correlates the events in multiple dimensions, including, identity, vulnerability, asset, time, statistical calculations, pattern, and other events to detect the advanced threats that organizations face in a post-perimeter world.

ArcSight Express does three things: data collection, consolidation and correlation. It supports data collection from more than 300 commercial and open source products, and has a "fl ex" connector architecture that is used by customers to connect to thousands more data sources to establish full visibility into their environments. All of the connectors are virtualization and cloud ready.

The tool's consolidation architecture provides 10:1 compression of all events, signifi cantly increasing the data that can be monitored and stored on a single appliance. As attacks gestate over longer periods of time and compliance requirements tighten, this functionality is critical to helping customers stay secure and compliant, according to the company.

HP ArcSight Express can pull information from directories and identity management systems and use that data to monitor user activity, even when logs show an IP address or shared account credentials, according to the company.

Finalists 2012

* HP for ArcSight Express

* IBM for IBM Hosted Security Event and Log Management

* RSA Security for RSA enVision Platform

* SolarWinds for SolarWinds Log & Event Manager

* Symantec for Symantec Security Information Manager

Reader Trust Awards

BEST UTM

WINNER

Fortinet for FortiGate-60C

www.fortinet.com

The FortiGate-60C multithreat security appliance offers unmatched performance, fl exibility and security for remote, branch or small offi ce networks. The tool integrates fi rewall, IPsec and SSL VPN, anti-virus, anti-spam, intrusion prevention, web fi ltering, data leakage prevention (DLP), application control, SSL inspection, endpoint NAC and vulnerability management into a single device at a single price. And, dynamic threat updates are provided by FortiGuard Labs.

The appliance couples highperformance hardware with an internal data storage and innovative expansion options, such as wireless broadband support, in one appliance. It is Fortinet's most prolifi c network security appliance in the fi eld.

No other device in its price range offers the speed (1Gbps fi rewall throughput), breadth and depth of protection (FortiGuard) as the FortiGate-60C, according to the company. Custom processors maximize throughput with one or multiple security services - blocking unauthorized access and eliminating unwanted traffi c or threatening attacks. Virtual Domains (VDOMs) enable a single FortiGate-60C to function as multiple independent virtual FortiGate systems, enabling multiple uses for a variety of applications and user access with different policies on one box. Each VDOM contains its own virtual interfaces, security profi les, routing table and administration.

Finally, the FortiASIC processors in the FortiGate-60C allow organizations to deploy unifi ed threat management functionality without sacrifi cing network performance.

Finalists 2012

* Check Point Software Technologies for UTM-1

* Fortinet for FortiGate-60C

* LANDesk Software for LANDesk Security Suite

* Sophos for Astaro Security Gateway v8.2

* Symantec for Symantec Endpoint Protection 12

Reader Trust Awards

BEST VULNERABILITY MANAGEMENT TOOL

WINNER

Rapid7 for NeXpose Enterprise

www.rapid7.com

As the number of attacks and vulnerabilities continue to rise, security professionals need real security risk intelligence to help them prioritize threats and remediate the greatest risks fi rst. Rapid7's web-based vulnerability management product, NeXpose, leverages one of the largest vulnerabilities databases to identify vulnerabilities across networks, operating systems, databases and web applications.

NeXpose manages the entire vulnerability management lifecycle, including discovery, detection, verifi cation, risk classifi cation, impact analysis, reporting and mitigation. Risk is classifi ed based on real exploit intelligence combined with industry standard metrics, such as CVSS, as well as temporal and weighted risk scoring. NeXpose provides a detailed, sequenced remediation roadmap with time estimates for each task. NeXpose is used to help organizations improve their overall risk posture and security readiness, as well as to comply with mandatory regulations, including security requirements for PCI, HIPAA, ARRA HITECH Act, FISMA, Sarbanes-Oxley and NERC CIP.

NeXpose's unique capabilities for complex IT environments earned the highest possible ratings for vulnerability management from both Gartner, and Forrester in recent evaluations. According to Forrester, Rapid7 is: "The only vendor in this evaluation whose scanning capabilities can handle Ajax and Web 2.0 technologies." In fact, NeXpose is the only vulnerability management solution that offered integral web application security from the fi rst release, and it continues to lead the way in this area, according to the company.

Finalists 2012

* McAfee for McAfee Vulnerability Manager

* Qualys for QualysGuard Vulnerability Management (VM)

* Rapid7 for NeXpose Enterprise

* Skybox Security for Skybox View Enterprise Suite

* Tenable Network Security for SecurityCenter

Reader Trust Awards

BEST WEB APPLICATION FIREWALL

WINNER

SonicWALL for SonicWALL Web Application Firewall Service

www.SonicWALL.com

While small and midsized businesses (SMBs) have little option but to adopt Web 2.0 and use apps served up as SaaS or cloud solutions, they often lack the inhouse capabilities necessary to keep up with rapidly evolving web security challenges. As a result, web applications are increasingly becoming targets for criminal attacks - like SQL injection, cross-site scripting and cookie tampering, as well as credit card theft.

The SonicWALL Web Application Firewall Service offers a complete, affordable, easy to manage and deploy, out-of-the-box compliance solution for businesses and managed services providers that protects web applications against a relentless barrage of threats and attacks, according to the company.

The Web Application Firewall feature set demonstrates the company's ability to offer key enterprise options to small offi ce/home offi ce and SMB customers. The offering is available across SonicWALL's complete SRA line - providing users with easy-to-use, secure and clientless remote access with a broad range of applications and resources on the corporate network.

SonicWALL's proprietary Web Application Firewall Service applies reverse proxy analysis of Layer 7 traffi c against known signatures, denies access upon detecting web application malware, and redirects users to an explanatory error page. Dynamic application profi ling and custom rules can thwart day-zero vulnerabilities. Its acceleration features include content caching, compression and connection multiplexing, which improve the performance of protected websites

Finalists 2012

* F5 Networks for BIG-IP Application Security Manager

* IBM for IBM Security Network Intrusion Prevention System

* Imperva for SecureSphere Web Application Firewall

* SonicWALL for SonicWALL Web Application Firewall Service

* Sophos for Astaro Security Gateway

Reader Trust Awards

BEST WEB CONTENT MANAGEMENT PRODUCT

WINNER

Websense for Websense Web Security Gateway Anywhere

www.websense.com

With more social networks, an increasingly mobile workforce and sophisticated modern malware, many companies are rolling out Websense Web Security Gateway Anywhere (WSGA). It combines onsite appliances with cloud security services to provide web content management to users onsite or remote. It also features a common console and easy single-policy deployment. Unique to WSGA is integrated data theft protection, real-time content classifi cation, real-time security classifi cations, and the ACE (Advanced Classifi cation Engine) defense architecture that uses patented algorithms to detect web threats and data theft. Further, the ACE protects against malicious scripts and zero-day threats that circumvent anti-virus products. ACE analyzes web traffi c in real-time, categorizing dynamic social web content/ threats, plus preventing data theft. ACE and Websense ThreatSeeker inspect three to fi ve billion pieces of content from more than 50 million sources daily.

Proactive social web content analytics/controls enable policies for social media sites to address detailed functional controls. Additional functionalities address viral videos, put quotas on surveillance or entertainment videos, and limit access to sites using dynamic DNS.

Websense Web Security Gateway provides a single management console and a single policy that manages appliance and cloud/SaaS defenses for users in the offi ce or remotely. This is part of the TRITON solution that unifi es web, email and data security across both on-premise and cloud platforms for a lower cost, according to Websense.

Finalists 2012

* Barracuda Networks for Barracuda Web Security Flex

* Cisco for Cisco Web Security

* McAfee for McAfee Web Protection

* Sophos for Sophos Endpoint Web Protection

* Websense for Websense Web Security Gateway Anywhere

Excellence Awards

BEST REGULATORY COMPLIANCE SOLUTION

WINNER

Agiliance for Agiliance RiskVision with Agiliance Compliance Manager Application

www.agiliance.com

Between 2007 and 2010, Agiliance's success contributed to a 4,909 percent revenue growth rate, according to the company. And, in 2010, grew more than 100 percent year-over-year - well above the governance, risk and compliance (GRC) market growth rate. Based on its growth, Agiliance was listed as number one security software company, number one GRC software company and number 39 fastest-growing private company in America on the 2011 Inc. 500 annual rankings.

Around seventy-fi ve percent of Agiliance customers are Global 2000 enterprises, spanning a number of verticals. such as fi nancial services, government, health care, technology, and retail.

As well, its customer loyalty is strong with nearly 100 percent retention rate. More than 70 percent of customers license multiple applications, and more than 35 percent of customers are repeat buyers.

Agiliance's commitment to making risks visible, measurable and actionable extends beyond delivering comprehensive GRC solutions. Agiliance offers a variety of services - from training and implementation to ongoing architecture assessment. Also, its highly trained customer services team delivers consulting services for project planning and analysis, implementation, onsite and remote training, and custom development, according to the company. Its support programs maximize the performance and availability of mission-critical GRC resources, including the provisioning of technical support (via telephone, web portal or email), as well as maintenance.

Finalists 2012

* Agiliance for Agiliance RiskVision with Agiliance Compliance Manager Application

* eEye Digital Security for Retina CS & Regulatory Reporting Packs

* Modulo for Modulo Risk Manager NG

* Qualys for QualysGuard Policy Compliance

* RSA Security for RSA Archer eGRC Suite platform

Excellence Awards

BEST ENTERPRISE SECURITY SOLUTION

WINNER

Websense for Websense Web Security Gateway Anywhere

www.websense.com

Since entering the appliance space, Websense has generated the highest growth rate of any enterprise-class content security appliance product, according to IDC.

Billings for Websense Tritonbased gateways increased more than 200 percent year over year in Q2 2011, according to Websense. Its customer base, which includes enterprises ranging from 250 to more than 125,000 users, continues to grow. And, the company's robust web, data and email technology portfolio protects approximately 40,000 organizations.

All customers receive specialized assistance from technical support engineers in centers worldwide, which regularly average 8.91 (out of 10) in industry surveys. Offerings include Standard, Premium (unlimited 24/7) and Mission Critical (fastest, designated account manager). In fact, the company's customer support recently won the Association of Support Professionals' 2011 "Best Web Support" award and achieved Service Capability & Performance (SCP) Support Standard certifi cation.

"I've worked with many different vendors where it was hard to get a hold of anybody to get a question answered and fi nd people to help us with our problem," says Mark Choi, manager of instructional technology, Bellevue School District. "It was very reassuring that I could just pick up the phone and call someone at Websense to get help right away, and get a problem resolved within a reasonable amount of time. Everyone I spoke with was very knowledgeable of the product and had an intelligent answer."

Websense invests in research and development at six worldwide facilities

Finalists 2012

* Sourcefi re for Sourcefi re IPS

* Splunk

* Verdasys for Digital Guardian

* Websense for Websense Web Security Gateway Anywhere

* WhiteHat Security for Whitehat Sentinel

Excellence Awards

BEST SME SECURITY SOLUTION

WINNER

Qualys for QualysGuard Express

www.qualys.com

QualysGuard Express is used by more than 3,800 small and medium enterprise (SME) organizations around the world as an on-demand solution that automates the process of identifying security vulnerabilities, tracking remediation and meeting regulatory compliance requirements, according to the company. QualysGuard Express has fl ourished in the SME space due to its ease of use and ability for customers to show immediate ROI through time and money savings. Whereas IT security and compliance was seen as a complex, costly task, QualysGuard Express makes it possible for any sized company to have an affordable best-ofbreed solution for security and compliance, protecting both company and customer data. The cost is typically 50 to 90 percent lower than enterprise software solutions, and product training, service and support are included.

QualysGuard Express includes free service and support - 24/7 by telephone, email or the web. The company's technical support also offers free product training, including web-based and online customer and technical training, certifi cation workshops, and access to annual and regional user conferences.

Its customers get automated testing of the platform, and continuous updates and enhancements of vulnerability signatures without the need for customer initiation. As well, if a false positive is reported, it is investigated immediately. Signatures are updated and automatically released to QualysGuard platform within 72 hours. Qualys also maintains the Qualys Community, a website devoted to interacting with and providing resources for QualysGuard users.

