Contents Years, a Majority of IT Security Pros the Judges
Total Page:16
File Type:pdf, Size:1020Kb
2013 SC Awards U.S. Optimistic despite threats When it comes to data protection and risk management planning, informa- tion security professionals are feeling more hopeful than ever. According to our annual “Guarding Against a Data Breach” survey, compared to previous Contents years, a majority of IT security pros The Judges .............................................................................. 54 say their organizations are taking ap- The Sponsors .......................................................................... 55 propriate steps to protect critical data. Word from the co-chair ........................................................... 56 As promising as this feedback is, one has to juxtapose it against the less Reader Trust Awards upbeat happenings of our collective Best Anti-Malware Gateway ................................................... 56 reality. For starters, advanced persistent threats (APTs) and Best Cloud Computing Security ............................................ 57 other more methodical and sophisticated cyber crime attacks Best Computer Forensic Tool ................................................. 57 Best Data Leakage Prevention (DLP) .................................... 58 are becoming the norm, according to most experts. Just look to Best Database Security Solution .......................................... 58 the recent attacks against The New York Times, Twitter or the Best Email Security Solution .................................................. 59 U.S. Department of Energy to get a sense of things to come. Best Enterprise Firewall .......................................................... 59 Internet-based thieves aren’t as easy to catch in the act or stop Best Fraud Prevention Solution.............................................. 60 altogether nowadays, which means organizations have to stop Best Identity Management Application ................................. 60 Best IDS/IPS Product ..............................................................61 relying on traditional network protections alone and step up Best IPsec/SSL VPN ................................................................61 their games with advanced monitoring techniques, application Best Managed Security Service ............................................. 62 and other endpoint controls, better security awareness training Best Mobile/Portable Device Security .................................. 62 and more. Because spear phising, custom malware and targeted Best Multifactor Product ........................................................ 63 attacks are happening at a rate never witnessed before, a data- Best NAC product ................................................................... 63 Best Policy Management Solution ......................................... 64 centric approach to security now is vital, say experts. Best SIEM Appliance............................................................... 64 And most security pros have to achieve this desired end Best UTM Security .................................................................. 65 with fl at budgets. I suppose, though, it’s telling that CISOs Best Vulnerability Management Tool ..................................... 65 generally are upbeat despite myriad problems. Improving risk Best Web Application Firewall ................................................ 66 management plans, bettering policies, strengthening training Best Web Content Management Product.............................. 66 and bolstering controls, along with constantly educating C-level Excellence Awards executives about data security being a necessary part of day-to- Best Customer Service ........................................................... 67 day activities, are all recurring duties. Yet, survey respondents – Best Emerging Technology ..................................................... 67 Best Enterprise Security Solution ..........................................68 SC Magazine readers – are at the ready to tackle these seemingly Best Regulatory Compliance Solution ...................................68 endless challenges with zeal. And, for a fortunate growing Best Security Company ..........................................................69 number, undertaking them deftly is paying off as more CEOs Best SME Security Solution ................................................... 69 Feb. 26, 2013 • San Francisco and other business leaders register understanding and embrace Rookie Security Company of the Year.................................... 70 IT security for what it is – a necessary pillar of good business. Professional Awards It’s that passion and commitment that drives us every year to Best Cyber Security Higher Education Program .................. 70 celebrate these industry leaders, their many achievements and Best Professional Certifi cation Program ................................ 71 the varied contributions they make without hesitation to help Best Professional Training Program ........................................71 advance this essential and vibrant industry. Congratulations to Best Security Team ..................................................................72 CSO of the Year ........................................................................72 you all. – Illena Armstrong, VP, editorial, SC Magazine Editor’s Choice Award ..............................................................73 EDITORIAL DESIGN AND PRODUCTION U.S. SALES SALES/EDITORIAL ASSISTANT Roo Howar (646) 638-6104 VP, EDITORIAL Illena Armstrong ART DIRECTOR Michael Strong VP, SALES ACCOUNT EXECUTIVE, LICENSING EXECUTIVE EDITOR Dan Kaplan VP AUDIENCE DEVELOPMENT & David Steifman (646) 638-6008 AND REPRINTS Elton Wong MANAGING EDITOR Greg Masters OPERATIONS John Crewe REGIONAL SALES DIRECTOR AUDIENCE DEVELOPMENT DIRECTOR PRODUCTION MANAGER Mike Shemesh (646) 638-6016 Sherry Oommen 2013 SC AWARDS U.S. Krassi Varbanov WEST COAST SALES DIRECTOR Matthew Allington (415) 346-6460 MANAGEMENT EVENTS DIRECTOR Natasha Mulla EVENT SALES DIRECTOR CEO OF HAYMARKET MEDIA EVENTS COORDINATOR Maggie Keller Mike Alessie (646) 638-6002 Lee Maniscalco SENIOR EVENTS COORDINATOR ACCOUNT MANAGERS EXECUTIVE VICE PRESIDENT Anthony Curry Dennis Koster, Samantha Amoroso Tony Keefe 2013 SC AWARDS U.S. 53 2013 SC Awards U.S. 2013 SC Awards U.S. The Judges The Sponsors SC Magazine would like to thank all of our sponsors for their generous support of the 2013 SC Awards U.S. Their involvement has made this event possible, which helps raise professional standards in the information security industry worldwide. Bradford Networks Imperva Bradford Networks enables secure Imperva provides a comprehensive Co-Chair Co-Chair Philip agcaoili rebecca Bace Jennifer Bayuk Bruce Bonsall Dennis Brixius network access for corporate-issued solution for monitoring and con- illena armstrong rich Baich CISO, Cox CEO, Infidel principal, Jennifer senior security VP and CSO, The and personal mobile devices. trolling all data usage and business VP, editorial, CISO, Communications L. Bayuk LLC strategist, BT US&C McGraw-Hill Cos. SC Magazine Wells Fargo transactions across the data center. Champlain College Qualys Champlain College has been provid- Qualys is a leading provider of Leahy Center for Digital Investigation at ing education in the fi eld of digital cloud security and compliance solu- forensics and cyber security for more tions with more than 6,000 custom- than six years. ers in more than 100 countries. CipherCloud Schwartz MSL CipherCloud provides cloud encryp- Schwartz MSL helps technology tion and tokenization gateways to companies leverage public relations Chris Camacho Jaime Chanaga rafael Diaz rick Doten Gene Fredriksen Stephen Fridakis Pamela Fusco enable organizations to securely to create visibility and tell their information security CEO, CSO, Department CISO, global CISO, senior IT officer, director/CISO, adopt cloud applications. innovative story. officer, The CSO Board of Central Manage- DMI Enterprise Tyco International FAO Apollo Group The World Bank ment Services, state Transformation of Illinois Entrust Solutionary Entrust secures governments, Solutionary reduces the information enterprises and fi nancial institutions security and compliance burden, in more than 5,000 organizations providing fl exible managed security spanning 85 countries. and compliance services. ForeScout Technologies Splunk ForeScout enables organizations to Splunk software collects, accelerate connectivity by allowing indexes and harnesses the machine- users to access network resources generated big data coming from the John Johnson Cedric Leighton Yonesy Nunez Jim reavis ariel Silverstone Ward Chenxi Wang without compromising security. devices that power business. senior security colonel, USAF SVP, Citi executive director, CISO, Spangenberg vice president, program manager, (Ret.); founder and Cloud Security self-employed director, information Forrester Research Halon Symantec John Deere president, Cedric Alliance security, pearl.com Halon Security is a prominent Symantec is a global leader in Leighton Associates technology leader of email security security, backup and availability and fi rewalls, protecting millions of solutions. users worldwide. HP Enterprise Security West Coast Labs HP Enterprise Security provides West Coast Labs is a leader in in- information security solutions to dependent testing, certifi cation and protect the hybrid enterprise. real-time performance validation for information security products. Larry Whiteside Spencer