Wednesday, December 12, 2012

SC Magazine Awards 2013 - US



SC Magazine US  has announced their finalists for their SC Magazine Awards  2013. The major categories are Readers Trust, Excellence Awards, and Professional Awards.  Print subscribers to SC Magazine get to vote on the Readers Trust awards. A panel of judges are responsible for the Excellence and Professional Awards.  The winners will be announced at the 2013 SC Awards U.S. to be held on Feb. 26, 2013 in San Francisco during RSA 2013.  These awards aren’t part of RSA 2013 San Francisco.  Companies like to win these awards. It gives them recognition and bragging rights. Smaller companies, in particular like the visibility this gives them.  Larger companies will sometimes “argue” that there’s little upside for them to participate, since if they don’t receive an award, or become a finalist,  they lose out, with little upside if they become a finalist or win.  No risk, no reward!



Readers Trust Finalists SC Magazine Awards 2013

Best Anti-Malware Gateway

  •     Dell SonicWALL for Dell SonicWALL TZ 215
  •     McAfee for McAfee Web Protection
  •     Symantec for Symantec Web Gateway
  •     Trustwave for SecureWeb Gateway
  •     Websense for Websense TRITON Security Gateway Anywhere


Best Enterprise Firewall

  •     AT&T for AT&T Network-Based Firewall
  •     Check Point Software Technologies for Check Point R75.40
  •     Dell SonicWALL for Dell SonicWALL SuperMassive E10800
  •     Fortinet for FortiGate-800C
  •     Sourcefire for Sourcefire Next-Generation Firewall (NGFW)


Best Mobile/Portable Device Security

  •     AirWatch for AirWatch MDM/MCM/MAM
  •     AVG for AVG AntiVirus FREE for Android
  •     Marble Cloud for Marble Access
  •     Sophos for Sophos Mobile Control 2.5
  •     Symantec for Symantec Mobile Management Suite


Best Vulnerability Management Tool

  •     GFI Software for GFI LanGuard 2012
  •     Qualys for QualysGuard Vulnerability Management
  •     Rapid7 for Rapid7 Nexpose Enterprise
  •     Tenable Network Security for SecurityCenter
  •     Trustwave for TrustKeeper Vulnerability Manager


Best Cloud Computing Security

  •     IBM for IBM Cloud Security Solutions
  •     Juniper Networks for vGW Virtual Gateway
  •     Sophos for Sophos SafeGuard 6
  •     Symantec for Symantec O3 Cloud Identity and Access Control
  •     Trend Micro for Trend Micro Deep Security 9
  •     Websense for Websense TRITON Enterprise


Best Fraud Prevention Solution

  •     CA Technologies for CA RiskMinder
  •     Entrust for Entrust TransactionGuard
  •     RSA, the security division of EMC, for RSA Adaptive Authentication
  •     Symantec for Symantec Code Signing
  •     Trusteer for Trusteer Pinpoint


Best Multifactor Product

  •     CA Technologies for CA AuthMinder
  •     Entrust for Entrust IdentityGuard
  •     PhoneFactor for PhoneFactor
  •     RSA, the security division of EMC, for RSA SecurID
  •     Symantec for Symantec VIP


Best Web Application Firewall

  •     Barracuda Networks for Barracuda Web Application Firewall
  •     Dell SonicWALL for Dell SonicWALL SRA Web Application Firewall Service
  •     Fortinet for FortiWeb-400C
  •     IBM for IBM Security Network IPS/Network Protection
  •     Imperva for SecureSphere Web Application Firewall


Best Computer Forensic Tool

  •     AccessData Group for Forensic Toolkit (FTK)
  •     FireEye for FireEye Malware Analysis System
  •     Guidance Software for EnCase
  •     RSA, the security division of EMC, for RSA NetWitness
  •     Websense for Websense Cyber Security Intelligence On-Demand


Best Identity Management Application

  •     CA Technologies for CA IdentityMinder
  •     Centrify for Centrify Suite 2012
  •     Cyber-Ark Software for Privileged Identity Management Suite
  •     IBM Software Group for IBM Security Identity Manager
  •     NetIQ for NetIQ Identity Manager 4


Best NAC product

  •     Bradford Networks for Network Sentry
  •     ForeScout Technologies for ForeScout CounterACT
  •     StillSecure for StillSecure Safe Access
  •     Trustwave for Trustwave NAC


Best Web Content Management Product 

  •     Barracuda Networks for Barracuda Web Security
  •     EdgeWave for iPrism Web Security
  •     Websense for Websense Web Security Gateway Anywhere


Best Data Leakage Prevention (DLP) 

  •     Dell SonicWALL for Dell SonicWALL E-Class Network Security Appliance (NSA) 8510
  •     Identity Finder for Identity Finder
  •     RSA, the security division of EMC, for RSA DLP
  •     Symantec for Symantec Data Loss Prevention
  •     Trend Micro for Trend Micro Integrated Data Loss Prevention 
  •    Websense for Websense Data Security Suite


