SlideShare a Scribd company logo
1 of 4
Download to read offline
2009 North American Web Content Management
                               Product Innovation of the Year Award

                                       Websense
         The 2009 Frost & Sullivan North American Product Innovation of the Year Award in
         Web Content Management goes to Websense in recognition of the company’s
         development of a series of innovative Web security products that include a Web filter
         and Web security gateway. Websense’s solutions can cope with the needs of the
         dynamic content of feature-rich Web sites, especially Web 2.0. They provide policy-
         based control over hundreds of network protocols against security threats along with
         bandwidth optimization to efficiently manage real-time network traffic.

                                      Company Background

         Headquartered in San Diego, California, Websense was founded by Phil Trubey in
         1994. Incorporated with a mission to develop software to block inappropriate websites,
         Websense emerged as a pioneer in the domain of Web filtering. A public company
         since 2000, Websense is led by network security veteran Gene Hodges, who serves as
         the company’s chief executive officer. With more than 1,300 employees, Websense
         has a global presence. Considering the rapid increase in the number and severity of
         internet threats, Websense has established a security lab of more than 80 dedicated
         content researchers to constantly discover, investigate, and report such threats.

                                 Relevance in the Market Place

         The nature of Web content today is more dynamic than before. Web users have begun
         to actively use Web sites as a medium of communication, for application sharing, and
         content updates. Web 2.0 applications and technologies from AJAX, Flash, online
         storage, webmail, and SaaS services to content-sharing and online messaging
         technologies like Wikipedia and social networking tools such as Facebook and Twitter
         are increasingly being used and leveraged in the workplace. According to Websense
         Security Labs the top 100 Web sites are the most popular targets for attackers due to
         their large user base, good reputations and support of Web 2.0 applications. With
         malware attacks becoming major threats that compromise confidential data such as
         usernames and passwords, the hacker community is currently developing security




© 2009 Frost & Sullivan
breach tactics ranging from phishing attacks to deploying botnets in order to acquire
         critical personal and corporate data from Web users.

                                  How the Technology Works

         Websense has developed the Websense Web Security Gateway (WSG), an integrated
         Web proxy and cache purpose-built for protecting organizations from malicious or
         inappropriate Web content and Web sites that are accessed by organizational
         employees. WSG allows an organization to create internet user policies by choosing a
         series of options such as ‘Allow,’ ‘Block,’ ‘Continue,’ ‘Quota,’ ‘Block by File Type,’
         around Web site and content categories as well as network application categories such
         as Instant Messaging or Peer-to-Peer applications. To prevent malware and virus
         attacks, WSG incorporates many advanced real-time site, file, object, reputation,
         virus, and exploit scanning capabilities. At the same time it leverages these and
         additional content and protocol analysis capabilities to prevent inappropriate use of
         Web content and network resources that can violate HR, Acceptable Use, and legal
         liability policies. As an additional critical capability, the WSG can also look at the
         outbound data content leveraging Websense award-winning Data Loss Prevention
         technology, and it can enforce polices to protect sensitive and regulated data from
         leaving the organization based on the user, the actual data, and the destination of that
         data. These policies set by organizations can be created based on users or even
         groups as defined in the Microsoft Windows Active Directory, the Sun Java System
         Directory Server, RADIUS (remote authentication dial in user service), and Novell
         eDirectory access via Lightweight Directory Access Control.

         By leveraging more than 1,800 proprietary analytical engines as well as the patent-
         pending Websense ThreatSeeker™ Network, the Websense Web Security Gateway
         analyzes and classifies in real-time Web site content accessed by end users. The
         ThreatSeeker Network provides intelligence to address malicious content with the most
         up-to-date protection. Over the years Websense has made many enhancements to this
         system, and its acquisition of Defensio in early 2009 is a recent example. Defensio's
         ability to sit in social networks and provide content and blog-spam intelligence into the
         ThreatSeeker™ Network puts Websense ahead in detecting and protecting end users,
         while these new sites, links and content are simply not seen by traditional email and
         Web detection systems.