Finalists 2012

* eEye Digital Security for Retina CS

* Qualys for QualysGuard Express

* Rapid7 for Metasploit Pro

* SonicWALL for NSA 2400MX

* Symantec for Symantec Endpoint Protection.cloud

Excellence Awards

ROOKIE SECURITY COMPANY OF THE YEAR

WINNER

eCert

ecertsystems.com

eCert's offerings include its Email Protection Identity Cert (EPIC) and the FS-ISAC and BITS Trusted Email Registry. Launched in April 2010, eCert's offerings continue to advance with multiple enhancements to provide intelligence, protection and trust for email, according to the company. The eCert EPIC service operates as an internet-based registry of email domain information that publishes monitoring and security instructions to receiving networks, and simultaneously collects and analyzes traffi c information gathered from those networks. There is no installed hardware or software, so the ease of use of both services has increased the customer base, according to the company.

eCert offers 24/7/365 enterprise support for its clients. Customer service includes complete deployment, testing and support services to members. This includes relationship and legal management with receivers (ISPs), project management, authentication and service deployment consulting, tools, data and threat analysis, trend reporting and metrics.

The company regularly hosts industry summits with leading fi nancial institution partners, internet service provider (ISP) and security partners to develop an ongoing roadmap to protect services for online communications, too. eCert hosts these summits every three months to ensure that all relevant, critical and topical issues in the industry are being addressed, according to eCert.

To improve online communications and restore trust and safety to email, in 2011, eCert donated its intellectual property and key specifi cations for the development of open industry standards to promote a scalable, industry-wide email security solution.

Finalists 2012

* CloudLock

* Dome9

* eCert

* Invincea

* Mykonos Software

Excellence Awards

BEST SECURITY COMPANY

WINNER

MANDIANT

www.mandiant.com

MANDIANT's people and product approach to incident response differentiates the company from any other fi rm and has contributed to the company's dramatic growth over seven years, according to the company. MANDIANT's elite force of incident responders and forensic investigators bring to each breach investigation a unique blend of technical and investigative experience and offer leading incident response, malware analysis and incident response program development.

It is investing signifi cantly in the delivery of next-generation threat detection and response through MCIRT, the MANDIANT Computer Incident Response Team, which combines MANDIANT's experience in advanced threat detection and response, exposure to diverse threat intelligence, revolutionary technology, and some of the best incident responders in the business, according to the company. This combination provides customers with effective incident insight - from host to network - along with actionable intelligence.

MANDIANT offers a range of options for products and services: one-on-one phone support, a secure portal for customer-only access, and an interactive, web-based user forum for sharing companyclient discussions/Q&A, MANDIANT research, product and service updates, and 'freshness levels' assigned to relevant topics and issues.

As well, clients and other industry end-users benefi t from MANDIANT's detailed emergency incident response web page. This comprehensive, publicly available summary of incident response best practices helps customers and the broader industry prepare for and mitigate breach events.

Finalists 2012

* Core Security Technologies

* MANDIANT

* McAfee

* Qualys

* Trustwave

Professional Awards

BEST SECURITY TEAM

WINNER

USAA Enterprise Security Group (ESG)

www.usaa.com

The USAA Enterprise Security Group (ESG) began as a vision of the CEO and board of directors, and now develops and deploys integrated strategies that they endorse.

In February 2010, more than 500 employees in information security, integrated fi nancial fraud operations, corporate security investigations, business continuity, and physical security were joined as the Enterprise Security Group under a new chief security offi cer. The leadership team, comprised of the executives from the prior organizations, provides senior executive leadership for the ESG.

Staff is largely co-located and the workforce is integrating across risk disciplines. The ESG provides situational awareness briefs at regular board meetings, plays an active role in the risk management process, provides frequent consultations at the highest levels of executive management, and executes innovative visible and behind-thescenes programs and projects to reduce risk. As a result, the ESG enjoys strong support from all levels in the company.

In addition, the ESG has earned the trust and confi dence of corporate leaders and colleagues who rely on information intelligence, security operations and protection services to run their businesses without disruption. Examples include: operating an operations center; developing a fi ve-year strategy; deploying new member and employee information capabilities; delivering new ATM and fi nancial center security; issuing daily threat reports with USAAcustomized impact statements; developing and using a threat rating methodology to assess physical threats in countries/ cities; and recognizing individuals and teams for innovation implementations.

Finalists 2012

* Afl ac

* Teleperformance Group

* The Go Daddy Group

* U.S. Bank

* USAA Enterprise Security Group (ESG

Professional Awards

BEST PROFESSIONAL CERTIFICATION PROGRAM

WINNER

(ISC)2 Certifi ed Information Systems Security Professional (CISSP)

www.isc2.org

Touted as the gold standard of information security certifi cations, the rigorous Certifi ed Information Systems Security Professional (CISSP) was the fi rst information security certifi cation accredited to ISO/IEC Standard 17024. The CISSP is a globally recognized standard of achievement and provides an objective measure of mastery. It requires at least fi ve cumulative years of direct, full-time work experience in two or more of the 10 domains of the CISSP common body of knowledge (CBK), or four years of work experience and a four-year college degree or a master's degree in information security. Seasoned subject matter experts update exam content quarterly. Further, CISSP holders are required to obtain 120 continuing professional education (CPE) credits every three years, with a minimum of 20 quality CPEs posted during each year of the cycle.

The CISSP is often a requirement for jobs in the public/private sectors worldwide. A CISSP candidate must demonstrate a breadth of knowledge and experience and understand the full spectrum of the (ISC)2 CBK. In addition to the required fi ve years of relevant work experience in two or more of the 10 CBK domains, CISSPs must also adhere to the (ISC)2 code of ethics, be endorsed by a current (ISC)2 member, and undergo continuing education to keep the certifi cation current. By meeting these requirements, employers can rest assured that when they hire a pro who holds the CISSP, that person has demonstrated comprehension of industry best practices, made an investment in the fi eld, and a commitment to ethical conduct.

Finalists 2012

* Information System Audit and Control Association for Certifi ed Information Security Manager (CISM)

* (ISC)2 for Certifi ed Information Systems Security Professional (CISSP)

* (ISC)2 for Certifi ed Secure Software Lifecycle Professional (CSSLP)

* Global Information Assurance Certifi cation Program (GIAC) GIAC Security Expert (GSE)

* Global Information Assurance Certifi cation Program (GIAC) GIAC Certifi ed Web Application Penetration Tester (GWAPT)

Professional Awards

BEST PROFESSIONAL TRAINING PROGRAM

WINNER

SANS Institute

www.sans.org

The SANS Institute provides hands-on, intensive, immersion training designed to help students master the practical steps necessary for defending systems and networks. Beginners to seasoned experts can fi nd a SANS course to fi t their technical needs. Every SANS course is written and taught by top experts who are real-life practitioners in their respective fi elds. Courses are either job- or skill-based and cover general security, intrusion detection, incident handing, forensics, penetration testing, application security, secure coding, management and auditing.

SANS also features a variety of free resources for security professionals: The Internet Storm Center is a free analysis and warning service for internet users and organizations. Additionally, the SANS Reading Room contains two thousand computer security white papers. Also offered are live webcasts covering information security topics, and four newsletters covering high-level executive summaries and alerts.

According to SANS, it differs from other training programs in four important ways: course content, instructors, methods of delivery and commitment to the community. Most importantly, it also promises immediate practical application: "You will be able to put what you learn into practice the day you return to the offi ce."

SANS authors and instructors are authors of best-selling information security books, as well as course authors. They also are quoted in the media and information-security-related articles for publications and websites.

Overall, SANS courses empower students with the knowledge they need to protect their systems and data

Finalists 2012

* EC-Council for Certifi ed Ethical Hacker (CEH)

* (ISC)2 for (ISC)2 Information Security Education and Certifi cation

* MANDIANT for MANDIANT Professional Education Program

* SANS Institute

* Secure Ninja

* Security Innovation for TeamProfessor and TeamMentor

Professional Awards

CSO OF THE YEAR

WINNER

Stephen Scharf, global CISO, Experian

www.experian.com

Stephen Scharf, the global chief information security offi cer for Experian, has more than a decade of experience building strong IT security teams. He understands his role as the face of IT security and that this role requires him to present the highest standard of credibility and integrity to his peers and the organization as a whole. Scharf joined Experian, a company with more than 15,000 employees in 41 countries, as its fi rst global CISO.

As a strong proponent of knowledge management, he continuously looks for best practices in IT security and applies these to the global environment in an effective and effi cient manner, according to Experian. Scharf strives constantly to stay updated on the latest security threats facing the industry, and consistently shares this knowledge with his team - integrating it into team building, cross-training among various business groups, and problem solving - and leverages feedback from the team with the broader organization to ensure security goals are aligning with business needs.

Scharf's motto is to "treat security as a partnership." IT security is intimately involved in every part of Experian's operations. As a result, he works closely with all areas of the business - from developers and engineers to his colleagues in IT and the executive team - and dedicates himself to understanding their concerns.

Scharf is steadfast on remaining cognizant of everything across the security portfolio - from users on the network, application security, viruses and more - and works with the executive and IT teams to create a solution that benefi ts all aspects, while maintaining the focus on overall business needs.

Finalists 2012

* Mark Engles, CSO, Dominion

* Nils Puhlmann, CSO, Zynga

* Stephen Scharf, global CISO, Experian

* Bruce Wignall, CSO, TelePerformance

* Greg Wood, CISO, U.S. Bank

Professional Awards

EDITOR'S CHOICE

WINNER

Douglas Maughan, division director, Cyber Security Division and DHS Science and Technology Directorate, U.S. Department of Homeland Security

Douglas Maughan, director of the cybersecurity division at the U.S. Department of Homeland Security'sAdvanced Research Projects Agency (HSARPA), part of the Science and Technology Directorate, is trying to isolate breakthrough inspirations. One of the responsibilities of Maughan and his team is to seed small businesses with capital to create new innovation and transition to the marketplace.

Five companies win Phase One funding, which totals about $100,000 and is used to create a prototype. If the design is promising enough, one or two of those fi rms receive another $750,000 to further develop the product so it can become commercialized.

Some rookie companies actually prefer to deal with government rather than seek support from angel or private investors. "Not all small entrepreneurs know how to navigate the venture landscape," Maughan says.

He adds that the program, Small Business Innovative Research, is done to not only help those fl edgling organizations that need a fi nancial boost, but also to carry out a primary mission of DHS: to protect critical infrastructure. The hope, he says, is that the products that make it to market help accomplish exactly that.

And there have been numerous HSARPA success stories. Since 2004, SBIR has provided Phase Two funding rounds for 22 companies, resulting in eight commercial products currently available. Three of the winning fi rms have carried their maturity all the way to acquisition.

Maughan points to an eightemployee business, Komoku, founded in 2004. The fi rm, which sprung out of the University of Maryland, built rootkit detection technology.

"By the time we hit 2007, malware was very prevalent, and they were being courted by McAfee, Symantec and Microsoft," Maughan recalls.

Beyond leading the charge to make certain that innovation doesn't die, Maughan's team is involved with a number of other initiatives.

His department is the sponsor and driving force behind the HOST program, whose mission is to investigate open security methods, models and technologies and identify viable and sustainable approaches that support national cyber security objectives. To achieve this mission, HOST is leading efforts of discovery, collaboration and seeding development in open source software and practices that produce a measurable impact.

During 2011, DHS S&T released "Mobile Device Forensics," to support research and development by small business to support law enforcement requirements.

As well, Maughan's team at DHS supported the development and release of Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program, a White House supported strategy for cybersecurity research and development.

No matter what the drivers, Douglas Maughan is hopeful that innovation in cybersecurity has become a discipline it its own right. In fact, top information technology offi cials in Washington recently announced a partnership among Maughan's division, the National Institute of Standards and Technology (NIST) and the Financial Services Sector Coordinating Council, which represents banks, insurance companies and investment fi rms.

The goal of the alliance is to "accelerate the deployment of network test beds for specifi c use cases that strengthen the resiliency, security, integrity and usability of fi nancial services and other critical infrastructures' functions, processes and people," according to blog post written by federal CTO Aneesh Chopra, and Howard Schmidt, national cybersecurity coordinator.

