Beruflich Dokumente
Kultur Dokumente
Contents
Global Megatrends in Cybersecurity,
conducted by Ponemon Institute,
78 percent of senior IT leaders Judges........................................................................................ 2
responding say they hadnt briefed Sponsors.................................................................................... 3
their boards on corporate IT security Welcome from the co-chairman............................................... 4
strategies in the last year. Reader Trust Awards
The executives and directors should be better informed Best Advanced Persistent Threat (APT) Protection................ 4
because breaches are not only an expense to operations, but a Best Cloud Computing Security Solution................................ 5
threat to their business. No board wants to see their company Best Computer Forensic Solution............................................. 5
Best Data Leakage Prevention (DLP) Solution........................ 6
in the headlines as a consequence of an attack and subsequent
Best Database Security Solution.............................................. 6
loss of data. While not easy to calculate, brand damage can have Best Email Security Solution..................................................... 7
a devastating impact on an operation witness the fallout to Best Fraud Prevention Solution................................................ 7
just a recent spate of victims: Anthem, JPMorgan Chase, Sony, Best Identity Management Solution......................................... 8
Target, Home Depot. Best Managed Security Service................................................ 8
Yet the necessity to find more pros armed with both business Best Mobile Security Solution................................................... 9
and IT security acumen is hitting at the same time that most in Best Multifactor Solution........................................................... 9
Best NAC Solution................................................................... 10
the IT security arena are acknowledging a soon-to-be desperate
Best Risk/Policy Management Solution................................. 10
shortage of pros to hire. Combine this with a consistently high Best SIEM Solution................................................................... 11
turnover rate of qualified personnel and this challenge to build Best UTM Security Solution..................................................... 11
more solid and expert teams becomes even more complex. Best Vulnerability Management Solution............................... 12
SC Awards U.S. strives to help here by acknowledging the Best Web Application Solution................................................ 12
indefatigable efforts of IT security practitioners, as well as the Best Web Content Management Solution.............................. 13
rookie and long-standing product and service providers that Excellence Awards
support risk management plans and everyday endeavors by call- Best Customer Service............................................................ 13
ing out outstanding achievements. In June, the SC Awards U.K. Best Emerging Technology....................................................... 14
will be doing the same for organizations and IT security leaders Best Enterprise Security Solution............................................ 14
in Great Britain and Europe. Best Regulatory Compliance Solution.................................... 15
Best Security Company........................................................... 15
Its a small contribution weve been making to the industry
Best SME Security Solution.................................................... 16
for nearly 20 years that enables us to draw attention to IT secu-
Rookie Security Company of the Year.................................... 16
rity and its leading players. This weeks SC Awards gala in San
Francisco and the other fast-approaching in the U.K. will Professional Awards
show IT security pros like you some love. Survey results show Best Cybersecurity Higher Education Program...................... 17
Best Professional Certification Program................................. 17
yall could use some. Meantime, I welcome your suggestions
Best IT-Security-related Training Program............................. 18
on other categories we can consider adding to our SC Awards Best Security Team.................................................................. 18
programs. CSO of the Year........................................................................ 19
Illena Armstrong, VP, editorial, SC Magazine Editors Choice......................................................................... 19
CO-CHAIR CO-CHAIR Becky Bace Rich Baich Ron Baklarz Stephanie Miki Calero
Illena Armstrong Greg Bell chief strategist, Center EVP/CISO, enter- CISO, export control Balaouras CISO, state of Ohio
VP, editorial, principal, KPMG and for Forensics, Infor- prise technology compliance officer, VP and research
SC Magazine U.S. leader, KPMG mation Technology & services, Wells Fargo AMTRAK director, security and
Cyber Security, University of & Company risk, Forrester
South Alabama
Chris Camacho Troy Donnelly Thomas Dunbar Patty Edfors Mike Fabrico Pamela Fusco Zouhair Guelzim
SVP/global informa- global head of SVP, chief informa- VP, information secu- principal systems CISO, Apollo Group CISO, LOral USA
tion security, Bank of information security, tion risk officer, XL rity and compliance, security specialist,
America WorleyParsons Global Services Sirius XM Radio NASDAQ
Michael Higgins John Johnson Phil Lambert Bob Maley Bill Malik Scott Pearce Jim Routh
CISO, NBC global security associate director, founder & principal, CEO and founder, CISO, Frederick CISO, Aetna
Universal strategist, John Deere network security ar- Strategic CISO Malik Consulting County Government
chitecture, Starwood
Hotels & Resorts
Worldwide
Randy Sanovic Kurt Sauer Howard Schmidt Richard Starnes Richard Stiennon Jody Westby Larry Whiteside Jr.
owner, RNS director, governance partner, Ridge CISO, Kentucky chief research analyst, CEO, Global CISO, Lower Colo-
Consulting and operations, Schmidt Cyber Health Cooperative IT-Harvest Cyber Risk rado River Authority
Paypal
SC Magazine thanks all sponsors for their generous support of the 2015 SC Awards U.S.
Their involvement has made possible this event, which helps raise professional standards
in the information security industry worldwide.
Barracuda MSLGROUP
barracuda.com mslgroup.com
Barracuda provides cloud-connected MSLGROUP is Publicis Groupes
security and storage solutions that strategic communications and
simplify IT. engagement group, advisers in all
aspects of communication strategy.
ForeScout Qualys
forescout.com qualys.com
ForeScout enables organizations to Qualys is a leading provider of cloud
continuously monitor and mitigate security and compliance solutions
security exposures and cyberattacks. with more than 6,700 customers in
more than 100 countries.
LogRhythm Veracode
logrhythm.com veracode.com
LogRhythm empowers organizations Veracodes cloud-based service and
around the globe to rapidly detect, programmatic approach deliver a
respond to and neutralize damaging simpler and more scalable solution for
cyberthreats. reducing global application-layer risk.
WINNER an existing security framework WINNER has been our workhorse for sev-
Blue Coat Systems and scale on-demand to sup- AccessData Group eral releases. It always has pro-
for Blue Coat Cloud port new user requirements. for Forensic Toolkit (FTK) vided the power we need and
Security Solution Blue Coats Cloud Web the speed that makes processing
Security Service provides Forensic Toolkit (FTK) is large cases practical. FTK
Blue Coats cloud-based proactive web protection to or- recognized around the world as differs from the competition for
services allow enterprises to ganizations of all sizes without a leading standard in com- several reasons, including its
enhance employee productivity updating appliances, servers puter forensics software. It is a database-drive design, interop-
and deliver cost savings by re- or user desktops meaning no court-cited digital investigations erability with other AccessDatas
moving the need of on-premise disruption to the normal work platform built for speed, stabil- solutions, its data processing
hardware and software. Blue day. It uses Blue Coat Web- ity and ease of use. It provides speed, its ability to remotely
Coat safeguards the processing Pulse, which integrates threat comprehensive processing and analyze and acquire computers,
of an organizations data across intelligence data from more indexing up front, so filtering as well as the fact that it can be
all its cloud service offer- than 75 million end-users to and searching is faster than with expanded to include malware
ings. As with the Industrial create a collaborative defense any other product. This means analysis. Because its database-
Revolution, cloud computing mechanism ensuring real-time users can zero in on the relevant driven, users can avoid the
or software-as-a-service (SaaS), protection against threats. evidence quickly, dramatically frequent crashing and lost work
has accelerated information With extensive web ap- increasing their analysis speed. associated with memory-based
consumption and impacted the plication controls and detailed The database-driven, enterprise- tools. It provides the most com-
speed of innovation. reporting features, administra- class architecture allows users prehensive processing at speeds
Today, the cloud has also tors can create and enforce to handle massive data sets, as it that are unmatched by other
enabled the enterprise to policies that are instantly provides stability and processing solutions. Clients have reported
extend its corporate security applied to all covered users, speeds not possible with other their ability to comprehensively
perimeter to all devices in any including fixed locations and tools. Because of this architec- process more than a terabyte
location and deliver the same roaming users. ture, FTK can be upgraded of complex data in 12 hours.
performance benefits as if it Blue Coat stands out be- easily to expand distributed Finally, the remote investigation
was on premise. Blue Coats cause of its combination of col- processing and incorporate web- capability, malware analysis and
Global Cloud Infrastructure laborative defense and security based case management and visualization tools make FTK a
provides fast, easy deployment technology, which empowers collaborative analysis. more comprehensive solution
and scalability so enterprises businesses to focus on other A First Look review in SC that enables a more efficient and
can seamlessly deploy it within revenue-generating projects. Magazine last year said, FTK thorough investigation process.
Finalists 2015
AccessData Group for Forensic
Toolkit (FTK)
FireEye for FireEye Network
Forensics Platform
Guidance Software for
EnCase Forensic
LogRhythm for LogRhythms
Network Monitor
Rapid7 for UserInsight
Finalists 2015
AirWatch by VMware for AirWatch Enterprise Mobility Management
Blue Coat Systems for Blue Coat Cloud Security Solution
Dell Software for Dell One Identity Cloud Access Manager
Juniper Networks for Firefly Perimeter
Trend Micro for Trend Micro Deep Security
WINNER security analytics and data theft WINNER encryption keys over the life of
General Dynamics Fidelis protection in a single, tightly in- HP Atalla for HP Enterprise the data. HP Secure Encryption,
Cybersecurity Solutions for tegrated system for continuous Secure Key Manager with combined with HP Smart Array
Fidelis XPS protection across the enterprise HP Secure Encryption controller-based data encryption
with maximum awareness of for HP ProLiant Gen 8/Gen 9
Data theft protection is a threats against corporate sensi- Many companies, especially servers, protects data at rest on
problem that requires aware- tive data, intellectual property, those subject to industry regula- bulk storage.
ness of the entire threat lifecycle business plans, etc. tions, require sensitive data to HP is a leading provider of
in order to stop data exfiltra- Fidelis XPS takes a unique be secured against threats like security and compliance solu-
tion at any phase that it occurs. approach to DLP by unifying unauthorized insider access, tions that mitigate risk for hy-
Fidelis XPS is a comprehen- advanced threat protection (the accidental disclosure and brid environments and defend
sive advanced threat defense attack mechanics), network theft. Auditors, regulators and against advanced threats. HP
solution that stops targeted security analytics (content-in- industry compliance mandates ESKM is designed as a fully
attacks and the resulting data fused metadata) and data theft often require encryption of integrated solution, supporting
theft across all phases of the protection into a single, tightly sensitive data at rest as a mini- a broader range of encryption
threat lifecycle, including initial integrated system for continu- mum standard of security best solutions than its competitors
infiltration via commodity or ous monitoring and protection practice. HP Enterprise Secure and scaling easily to eight-
advanced targeted malware, across the enterprise. Fidelis Key Manager (ESKM) provides node distributed geographic
command-and-control com- XPSs Deep Session Inspection a complete solution for unifying clusters for more than 20,000
munication, lateral propagation technology exposes, extracts and automating an organiza- enrolled clients and more than
and the resulting data exfiltra- and analyzes malware hidden tions encryption controls by two million keys. Additionally,
tion. Fidelis XPS is specifically in all network protocols, appli- securely creating, protecting, every ESKM release has been
designed to detect and prevent cations and content types. This serving, controlling and auditing validated to a FIPS 140-2 Level
threats against data loss by unparalleled visibility allows access to encryption keys. When 2 rating. Standard capabili-
monitoring network traffic for detection and prevention sensitive data at rest is encrypt- ties include high availability
including all protocols and across all phases of the threat ed, the risks of audit failures, clustering and failover, secure
applications with patented lifecycle. financial losses and damage to key database, key generation
Deep Session Inspection, pro- Additionally, Fidelis XPSs an organizations reputation are and retrieval services, identity
viding real-time, bi-directional flexible policy engine allows significantly reduced. Data at and access management, secure
protocol, application and security analysts to block data rest requires strong key manage- backup and recovery, a local
content decoding and analysis. exfiltration by configuring pro- ment practices with policy Certificate Authority and
Fidelis XPS combines advanced tection mechanisms to match enforcement to manage, protect, strong audit logging for com-
malware protection, network the organizations data profile. serve and preserve underlying pliance validation.
Finalists 2015
Barracuda for Barracuda
Email Security Service
Cisco for Cisco Email
Security Appliance
Intel Security for McAfee Email
Protection
Proofpoint for Proofpoint
Enterprise Protection/Privacy
Finalists 2015
Websense for Websense TRITON
AP-MAIL Entrust for Entrust TransactionGuard
F5 Networks for F5 WebSafe/MobileSafe
Kaspersky Lab for Kaspersky Fraud Prevention
RSA, the security division of EMC, for RSA Web Threat Detection
Splunk for Splunk Enterprise
WINNER user identities across physical, WINNER the customer network, often
CA Technologies for virtual and cloud environments. Dell SecureWorks for outperforming the signatures
CA Identity Manager Designed to be easy to use Managed Security Services from the device manufacturer.
and cost-effective, CA Identity Based on CTU intelligence
Users with excessive or Manager can help improve effi- The information security on emerging threats and
inappropriate privileges can ciency, security and compliance market is flooded with various information gathered from
potentially wreak havoc, throughout the enterprise. technology tools to protect a customer network changes,
including violating compliance CA Identity Manager pro- companys IT infrastructure Dell continually tunes man-
mandates or causing leakage of vides several utilities (PolicyX- from intrusions by threat aged devices.
confidential data. Automating press, ConfigXpress and Con- actors. But these are point Security is all Dell does.
processes for granting and veri- nectorXpress) to help simplify solutions and most companies Defending clients since March
fying application access based management and configura- that buy these new technolo- 1999, it supports clients in
on each users relationship and tion of its Identity Manager gies dont have the expertise more than 70 countries around
role within the organization environment. ConnectorXpress to operate them correctly. the world. Every call to its SOC
whether they are employees, lets customers build their own Dell SecureWorks man- is handled by one of its certi-
administrators, contractors, connectors to common types of ages and monitors security fied, experienced security pro-
customers or business partners applications without having to devices 24/7/365 for 3,800 fessionals. Dell leverages threat
improves IT flexibility. It also write code, and PolicyXpress clients globally. It is vendor intelligence that it has gathered
helps to improve operational allows configurations rather agnostic and can manage and from clients around the world,
efficiencies and reduce security than customizations to provide monitor most any device. Dell as well as intelligence it gath-
risks by on-boarding new users workflow and policy updates. is an extension of an organiza- ers from its targeted threat
faster and ensuring that all CA Identity Manager comes tions security team, filling hunting and IR services. What
users only have access that is ap- with a broad set of out-of-the- resource gaps and providing makes Dell different from
propriate to their job function. box connectors (40+) from recommendations and expert other MSS companies is that
CA Identity Manager pro- mainframe to SaaS applica- guidance based on its global clients hear from the company
vides the ability to manage and tions. The offering also pro- visibility into the threat land- as often as anything suspicious
govern user identities (including vides a mobile application (for scape. Using intelligence from gets through their networks.
shared, administrative accounts) iOS and Android) that enables its Counter Threat Unit (CTU) Dell puts its monitoring device
and answers the question, Who users and administrators to security research group on in prospects businesses for 30
has access to what? in a simple interface with a wide range of the latest exploits and attack days and have a feed going to
and cost-effective manner. CA identity management function- methods, its device engineers it while the client is still being
Identity Manager provides the ality from the convenience of a finetune signatures to maxi- monitored by its current MSS
ability to manage and govern mobile device. mize detection capabilities in company.
WINNER and encryption status within a WINNER popularity within the enterprise.
AirWatch by VMware centralized console. Adminis- RSA, the security division The RSA SecurID prod-
for Enterprise Mobility trators can maintain advanced of EMC, for RSA SecurID uct is a de facto standard for
Management encryption on all major devices authentication solutions. It has
and platforms, as well as enable In the data security industry more than 55 million users and
With the growing number of containerized encryption for today, the market needs are is present in 95 of the top 100
mobile devices used for work, content, applications and email. constantly evolving in response Fortune companies.
accessing corporate resources AirWatch stands out from to the changes in technol- What sets RSA apart is both
on-the-go can introduce a its competition because it has ogy and also to the IT threat the quality of the product
significant threat to enterprise the broadest and most flex- landscape. With the increas- and the flexibility of choice.
security. AirWatch by VMware ible mobile ecosystem of any ing number of data breaches, Offering a wide range of
Enterprise Mobility Manage- solution on the market. With expanding threat surfaces authenticator options, including
ment enables businesses to a fully integrated enterprise and an expanding number of hardware and software tokens,
address challenges associated mobility management (EMM) devices and users that are ac- on-demand (SMS) and risk-
with mobility by providing suite, including MAM, MDM cessing data, it is a crucial time based (risk score determined
a simplified, efficient way to and MCM, AirWatch offers for organizations to ensure they by user behavior), the SecurID
view and manage all enterprise the most robust feature set to are properly protecting users solution is designed to meet any
devices. With AirWatch, organi- its customers. Cross-platform beginning with identity and business use case. Addition-
zations can manage a diverse support is provided for all major access management. ally, unlike many competitors
fleet of devices. AirWatch mobile and laptop platforms. The RSA SecurID solution which use event-based tokens,
ensures mobility deployments AirWatch is designed to inte- protects user identities, devices RSA authenticators leverage
are secure and corporate grate with most existing corpo- and applications by using a the AES-128 algorithm and are
information is protected with rate infrastructure, streamlin- unique symmetric key com- time synchronous they rely
end-to-end security for users, ing the deployment process bined with a proven algorithm on a time window that closes
devices, applications, content, and management of devices. to generate a one-time password after 60 seconds, minimizing
data, email, networks and more. AirWatch has also been fully that changes every 60 seconds. risk. Finally, RSA offers 400+
AirWatch provides real-time developed internally without The RSA SecurID product fully supported technology
device details and continu- relying on third-party solutions. supports traditional use cases integrations with a wide range
ous compliance monitoring to Additionally, AirWatch has such as securing VPN access of applications. RSA SecurID
ensure information is safe. Ad- built a strong network of NAC and network operating systems technology integrations are
ministrators can access device vendor partnerships and it has and also extends to BYOD, jointly tested by both organiza-
information, including feature implemented the most OEM cloud and mobile security use tions and documented to ensure
restrictions, compliance status APIs of any MDM provider. cases that are increasing in a positive customer experience.
WINNER operating system patch, or kill WINNER any changes and automatically
ForeScout for a process or application. SolarWinds for issue alerts
CounterACT CounterACT works with ex- SolarWinds Network SolarWinds NCM offers a
isting network infrastructures, Configuration Manager number of unique capabilities.
ForeScout CounterACT is a is non-disruptive and does not It is part of the SolarWinds
recognized market innovator require 802.1X configurations. SolarWinds Network Con- IT management suite and is
and leader providing compre- CounterACT works with all figuration Manager (NCM) fully integrated with other
hensive visibility into devices, leading vendors switches, effectively enforces enterprise powerful IT management
users and applications access- wireless controllers, VPN configuration policies for tools, including Network
ing networks in real-time. equipment and other infra- network devices, including Performance Monitor (NPM),
CounterACT assesses each structure. firewalls, routers and switches Server and Application Moni-
device to determine whether Too, it works without an across heterogeneous networks tor (SAM), Network Traffic
it contains any vulnerabilities agent. CounterACT can by assessing network device Analyzer (NTA), IP Address
(OS, anti-virus, application, assess the security status of configuration compliance for Manager (IPAM), User Device
etc.) or configuration issues. Windows, Mac and Linux both internal and industry Tracker (UDT), VoIP & Net-
Based on policies that users systems without the need to policies and standards. The work Quality Manager, Log
configure, CounterACT will deploy another agent on the product includes out-of-the and Event Monitor (LEM)
block, allow or limit network endpoints. It interoperates box support compliance and more. This suite offers a
access. Unlike traditional with a wide variety of exist- reporting and best practices unified view of the network
NAC products, which can be ing security systems, such as for Cisco and Juniper devices. and a common framework for
too restrictive and disruptive, vulnerability assessment, APT Customers can also create proactively identifying and
CounterACT offers the flex- detection, SIEM, MDM, VPN, their own compliance assess- resolving network and systems
ibility to configure network next generation firewalls, etc. ment reports. The solution problems. Too, NCM delivers
access policies that are right By sharing security informa- uses effective change-control impressive business benefits,
for the business, accommodat- tion and automating security workflows allowing proposed including time-to-value and
ing BYOD, etc. controls, CounterACT saves configuration changes to be return-on-investment, due
CounterACT automati- time, reduces risk exposure reviewed and approved before to its affordable licensing
cally finds and fixes endpoint and improves ROI from exist- being automatically updated. It and maintenance terms and
security problems, saving time ing purchases. It provides protects device configurations easy-to-use design. Prospects
and improving the end-user more information about what using automatic backup and are able to download a fully
experience. CounterACT can is on a network, including easy-to-use restore capabilities, functioning version, install
automatically update anti- information about vulnerable and actively monitors device and be using the product in
virus, install agents, trigger an applications and processes. configurations in real-time for about 60 minutes.
WINNER most valuable to the business. WINNER visibility into violations, attack
Rapid7 for Nexpose helps organization F5 Networks for intensity, impact on servers and
Nexpose Ultimate to address the most signifi- F5 BIG-IP Application grade of mitigation success and
cant vulnerabilities, first with Security Manager (ASM) correlates multiple violations
Rapid7 Nexpose Ultimate RealContext which highlights to identify more sophisticated
provides enterprises the vis- assets vital to the business and F5 BIG-IP Application attacks.
ibility to simplify vulnerability RealRisk which provides granu- Security Manager (ASM) is an ASM is a scalable, agile
management. By combining lar risk scoring based on threat agile, scalable web application WAF, delivering unmatched
critical security controls intelligence, such as malware firewall, securing web applica- performance and protection.
testing, asset discovery, and exploit exposure, CVSSv2 tions in traditional, virtual and It offers unparalleled protec-
vulnerability assessment and and temporal risk metrics. private cloud environments. tion against automated attacks
prioritization with closed-loop Nexpose Ultimate is the BIG-IP ASM addresses emerg- with proactive bot defenses
vulnerability validation, Nex- only vulnerability management ing threats at the application distinguishing non-human
pose Ultimate enables security solution aligning offensive level. It detects and mitigates traffic before it reaches servers
workflows focused on fixing technologies with defensive application attacks, including and commences attack. Its
the most relevant risks. capabilities in a single package. DoS/DDoS, brute force and proactive defense combined
Security teams receive a Nexpose Ultimate differs from more. It delivers comprehensive with reactive automated attack
comprehensive and prioritized alternative vulnerability man- protection from web security defenses provides compre-
list of misconfigurations, vul- agement solutions in several key threats, including DDoS and hensive protection against
nerabilities and remediation ways. First, it is the only tool SQL injection attacks, JSON unauthorized bot traffic. ASM
steps for on-premise, cloud to offer integrated closed-loop payload vulnerabilities, web also leads in DAST integration,
and mobile assets along with vulnerability validation within scraping, and more. BIG-IP automatically notifying DAST
critical security controls grades the solution to let security ASM secures data center appli- services when app changes
(patent-pending algorithm) teams prove vulnerabilities cations against OWASP Top 10 occur, accelerating testing and
for desktops and servers. The are exploitable. It also returns threats and zero-days attacks. virtual patching and sealing
seamless integration with vulnerability information and With leading Layer 7 DDoS vulnerabilities immediately.