         This WSG technology also has been incorporated in the v10000 gateway appliance,
         which was developed to especially address Web 2.0 threats and to mitigate the risks of
         leveraging Web 2.0 for its obvious benefits. Websense Web security is also available




© 2009 Frost & Sullivan
as a Software as a Service (SaaS) solution which provides another key deployment
         option and advantage. Websense Hosted Web Security is a highly scalable, zero-
         latency SaaS option that ensures only clean traffic reaches customer networks, thus
         reducing time and costs associated with administration, maintenance and support and
         freeing IT to focus on strategic business initiatives. Traffic is routed through globally
         distributed data centers and scanned in real time for malicious and inappropriate
         content using a combination of commercial antivirus scanning, the Websense
         ThreatSeeker Network, and correlated heuristics. The service utilizes a multi-tenant
         architecture with purpose-built high-performance proxies and is backed by industry-
         leading SLAs to ensure uptime and availability.

                                            Best Practices

         One of the important features of the Websense Web Security Gateway solution is its
         ability to support the rising dynamics of the Web by conducting real-time content
         analysis of the most frequented Web sites. Although, these popular Web sites perform
         daily updates to their Web pages, WSG seamlessly tracks these sites constantly across
         millions of individual Web pages. Due to the immense popularity of social networking
         sites such as Facebook and Twitter, Websense has begun offering Web security
         solutions directly on the client sites to enhance real-time threat protection. With its
         deep knowledge of the Web and real-time dynamic threat protection, Websense
         provides complete coverage, visibility, and control over who can send what
         information, where, and how, enabling corporations to keep their networks and data
         safe while still leveraging the benefits of Web 2.0.

         Websense has been awarded a total of 18 patents so far. A majority of the issued
         patents are in the area of Web filtering and content filtering, which include patents
         from filtering techniques to flexible filtering technologies. The company has
         approximately 100 patents in the filing process.


                                              Conclusion

         Frost & Sullivan is pleased to present Websense with the 2009 Award for Product
         Innovation of the Year in Web Content Management for its development of an
         advanced, innovative policy-based control Web security solution, which can cope with
         the dynamic needs of today’s internet communication spectrum while addressing the
         latest security threats.




© 2009 Frost & Sullivan
Award Description

          The Frost & Sullivan Award for Product Innovation is presented each year to the
          company that has demonstrated excellence in new products and technologies within its
          industry. The recipient company has shown innovation by launching a broad line of
          emerging products and technologies.

                                      Research Methodology

          To choose a recipient of this Award, the analyst team tracks all new product launches,
          research and development spending, products in development, and new product
          features and modifications. This is accomplished through interviews with the market
          participants and extensive secondary and technology research. All new product
          launches and new products in development in each company are compared and
          evaluated based on degree of innovation and customer satisfaction. Companies are then
          ranked by number of new product launches and new products in development.

                                       Measurement Criteria

          In addition to the methodology described above, there are specific criteria used to
          determine final competitor rankings in this industry. The recipient of this Award has
          excelled based on one or more of the following criteria:
                Significance of new product(s) in its industry
                Competitive advantage of new product(s) in its industry
                Product innovation in terms of unique or revolutionary technology
                Product acceptance in the marketplace
                New product value-added services provided to customers
                Number of competitors with similar product(s).

About Best Practices

Frost & Sullivan Best Practices Awards recognize companies in a variety of regional and global markets for
demonstrating outstanding achievement and superior performance in areas such as leadership, technological
innovation, customer service, and strategic product development.       Industry analysts compare market
participants and measure performance through in-depth interviews, analysis, and extensive secondary
research in order to identify best practices in the industry.

About Frost & Sullivan

Frost & Sullivan, the Growth Consulting Company, partners with clients to accelerate their growth. The
company's Growth Partnership Services, