{"id":616,"date":"2009-12-31T17:10:25","date_gmt":"2009-12-31T09:10:25","guid":{"rendered":"http:\/\/localhost\/portal\/2009\/12\/31\/cisspcism-2010-sc-awards\/"},"modified":"2009-12-31T17:10:25","modified_gmt":"2009-12-31T09:10:25","slug":"cisspcism-2010-sc-awards","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=616","title":{"rendered":"CISSP\u8207CISM\u69ae\u7372 2010 SC Awards"},"content":{"rendered":"<p><a href=\"http:\/\/www.scmagazineus.com\/scawards2010-finalists\/section\/1309\/\" target=\"_blank\" rel=\"noopener\">SC Magazine<\/a> \u662f\u5168\u7403\u77e5\u540d\u7684\u8cc7\u8a0a\u5b89\u5168\u96dc\u8a8c\uff0c\u5c08\u9580\u63d0\u4f9b\u8cc7\u8a0a\u5b89\u5168\u76f8\u95dc\u5831\u5c0e\uff0c\u5176\u5a92\u9ad4\u5b9a\u4f4d\u8ddf\u570b\u5167\u7684\u8cc7\u5b89\u4eba\u96dc\u8a8c\u4e00\u6a23\u3002<\/p>\n<p>2010 SC Awards\u662f\u7531\u8cc7\u5b89\u5ee0\u5546\u548c\u5354\u6703\u63d0\u540d\uff0c\u7d93\u7531\u4e00\u7fa4\u4f86\u81ea\u4e0d\u540c\u6a5f\u69cb\u7684\u8cc7\u8a13\u5b89\u5168\u5c08\u696d\u4eba\u58eb\u9032\u884c\u8a55\u5be9\u5de5\u4f5c\uff0c\u5728\u9019\u6b21\u7684\u8a55\u9078\u7d50\u679c\uff0c\u6709\u5f88\u591a\u6211\u5011\u6240\u719f\u6089\u7684\u7522\u54c1\u6216\u54c1\u724c\uff0c\u4f8b\u5982\uff1aAVG,&nbsp; ArcSight, Quest, IBM\u7b49\uff0c\u53e6\u5916\uff0c\u5c0d\u65bc\u8cc7\u8a0a\u5b89\u5168\u5c08\u696d\u8b49\u7167\u4e0a\uff0cISC2 \u7684 CISSP\u8207 ISACA \u7684 CISM \u4e5f\u96d9\u96d9\u7372\u5f97\u80af\u5b9a\u3002<\/p>\n<p>\n<a target=\"_blank\" href=\"http:\/\/www.scmagazineus.com\/scawards2010-finalists\/section\/1309\/\" rel=\"noopener\">2010 SC Awards Finalists<\/a><br \/>\nThe winners of the 2010 SC Awards U.S. will be announced on Tuesday, March 2, 2010 at the SC Awards Dinner &amp; Presentation in San Francisco.<\/p>\n<p>CLICK HERE to reserve your tickets early and save more than $800.<\/p>\n<p>\nReader Trust Awards<\/p>\n<p>Best Anti-Malware Solution<\/p>\n<p>Astaro Internet Security for Astaro Security Gateway<\/p>\n<p>AVG Technologies for AVG Internet Security Business Edition<\/p>\n<p>Cisco for Cisco IronPort S-Series Secure Web Gateway<\/p>\n<p>ESET for ESET NOD32 Antivirus 4<\/p>\n<p>McAfee for McAfee Web Gateway<\/p>\n<p>Symantec Corp. for Symantec Endpoint Protection Small Business Edition<\/p>\n<p>\nBest Computer Forensics Solution<\/p>\n<p>ArcSight for ArcSight Logger<\/p>\n<p>Guidance Software for EnCase Forensic<\/p>\n<p>NetWitness for NetWitness NextGen 9.0<\/p>\n<p>Quest Software for Quest ChangeAuditor<\/p>\n<p>Solera Networks for Solera DS Network Forensics Appliances<\/p>\n<p>\nBest Data Leakage\/Extrusion Prevention<\/p>\n<p>EMC Corp. for RSA DLP Suite<\/p>\n<p>Fidelis Security Systems for Fidelis Extrusion Prevention System, Fidelis XPS<\/p>\n<p>Symantec Corp. for Symantec Data Loss Prevention 9.0<\/p>\n<p>TippingPoint for TippingPoint Intrusion Prevention System (IPS)<\/p>\n<p>Trend Micro for LeakProof<\/p>\n<p>\nBest Encryption Solution<\/p>\n<p>BitArmor Systems for BitArmor Data Control<\/p>\n<p>Check Point Software Technologies for Check Point Full Disk Encryption<\/p>\n<p>Cisco for Cisco IronPort Email Encryption<\/p>\n<p>PGP Corp. for PGP Whole Disk Encryption<\/p>\n<p>Sophos for Sophos