Our Top Security Vendor Methodology

We gather information from a range of IT industry sources for our top security products articles. Our most frequently used sources have been analyst firms Gartner and Forrester, testing company NSS Labs, and user review sites Gartner Peer Reviews and IT Central Station. We interview company officials and scour data sheets. We interview users and impartial experts. We aggregate all information to best inform our content, and you, our guest.

We analyze security and threat-blocking ability, performance, ease of implementation, ease and richness of management, technical support, and customer satisfaction, among other features. The evaluation criteria vary depending on the product area.

We usually limit the list to 10. There are vendors outside the top 10 that merit consideration, of course, and we’ve sometimes included those as honorable mentions.

Paul Shread
eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds a market analyst certification.

Top Products

Related articles