Metasploit, the premier pen- compliance data in a single defenses, programmability and ASM also provides protection
etration testing tool, provides scan. This allows security teams granular attack visibility, it most out-of-band solutions can-
vulnerability validation by to choose controls to modify identifies sophisticated cyber- not ASM accurately profiles
highlighting which vulner- the security posture of the threats and stops attacks before browsers, defends against bots,
abilities are exploitable. entire network or address indi- reaching servers. It offers protects against CSRF, identi-
Enterprises need the ability vidual vulnerabilities in order unsurpassed protection against fies files containing viruses and
to prioritize which assets are to decrease their exposure. automated attacks and detailed mitigates Layer 7 DoS attacks.
WINNER tion engine (ACE) provides real- WINNER support. Because it stands by
Websense for time security and data analysis Proofpoint.com for its solutions, every Proofpoint
Websense TRITON AP-WEB to safeguard organizations from Proofpoint Customer hosted-services customer re-
evolving web threats. Support ceives Platinum Support. This
The variety and volume of Websense analyzes and program provides phone access
content that people access on categorizes dynamic web Proofpoint delivers true, to technical support engineers
the web is changing. Businesses content/threats in real-time, 24/7/365 customer support 24/7 for high priority issues, as
increasingly use streaming at point-of-click, to detect online and from multiple well as 24/7 access to the online
and social applications, and advanced payloads, exploited support centers around the Proofpoint Enterprise Support
employees are accessing infor- documents, mobile malware world. The Proofpoint support Portal. Customers can submit
mation from mobile or remote and much more. Between 3-5 website provides customers an unlimited number of cases
locations. Unfortunately, the billion requests per day from with complimentary access to and access tech documentation.
criminals have tracked this 900 million endpoints are a comprehensive set of online Results show that 85 percent
shift and have moved more re- inspected. Several independent services, including installation of Proofpoint support cases are
sources to lures that are mobile, Miercom tests recognized its documentation, downloadable successfully closed by first level
social and visual. This opens ability to protect against more online manuals, user-oriented support engineers. This excel-
the door to malware, data theft, advanced malicious scripts manuals and a knowledge base lent track record speaks to the
legal liabilities, productivity and zero-days than any other featuring thousands of search- commitment and dedication of
issues and bandwidth loss. The content management solution. able articles. Customers can the Proofpoint team to clearly
web is also the portal through No other solution accurately also submit tickets, track cases, address questions in a timely,
which advanced threats enter classifies and analyzes HTTPS access training and become a effective manner.
the network through phishing and social sites for threats, ac- Proofpoint Accredited Engi- Proofpoint provides compli-
and targeted attacks. tive scripts and malicious code. neer through a three-to-five mentary 24/7 telephone sup-
Websense TRITON AP-WEB It extends hundreds of use hour self-paced course. port for priority issues with its
uses TruHybrid technology to policies for social websites that Proofpoint customer sup- technical support engineers to
combine on-site appliance and old-school URL filtering cannot port documentation has a all customers. Proofpoint offers
cloud security with a uni- accurately classify. Embed- proven track record of success. customers web-based down-
fied console to offer complete ded TruWeb DLP enables safe Proofpoint actively monitors loads from the online knowl-
protection against malware and outbound communications, documents that are being edge base at no additional
data theft for employees in all preventing data disclosure even accessed and has consis- charge. Proofpoints knowledge
locations. It also offers TruWeb through scanned images, drip tently seen a positive response. base has content spanning the
DLP for data theft and loss pro- DLP and criminally-encrypted Proofpoint prides itself on previous eight years and is
tection. Its advanced classifica- control communications. effective customer service and consistently updated.
WINNER ize and automate the gathering WINNER security architecture needs to
Qualys for of risk data and compliance FireEye be adaptive, nimble and have
Qualys Policy Compliance evidence from employees, part- real long-term relevance. And it
ners, vendors and other subject FireEye continues to grow its approaches this with state-of-
Qualys Policy Compliance matter experts, to manage customer base and revenues at the-art products, highly skilled
(PC) is a cloud service that assessment programs efficiently a 50 percent clip. Today, it has security experts and real-time
performs automated security and reliably online. more than 2,000 customers, threat intelligence.
configuration assessments on Qualys Policy Compliance is including many Fortune 1000. All customers get email,
IT systems throughout the available as part of the Qualys Its product line is comprehen- live chat, web and telephone
network. It helps organizations Security and Compliance Suite. sive. It helps enterprises deploy support 24/7/365 for up to
to reduce risk and continuously Qualys Policy Compliance an- effective security programs 15 designated callers, with a
comply with internal policies nual subscriptions are sold on a to incorporate strategies that one-minute target response
and external regulations. Built per IP basis and include an un- reduce their target surface and time and immediate escalation
on a leading cloud security plat- limited number of compliance shorten the alert to fix cycle to level three advanced support
form, Qualys PC frees organiza- audits and Qualys standard to diminish the impact of any engineering for highest severity
tions from the substantial cost, 24/7/365 support and updates. security breaches that do occur. issues with 30-minute response
resource and deployment issues Qualys Policy Compliance Effective security-conscious times. FireEyes platinum
associated with traditional soft- provides a fully automated way organizations can, with priority plus program adds
ware products without the use to satisfy requirements of policy FireEye, gain the following: immediate problem escalation
of software agents. Known for compliance sans agent, fulfill- strong preventive measures to to level three advanced support
its fast deployment, ease of use, ing the policy and compliance minimize attack surface area; engineering; an unlimited num-
unparalleled scalability and in- industrys need for a low cost, advanced detection capabilities ber of designated callers, with
tegration with enterprise GRC flexible solution. Included in (signature-less and real-time secure support website/portal
systems, Qualys PC enables IT this offering is the collection of detection); network, endpoint access for those callers; a desig-
teams to see how controls relate OS, application and database and event visibility; the threat nated support engineer (DSE)
to critical frameworks and configuration access controls intelligence required to leverage assigned to clients. FireEye
regulations, including CIS, CO- from the information assets the visibility; a fluid process to also provides an annual on-site
BIT, ISO 17799 & 27001, NIST within the enterprise. adapt to emerging threats; and review of service and prod-
SP800-53, ITIL v2, HIPAA, Qualys PC is CIS-certified forensics for both network and uct performance and on-site
FFIEC and NERC-CIP. and provides an extensive endpoint insight. technical assistance, monthly
The Qualys PC portfolio in- library of more than 15,000 As attacks change, defensive support statistic reporting, and
cludes Qualys Questionnaire, a checks, spanning more than 50 measures must evolve. FireEye a quarterly business review via
cloud service that helps central- technologies. has learned the next-generation conference call.
WINNER national conferences, such as WINNER threat landscape, the CISSP rep-
Champlain College CEIC. This year students col- (ISC)2 for CISSP resents core IT security concepts
for Cybersecurity and laborated on an award-winning that professionals need to thrive
Digital Forensics app to assist law enforcement In a world fraught with in the industry today.
in conducting digital forensics security threats and breaches, Frequently referenced in top
The students at Cham- work faster than ever. the need for skilled and knowl- lists of IT-related certifications,
plain College dive right into Champlain conducts an edgeable information security the CISSP is known as the
forensics and security courses Imagine College program for professionals has never been benchmark of professional-
their first semester, they do not underserved students. These greater. With more than 25 years ism. Required by some of the
have to wait until their junior students are able to explore in the industry, (ISC) offers IT worlds most security-conscious
year as at many other colleges. college as an opportunity they security professionals worldwide organizations and government
Students have access to an thought was out of reach, access to unparalleled educa- entities, the CISSP validates that
education other colleges can- highlighting the career growth tion opportunities that facilitate information security leaders pos-
not provide, with more than and opportunities this emerg- deeper knowledge and stronger sess the breadth of knowledge,
35 industry-specific courses in ing field offers. Champlain skill sets, along with valuable skills and experience required
on-campus, online and gradu- also hosts an annual event for peer networking and mentoring. to credibly build and manage
ate programs all developed seventh and eighth graders Considered the gold standard the security posture of their
and taught by experts in the featuring digital forensics and of IT security credentials, the organizations. This breadth of
field. Students use the tools cybersecurity as career options. CISSP is a measure of excel- knowledge and the experience it
and procedures currently Another innovative draw to lence held by nearly 100,000 takes to pass the exam are what
being used in the field. They students interested in this CISSPs in 139 countries. As the set the CISSP apart. An analysis
conduct forensic research and profession is the opportunity globally recognized standard of by Burning Glass Technologies
produce case studies on the to work in Champlains Leahy competence, the CISSP Com- stated that 56 percent of cyber
latest technologies, which have Center for Digital Investigation, mon Body of Knowledge (CBK) jobs in the contracting industry
included Amazon Kindle and a custom-designed, enterprise- is the best reference available require the CISSP. The CISSP
Google Glass. This year they level forensics laboratory. The and reflects up-to-date, relevant is an IT security certification
will be working on the latest lab is capable of employing topics in the ever-changing field of firsts first to meet ANSI/
wearable technologies and up to 60 students to work on of information security. Some ISO/IEC requirements, first to
health applications on mobile real forensics cases for private of the most highly respected, require high-quality, auditable
devices. These case studies businesses and law enforcement high-profile IT security luminar- continuing professional educa-
are published on computer- entities under the supervision ies around the world hold the tion credits, and one of the firsts
forensicsblog.champlain.edu of faculty, lab staff and Direc- CISSP. With the advances in to be listed as a job requirement
and some will be presented at tor Jonathan Rajewski. technology and the evolving in the U.S. DoD 8570.1 matrix.