Copyright:  (c) 2012 Haymarket Media, Inc.
Wordcount:  9980

Newer

Rutherfoord processes 1 million transactions in Applied Systems CSR24

Advisor News

  • Temporary tax hike to fill Medicaid gap heads to governor
  • Iowa Senate sends health insurer tax increase to governor’s desk
  • Temporary tax hike to fill Iowa Medicaid gap heads to governor’s desk
  • Iowa Medicaid temporary tax plan draws sharp public opposition
  • EDITORIAL: Make responsible tax cuts, increases
More Advisor News

Annuity News

  • Corebridge, Equitable merge to create potential new annuity sales king
  • LIMRA: Final retail annuity sales total $464.1 billion in 2025
  • How annuities can enhance retirement income for post-pension clients
  • We can help find a loved one’s life insurance policy
  • 2025: A record-breaking year for annuity sales via banks and BDs
More Annuity News

Health/Employee Benefits News

  • Medicaid cuts could add pressure to already-stressed psychiatric units
  • Health care costs in Colorado will grow under federal policy, patient advocates say; Sen. Hickenlooper says measure to require price transparency will help balance market
  • Aflac adds new long-term care rider
  • Inside Medicare Advantage ‘dark money’ group’s campaign to win bigger payments to insurers
  • Brokers expect voluntary benefit sales to rise
More Health/Employee Benefits News

Life Insurance News

  • AM Best Removes from Under Review with Positive Implications and Affirms Credit Ratings of Sompo Seguros Mexico S.A. de C.V.
  • Corebridge, Equitable merge to create potential new annuity sales king
  • Aflac adds new long-term care rider
  • AM Best Affirms Credit Ratings of Nan Shan General Insurance Co., Ltd.
  • Corebridge Financial and Equitable Holdings Announce Transformational Merger
More Life Insurance News

- Presented By -

Top Read Stories

More Top Read Stories >

NEWS INSIDE

  • Companies
  • Earnings
  • Economic News
  • INN Magazine
  • Insurtech News
  • Newswires Feed
  • Regulation News
  • Washington Wire
  • Videos

FEATURED OFFERS

Elevate Your Practice with Pacific Life
Taking your business to the next level is easier when you have experienced support.

Your Cap. Your Term. Locked.
Oceanview CapLock™. One locked cap. No annual re-declarations. Clear expectations from day one.

Ready to make your client presentations more engaging?
EnsightTM marketing stories, available with select Allianz Life Insurance Company of North America FIAs.

Unlock the Future of Index-Linked Solutions
Join industry leaders shaping next-gen index strategies, distribution, and innovation.

Press Releases

  • Insurate expands workers’ comp into: CA, FL, LA, NC, NJ, PA, VA
  • LifeSecure Insurance Company Announces Retirement of Brian Vestergaard, Additions to Executive Leadership
  • RFP #T02226
  • YourMedPlan Appoints Kevin Mercier as Executive Vice President of Business Development
  • ICMG Golf Event Raises $43,000 for Charity During Annual Industry Gathering
More Press Releases > Add Your Press Release >

How to Write For InsuranceNewsNet

Find out how you can submit content for publishing on our website.
View Guidelines

Topics

  • Advisor News
  • Annuity Index
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • From the Field: Expert Insights
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Magazine
  • Insiders Only
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Washington Wire
  • Videos
  • ———
  • About
  • Meet our Editorial Staff
  • Advertise
  • Contact
  • Newsletters

Top Sections

  • AdvisorNews
  • Annuity News
  • Health/Employee Benefits News
  • InsuranceNewsNet Magazine
  • Life Insurance News
  • Property and Casualty News
  • Washington Wire

Our Company

  • About
  • Advertise
  • Contact
  • Meet our Editorial Staff
  • Magazine Subscription
  • Write for INN

Sign up for our FREE e-Newsletter!

Get breaking news, exclusive stories, and money- making insights straight into your inbox.

select Newsletter Options
Facebook Linkedin Twitter
© 2026 InsuranceNewsNet.com, Inc. All rights reserved.
  • Terms & Conditions
  • Privacy Policy
  • InsuranceNewsNet Magazine

Sign in with your Insider Pro Account

Not registered? Become an Insider Pro.
Insurance News | InsuranceNewsNet