Vernier Networks Inc.
Adaptive Security Platform 1.0
As increased device and user mobility dissolve the network perimeter as we know it, the need to provide at-connection system and user verification and validation is imperative. With a powerful combination of user, traffic and endpoint controls, Vernier Networks Adaptive Security Platform 1.0 stood tall as the winner in a formidable field of entries.
With ASP 1.0, Vernier (www.verniernetworks.com) has leveraged its experience in providing admission controls to wireless networks and increased the functionality and performance to encompass and protect wired clients as well. Authentication controls ensure that only known users can access permitted resources. A framework to leverage third-party tools for vulnerability assessment and remediation maintains a level of assurance that client machines are not malware-infected. In-line scans identify attack patterns in network traffic and automatically quarantine the offending host until the problem is addressed.
ASP 1.0 does not require an endpoint agent and will therefore support any networked device, maintaining quarantine until identity and system status are confirmed.
With an eye to the future, Vernier has partnered with Microsoft Corp. to support the latters nascent Network Access Protection technology.
Mazu Networks Inc.
Mazu Profiler 5.0
With its intelligent networkwide behavioral detection capabilities and its easily scalable hardware architecture, the Mazu Profiler 5.0 differentiates itself from the plethora of available intrusion prevention devices.
Profiler uses behavioral heuristics to protect networks against zero-day attacks. Through constant dynamic network base lining and the reliance on multiple traffic profiles for different time scenarios, Profiler greatly reduces the incidence of false positives. And mitigation planning tools allow administrators to gauge a remediation plans impact on normal network performance—before inadvertently causing other problems.
More information is at www.mazu.com.
Teros 200 5.0
Web application firewalls provide the deepest layers of protection for Web servers and Web applications against all manner of Web- and database-specific attacks. Teros (www.teros.com)Teros 200 stands out for its fine zero-day defenses and HTTP protocol defenses.
In addition to protecting against attacks, the Teros 200 monitors protocol conformance to avoid new plagues. With its accelerated SSL (Secure Sockets Layer) decryption technology, the Teros 200 can analyze and filter encrypted traffic as well.
The Teros 200 features redundant components to maximize system uptime, and it can protect as many as 20 Web servers from attacks, Web site defacement and information leakage.
Excellence Awards Winners and Finalists:
- Analytics & Reporting
- Application Development
- Business Integration Systems
- Business Relationship Management
- Desktop & Mobile Hardware
- E-Business Foundations
- E-Mail Management & Security
- Enterprise Collaboration & Messaging
- Enterprise Storage Hardware
- Enterprise Storage Software
- IT Quality Assurance Tools
- Productivity Applications
- Server Hardware
- Networking & Management Tools
- Networking Infrastructure
- System & Application Management
- Authentication & User Management
- Network Data-Stream Protection
- Vulnerability Assessment & Remediation