Finalists 2015
(ISC)2 for Certified Secure
Software Lifecycle Professional
(CSSLP)
(ISC)2 for CISSP
Global Information Assurance
Certification (GIAC) for GIAC
Security Expert (GSE)
ISACA for Certified information
Finalists 2015
Security Manager (CISM)
Champlain College for Cybersecurity and Digital Forensics
ISACA for Certified Information
(ISC)2 for Global Academic Program Systems Auditor (CISA)
SANS Technology Institute for Master of Science in
Information Security Engineering
WINNER collaboratively. The net result WINNER it once again demonstrated its
Christopher Ipsen, CISO, is a sustainable, multifaceted Online Trust Alliance advocacy for best practices to
state of Nevada group diverse by gender and help organizations in both the
capability with a low turnover The stated mission of the public and private sector.
In his seven years as CISO of and high motivation. Online Trust Alliance (OTA) And, just this past March,
the state of Nevada, Chris Ipsen Christopher Ipsen has earned is to enhance the integrity of the OTA wrote a letter to Con-
has used a multifaceted ap- the support of senior leader- transactions occuring on the gress in response to President
proach to address the difficult ship within the state and with web. Under the indefatigable Obamas proposed Personal
challenge of workforce within a corporate partners by having leadership of Craig Spiezle, Data Notification & Protection
state government where pay is a well-defined plan focused executive director, founder Act listing points it believes
lower and responsibility is high. on business solutions rather and president, its efforts over are imperative to creating a
With clear objectives mapped to than technical problems. In the past decade have helped complete federal data breach
national strategies and focusing developing solutions, he works enhance data protection for notification law. Notably, the
on the long-term needs of the with technical resources to countless businesses, as well nonprofit says a federal law
state, he incrementally selected understand the problem to be as bolstered the privacy of needs to preempt the existing
a diverse core security group solved and the possible solu- individuals. 47 state laws and must also
from varied technical back- tions. He then works diligently The information it provides contain a safe harbor from
grounds: WAN, Unix, Win- to negotiate the correct solution to a broad range of stakehold- regulator penalties for busi-
dows, programming, database, to achieve the most efficient ers ranging from business nesses or organizations that
mainframe and compliance. enterprise outcome based on and technical decision-makers demonstrate a commitment to
Individuals were then assigned technology, context, oppor- and privacy and security the adoption of best security
primary security roles in their tunity, human resources, risk professionals to web and app and privacy practices. The
areas of expertise and second- and cost. Although he has a developers increases under- group also wrote that any law
ary roles as backups. Primaries high technical competence and standing of the issues and solu- should contain an appropriate
were assigned the responsibility is active with key standards tions that can not only improve coverage of personal informa-
of establishing standards and bodies like NIST, he carefully data protection practices, but tion triggering notification
procedures in their areas and to avoids tech speak when dealing in the almost certainty of a obligations.
train secondary personnel. The with business leaders. With a breach, aid them in developing As an individuals online
teams were then assigned re- pleasant, passionate and calm and implementing business worlds grows and expands...so
sponsibility to present and train demeanor, he assists leaders to readiness plans. must the protections afforded
agency ISOs at monthly state IT understand the business deci- Earlier this year, with the to them, the group wrote.
security meetings. Teams review sions needed for effective risk release of guides for data Were delighted to honor the
and contribute to standards avoidance. protection and risk assessment, OTAs efforts.
Finalists 2015
Gene Fredriksen, CISO, PSCU
(Public Service Credit Union)
Christopher Ipsen, CISO,
state of Nevada
John Masserini, CISO, MIAX Options
Myrna Soto, CISO, Comcast
Bruce Wignall, CISO,
Teleperformance Group
Online Trust Alliance team: Craig Spiezle, executive director; Scott Stein, VP,
public policy; and Liz Shambaugh, director of member services.