Best Intrusion Detection System/Intrusion Prevention System (IDS/IPS) Product

  •     Check Point Software Technologies for Check Point IPS Software Blade
  •     Dell SonicWALL for Dell SonicWALL SuperMassive E10200
  •     HP for HP TippingPoint S7100NX Next Generation Intrusion Prevention System (IPS)
  •     IBM for IBM Security Network IPS / Network Protection
  •     Sourcefire for Sourcefire Next-Generation IPS (NGIPS)


Best Policy Management Solution

  •     IBM for IBM Endpoint Manager
  •     NetIQ for NetIQ Secure Configuration Manager
  •     SolarWinds for SolarWinds Network Configuration Manager (NCM)
  •     Tripwire for Tripwire Enterprise 8.2


Best Database Security Solution

  •     DB Networks for Adaptive Database Firewall
  •     BeyondTrust for PowerBroker Database - Monitor & Audit
  •     IBM for IBM InfoSphere Guardium
  •     Imperva for Imperva SecureSphere
  •     McAfee for McAfee Database Security Solution


Best IPsec/SSL VPN

  •     Barracuda Networks for Barracuda SSL VPN
  •     Dell SonicWALL for Dell SonicWALL Aventail E-Class SRA EX9000
  •     HOB for HOB RD VPN blue edition
  •     Juniper Networks for MAG Series Junos Pulse Gateways
  •     NCP Engineering for NCP Secure Enterprise Management 3.0


Best Security Information/Event Management (SIEM) Appliance 

  •     HP for ArcSight Express
  •     IBM Software Group for QRadar SIEM
  •     LogRhythm for LogRhythm
  •     NetIQ for NetIQ Sentinel 7
  •     SolarWinds for SolarWinds Log & Event Manager (LEM)
  •     Splunk for Splunk Enterprise


Best Email Security Solution

  •     Barracuda Networks for Barracuda Email Security
  •     McAfee for McAfee Email Protection
  •     Proofpoint for Proofpoint Enterprise Protection/Proofpoint Enterprise Privacy
  •     Symantec for Symantec Messaging Gateway
  •     Websense for Websense Email Security Gateway Anywhere


Best Managed Security Service

  •     Dell SecureWorks for Dell SecureWorks Managed Security Services
  •     IBM for IBM Managed Security Services
  •     MANDIANT for MCIRT Managed Defense
  •     Verizon Business for Managed Security Services - Commercial
  •     Verisign for Verisign MalDetector Service


Best UTM Security

  •     Check Point Software Technologies for Check Point 2200 and 4000 Series Appliances
  •     Dell SonicWALL for Dell SonicWALL TZ 215
  •     Fortinet for FortiGate-100D
  •     Sophos for Sophos UTM 9
  •     Symantec for Symantec Endpoint Protection

 Excellence Awards SC Magazine Awards 2013

Best Emerging Technology

  •     Black Lotus for Human Behavior Analysis
  •     CipherCloud for CipherCloud Gateway
  •     CloudPassage for CloudPassage Halo
  •     Microsoft for Enhanced Mitigation Experience Toolkit (EMET) 3.0
  •     Pindrop Security for Fraud Detection System
  •     Webroot Software for Webroot SecureAnywhere Business - Endpoint Protection



Best SME Security Solution

  •     AirWatch for AirWatch MDM/MCM/MAM
  •     Kaspersky Lab Americas for Kaspersky Endpoint Security for Windows Workstations
  •     Qualys for QualysGuard Express
  •     Sophos for Sophos UTM 9
  •     SpectorSoft for SPECTOR 360


Best Enterprise Security Solution

  •     CA Technologies for CA Technologies Content-Aware Identity and Access Management Suite
  •     FireEye for FireEye Malware Protection System
  •     Qualys for QualysGuard Enterprise
  •     Sourcefire for Sourcefire Next-Generation IPS (NGIPS)
  •     Tenable Network Security for SecurityCenter
  •     Varonis Systems for Varonis Data Governance Suite


Best Regulatory Compliance Solution

  •     Agiliance for Agiliance RiskVision with Agiliance Compliance Manager Application
  •     Qualys for QualysGuard Policy Compliance
  •     RSA, the security division of EMC, for RSA Archer eGRC
  •     Symantec for Symantec Control Compliance Suite 11
  •     Websense for Websense Data Security Suite

Best Customer Service

  •     Barracuda Networks for Barracuda Customer Service and Support
  •     ESoft for eSoft Customer Support
  •     Kaspersky Lab Americas for Kaspersky Business Products
  •     Qualys for Qualys
  •     Vanguard Integrity Professionals for Vanguard Customer Service