SafeGuard Enterprise (Utimaco)<\/p>\n<p>\nBest Endpoint Security Solution<\/p>\n<p>Cisco Systems for Cisco Network Admission Control (Cisco NAC)<\/p>\n<p>Juniper Networks for Juniper Networks Unified Access Control<\/p>\n<p>Sophos for Sophos Endpoint Security and Data Protection<\/p>\n<p>Symantec Corp. for Symantec Endpoint Protection 11.0<\/p>\n<p>Trend Micro for OfficeScan 10<\/p>\n<p>\nBest Enterprise Firewall<\/p>\n<p>Astaro Internet Security for Astaro Security Gateway<\/p>\n<p>Check Point Software Technologies for Security Gateway R70<\/p>\n<p>Fortinet for FortiGate-620B<\/p>\n<p>Juniper Networks for Juniper Networks SRX Series<\/p>\n<p>Palo Alto Networks for Palo Alto Networks PA-4000 Series next-generation firewalls<\/p>\n<p>SonicWALL for SonicWALL NSA E7500<\/p>\n<p>\nBest Identity Management Solution<\/p>\n<p>Courion Corp. for Courion Access Assurance Suite<\/p>\n<p>IBM for IBM Tivoli Identity and Access Assurance<\/p>\n<p>Quest Software for Quest One Identity Solution<\/p>\n<p>RSA, the security division of EMC for RSA Access Manager<\/p>\n<p>VeriSign for VeriSign Personal Identity Portal<\/p>\n<p>\nBest Integrated Security Solution<\/p>\n<p>Check Point Software Technologies for UTM-1 Total Security<\/p>\n<p>Juniper Networks for Juniper Networks SRX Series<\/p>\n<p>SonicWALL for SonicWALL TZ 210 Wireless-N<\/p>\n<p>Sophos for Sophos Endpoint Security and Data Protection<\/p>\n<p>Symantec Corp. for Symantec Protection Suite Enterprise Edition<\/p>\n<p>\nBest Intrusion Detection\/Prevention Solution<\/p>\n<p>Cisco Systems for Cisco Intrusion Prevention System<\/p>\n<p>IBM for IBM Proventia Network IPS GX6116 and IBM Proventia Network Security Controller<\/p>\n<p>SonicWALL for SonicWALL NSA E7500<\/p>\n<p>Sourcefire for Snort-based Sourcefire 3D System<\/p>\n<p>TippingPoint for TippingPoint Intrusion Prevention System (IPS)<\/p>\n<p>\nBest IPsec\/SSL VPN<\/p>\n<p>Astaro Internet Security for Astaro Security Gateway<\/p>\n<p>Barracuda Networks for Barracuda SSL VPN<\/p>\n<p>Citrix Systems for Citrix Access Gateway<\/p>\n<p>F5 Networks for FirePass SSL VPN<\/p>\n<p>Microsoft Corp. for Forefront Unified Access Gateway<\/p>\n<p>SonicWALL for SonicWALL Aventail EX7000<\/p>\n<p>\nBest Managed Security Service<\/p>\n<p>Google for Google Message Security, powered by Postini<\/p>\n<p>IBM for IBM ISS Managed Security Services<\/p>\n<p>McAfee for McAfee Total Protection Service<\/p>\n<p>SecureWorks for Managed Security Services<\/p>\n<p>StillSecure for StillSecure ProtectPoint<\/p>\n<p>\nBest Messaging Security Solution<\/p>\n<p>Barracuda Networks for Barracuda Spam &amp; Virus Firewall<\/p>\n<p>Cisco for Cisco IronPort Email Security<\/p>\n<p>McAfee for McAfee Email Gateway<\/p>\n<p>Websense for Websense Email Security (Websense Hosted Email Security and Websense Email Security)<\/p>\n<p>\nBest Mobile Device Security Solution<\/p>\n<p>Check Point Software Technologies for Check Point Media Encryption and Port Protection<\/p>\n<p>Credant Technologies for Credant Mobile Guardian<\/p>\n<p>IronKey for IronKey Enterprise with Remote Management Service<\/p>\n<p>PGP Corp. for PGP Mobile<\/p>\n<p>Symantec Corp. for Symantec Mobile Security