Our Top Security Vendor Methodology

We gather information from a range of IT industry sources for our top security products articles. Our most frequently used sources have been analyst firms Gartner and Forrester, testing company NSS Labs, and user review sites Gartner Peer Reviews and IT Central Station. We interview company officials and scour data sheets. We interview users and impartial experts. We aggregate all information to best inform our content, and you, our guest.

We analyze security and threat-blocking ability, performance, ease of implementation, ease and richness of management, technical support, and customer satisfaction, among other features. The evaluation criteria vary depending on the product area.

We usually limit the list to 10. There are vendors outside the top 10 that merit consideration, of course, and we’ve sometimes included those as honorable mentions.

Paul Shread
eSecurity Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including an award-winning series on software-defined data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds a market analyst certification.

Top Products

Top Cybersecurity Companies

Cybersecurity is the hottest area of IT spending. That's why so many vendors have entered this lucrative $100 billion+ market. But who are the...

Top Endpoint Detection and Response (EDR) Solutions

Endpoint security is a cornerstone of IT security, so our team put considerable research and analysis into this list of top endpoint detection and...

Top CASB Security Vendors for 2021

Any cloud-based infrastructure needs a robust cloud access security broker (CASB) solution to ensure data and application...

Best SIEM Tools & Software for 2021

Security Information and Event Management (SIEM, pronounced "sim") is a key enterprise security technology, with the ability...

Related articles