  
Best Security Company 

  •     Cyber-Ark Software
  •     Dell SonicWALL
  •     MANDIANT
  •     Sophos
  •     Sourcefire
  •     Verizon


Rookie Security Company of the Year

  •     Appthority
  •     Pindrop Security
  •     Seculert
  •     Vaultive
  •     viaForensics


 Professional Awards - SC Magazine Awards 2013

Best Cyber Security Higher Education Program

  •     Champlain College for Computer Forensics & Digital Investigation Degree Programs
  •     Iowa State University for Cyber Security Education Program
  •     Kennesaw State University for Bachelor of Business Administration in Information Security and Assurance (BBA-ISA)
  •     University of Maryland University College for Cyber Security Degrees and Certificate Program


Best Professional Certification Program

  •     GIAC - Global Information Assurance Certification for GIAC Security Expert (GSE)
  •     GIAC - Global Information Assurance Certification for GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)
  •     Information System Audit and Control Association for CRISC (Certified in Risk and Information Systems Control)
  •     Information System Audit and Control Association for CISM (Certified Information Security Manager)
  •     Information System Audit and Control Association for CISA (Certified Information Systems Auditor)


Best Professional Training Program

  •     Guidance Software for Guidance Software Training
  •     Inspired eLearning for Security Awareness Training
  •     (ISC)2 for The (ISC)2 Education Program
  •     Secure Ninja for SecureNinja Cyber Security Training Program
  •     The SANS Institute for SANS Training


Best Security Team

  •     godaddy.com for Go Daddy Security Team
  •     Teleperformance Group for Teleperformance Security Team
  •     U.S. Department of Homeland Security for ICS-CERT Security Team
  •     Verizon Business for Verizon RISK Team


CSO of the Year

  •     Bobby Dominguez, director, IT security & GRC, PSCU Financial Services
  •     Nikk Gilbert, vice president & chief information security officer, CUNA Mutual Group
  •     John South, CSO, Heartland Payment Systems
  •     Bruce Wignall, CISO, Teleperformance Group





What Readers Trust Awards Mean for the Recipients 

  •  Third party validation by a leading dedicated security company
  •  Third party validation by peers
  • Marketing/promotional rights for a year, subject to licensing
  • A number of potential marketing/branding/lead generation opportunities for the recipients




For details on the judging process for SC Magazine Awards 2013, go to


  
To See Who Won in 2012, Go To



Thursday, December 06, 2012

Why Lawyers Aren't on Many Book Best Seller Lists



 For want of a handful of periods,clarity was lost.   Sentence length - around 65. Ouch. Enough said.  Legal jargon can be trying to read. From a press release  Kind of makes licensing agreements seem friendly in comparison. Or  ads for pharmaceuticals.
It may  have been a dark and stormy night when this was written or perhaps, "It was the best of times, it was the worst of times, it was the age of wisdom, it was the age of foolishness, but  the press release had to go out with proper disclosures."

John Grisham, where are you when we need you?

This press release contains forward-looking statements within the Private Securities Litigation Reform Act of 1995.  Words such as “expects,” “outlook”, “expectation,” “intends,” “assumes,” “believes” and “estimates,” variations of such words and similar expressions are also intended to identify forward-looking statements.  These forward-looking statements involve risks and uncertainties that could cause actual results to differ materially from those contemplated herein.  Factors that could cause or contribute to such differences include but are not limited to: changes in the company’s growth strategies; changes in the company’s future prospects, business development, results of operations and financial condition; changes to the online and computer threat environment and the endpoint security industry; competition from local and international companies, new entrants in the market and changes to the competitive landscape; the adoption of new, or changes to existing, laws and regulations; flaws in the assumptions underlying the calculation of the number of the company’s active users; the termination of or changes to the company’s relationships with its partners, including Google, and other third parties; changes in the company’s and its partners’ responses to privacy concerns; the ability of the company to successfully diversify its portfolio of search partners; the company’s plans to launch new products and online services and monetize its full user base; the company’s ability to attract and retain active and subscription users; the company’s ability to retain key personnel and attract new talent; the company’s ability to adequately protect its intellectual property; flaws in the company’s internal controls or  IT systems; the company’s geographic expansion plans; the anticipated costs and benefits of the company’s acquisitions; the outcome of ongoing or any future litigation or arbitration, including litigation or arbitration relating to intellectual property rights; the company’s legal and regulatory compliance efforts; and worldwide economic conditions and their impact on demand for the company’s products and services. Given these risks and uncertainties, you should not place undue reliance on these forward-looking statements.

Below are a number of formulas that calculate readability of text.  

Readability Formula
Grade
32.5
37.4
17.9
24.8
38.2
Avg Grade Level
30.2

Text Statistics

Avg sentence length 65
Character Count
1,871
Syllable Count
627
Word Count
327
Sentence Count