Suite 5.1<\/p>\n<p>\nBest Multi- and Second-factor Solution<\/p>\n<p>Entrust for Entrust IdentityGuard<\/p>\n<p>Imprivata for Imprivata OneSign Authentication Management<\/p>\n<p>PhoneFactor for PhoneFactor<\/p>\n<p>RSA, the security division of EMC for RSA SecurID<\/p>\n<p>VeriSign for VeriSign Identity Protection (VIP) Authentication Service<\/p>\n<p>\nBest Policy Management Solution<\/p>\n<p>nCircle for nCircle Configuration Compliance Manager<\/p>\n<p>NetIQ for NetIQ Secure Configuration Manager 5.8 for Policy Management<\/p>\n<p>Novell for ZENworks Configuration Management Enterprise Edition<\/p>\n<p>SonicWALL for SonicWALL Universal Management Appliance (UMA) EM5000<\/p>\n<p>Sourcefire for Sourcefire RNA<\/p>\n<p>\nBest Security Information\/Event Management (SIM\/SEM) Solution<\/p>\n<p>ArcSight for ArcSight Enterprise Security Manager (ESM)<\/p>\n<p>IBM for Tivoli Security Information and Event Manager<\/p>\n<p>Q1 Labs for QRadar<\/p>\n<p>RSA, the security division of EMC for RSA enVision Platform<\/p>\n<p>Tenable Network Security for Tenable&#8217;s Security Center 3.4 with Log Correlation Engine 3.2<\/p>\n<p>TriGeo Network Security for TriGeo SIM<\/p>\n<p>\nBest Security Software Development Solution<\/p>\n<p>Cenzic for ClickToSecure 6.0<\/p>\n<p>ClearFoundation for ClearOS<\/p>\n<p>IBM Rational Software for Ounce 6<\/p>\n<p>Mocana Corp. for Device Security Framework 5.1<\/p>\n<p>Veracode for Veracode SecurityReview<\/p>\n<p>VeriSign for VeriSign Code Signing<\/p>\n<p>\nBest Vulnerability Management Solution<\/p>\n<p>Core Security Technologies for Core Impact Pro<\/p>\n<p>eEye Digital Security for Retina Network Security Scanner<\/p>\n<p>Microsoft Corp. for Forefront Threat Management Gateway<\/p>\n<p>Qualys for QualysGuard<\/p>\n<p>Tenable Network Security for Tenable Security Center 3.4 with Nessus 4.0, Log Correlation Engine (LCE) 3.2 and Passive Vulnerability Scanner (PVS) 3.0<\/p>\n<p>TippingPoint for TippingPoint Intrusion Prevention System (IPS)<\/p>\n<p>\nBest Web Application Security Solution<\/p>\n<p>Barracuda Networks for Barracuda Web Application Firewall<\/p>\n<p>Breach Security for WebDefend<\/p>\n<p>F5 Networks for BIG-IP Application Security Manager<\/p>\n<p>TippingPoint for TippingPoint&#8217;s Intrusion Prevention System (IPS)<\/p>\n<p>VeriSign for VeriSign Extended Validation (EV) Secure Sockets Layer (SSL) Certificates<\/p>\n<p>WhiteHat Security for WhiteHat Sentinel<\/p>\n<p>\nBest Web Filtering Solution<\/p>\n<p>Blue Coat Systems for Blue Coat WebFilter and WebPulse Collaborative Defense<\/p>\n<p>Cisco for Cisco IronPort S-Series Secure Web Gateway<\/p>\n<p>McAfee for McAfee Web Gateway <\/p>\n<p>St. Bernard Software for iPrism Web Filter<\/p>\n<p>Symantec Corp. for Symantec Web Gateway<\/p>\n<p>Websense for Websense Web Security<\/p>\n<p>\nExcellence Awards<\/p>\n<p>Best Enterprise Security Solution<\/p>\n<p>McAfee for McAfee Total Protection for Endpoint<\/p>\n<p>Protegrity for Protegrity Data Protection System 5.0<\/p>\n<p>SonicWALL for SonicWALL NSA E7500<\/p>\n<p>Sophos for Sophos Endpoint Security and Data Protection<\/p>\n<p>Websense for Websense Web Security Gateway<\/p>\n<p>\nBest Regulatory Compliance Solution<\/p>\n<p>Archer Technologies for Archer Technologies GRC Solutions<\/p>\n<p>e-DMZ Security for Total Privileged Access Management (TPAM) Suite<\/p>\n<p>Modulo Security for Modulo Risk Manager&trade;<\/p>\n<p>Qualys for QualysGuard PCI<\/p>\n<p>SenSage for SenSage Event Data Warehouse<\/p>\n<p>Vanguard Integrity Professionals for Vanguard Audit and Compliance Solution<\/p>\n<p>\nBest Security Company<\/p>\n<p>BigFix<\/p>\n<p>Fortify Software<\/p>\n<p>IBM<\/p>\n<p>McAfee<\/p>\n<p>Qualys<\/p>\n<p>\nBest SME Security Solution<\/p>\n<p>Astaro Internet Security for Astaro Security Gateway<\/p>\n<p>Imprivata for Imprivata OneSign<\/p>\n<p>Kaspersky Lab for Kaspersky Open Space Security<\/p>\n<p>Reflexion Networks for Reflexion Total Control (RTC)<\/p>\n<p>Sentrigo for Sentrigo Hedgehog Enterprise<\/p>\n<p>WatchGuard Technologies for Firebox X Core<\/p>\n<p>\nRookie Security Company of the Year<\/p>\n<p>AccelOps<\/p>\n<p>Allgress<\/p>\n<p>Damballa<\/p>\n<p>HyTrust<\/p>\n<p>StrikeForce Technologies<\/p>\n<p>\nProfessional Awards<\/p>\n<p>Best Professional Certification Program<\/p>\n<p>GIAC &#8211; Global Information Assurance Certification for GIAC Security Essentials Certification (GSEC); GIAC &#8211; Global Information Assurance Certification; GIAC Certified Forensics Analyst (GCFA)<\/p>\n<p>Information System Audit and Control Association for Certified Information Security Manager (CISM)<\/p>\n<p>(ISC)2 for SSCP<\/p>\n<p>(ISC)2 for CISSP<\/p>\n<p>\nBest Professional Training Program<\/p>\n<p>Intense School&#8217;s Professional Information Security Training Program<\/p>\n<p>(ISC)2<\/p>\n<p>SANS Institute<\/p>\n<p>The Training Camp<\/p>\n<p>Vanguard Enterprise Security Training and Education<\/p>\n<p>\nBest Security Team<\/p>\n<p>Cargill<\/p>\n<p>Diebold<br \/>\nScott Angelo and the Diebold Enterprise Security Team<\/p>\n<p>eBay<br \/>\neBay security team<\/p>\n<p>Southwest Washington Medical Center<br \/>\nChristopher Paidhrin<\/p>\n<p>Troy University<br \/>\nTroy University IT Security Team<\/p>\n<p>\nCSO of the Year<\/p>\n<p>Bobby Dominguez<br \/>\nCatalina Marketing Corp.<\/p>\n<p>Robert Maley<br \/>\nstate of Pennsylvania<\/p>\n<p>Dave Cullinane<br \/>\neBay<\/p>\n<p>Bill McQuaid<br \/>\nParkview Adventist Medical Center<\/p>\n<p>Mark Weatherford<br \/>\nstate of California<\/p>\n<p><br type=\"_moz\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SC Magazine \u662f\u5168\u7403\u77e5\u540d\u7684\u8cc7\u8a0a\u5b89\u5168\u96dc\u8a8c\uff0c\u5c08\u9580\u63d0\u4f9b\u8cc7\u8a0a\u5b89\u5168\u76f8\u95dc\u5831\u5c0e\uff0c\u5176\u5a92\u9ad4\u5b9a\u4f4d\u8ddf\u570b\u5167\u7684\u8cc7\u5b89\u4eba\u96dc\u8a8c\u4e00\u6a23\u3002 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-616","post","type-post","status-publish","format-standard","hentry","category-informationsecurity"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/616","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=616"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/616\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=616"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=616"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}