dcsimg

Our Top Security Vendor Methodology

Download our in-depth report: The Ultimate Guide to IT Security Vendors

SHARE
Share it on Twitter  
Share it on Facebook  
Share it on Google+
Share it on Linked in  
Email  

We gather information from a range of IT industry sources for our top security products articles. Our most frequently used sources have been analyst firms Gartner and Forrester, testing company NSS Labs, and user review sites Gartner Peer Reviews and IT Central Station. We interview company officials and scour data sheets. We aggregate all information to best inform our content, and you, our guest.

We analyze security and threat-blocking ability, performance, ease of implementation, ease and richness of management, technical support, and customer satisfaction, among other features. The evaluation criteria vary depending on the product area.

We usually limit the list to 10. There are vendors outside the top 10 that merit consideration, of course, and we've sometimes included those as honorable mentions.

Submit a Comment

Loading Comments...