Network Data-Stream Protection
As increased device and user mobility dissolve the network perimeter as we know it, the need to provide at-connection system and user verification and validation is imperative.WINNER Vernier Networks Inc.
Adaptive Security Platform 1.0 As increased device and user mobility dissolve the network perimeter as we know it, the need to provide at-connection system and user verification and validation is imperative. With a powerful combination of user, traffic and endpoint controls, Vernier Networks Adaptive Security Platform 1.0 stood tall as the winner in a formidable field of entries.
For a list of all the winners and finalists of the fifth annual eWEEK Excellence Awards, click here.
Mazu Profiler 5.0 With its intelligent networkwide behavioral detection capabilities and its easily scalable hardware architecture, the Mazu Profiler 5.0 differentiates itself from the plethora of available intrusion prevention devices. Profiler uses behavioral heuristics to protect networks against zero-day attacks. Through constant dynamic network base lining and the reliance on multiple traffic profiles for different time scenarios, Profiler greatly reduces the incidence of false positives. And mitigation planning tools allow administrators to gauge a remediation plans impact on normal network performancebefore inadvertently causing other problems. More information is at www.mazu.com. Teros Inc.
Teros 200 5.0 Web application firewalls provide the deepest layers of protection for Web servers and Web applications against all manner of Web- and database-specific attacks. Teros (www.teros.com)Teros 200 stands out for its fine zero-day defenses and HTTP protocol defenses. In addition to protecting against attacks, the Teros 200 monitors protocol conformance to avoid new plagues. With its accelerated SSL (Secure Sockets Layer) decryption technology, the Teros 200 can analyze and filter encrypted traffic as well. The Teros 200 features redundant components to maximize system uptime, and it can protect as many as 20 Web servers from attacks, Web site defacement and information leakage. Excellence Awards Winners and Finalists: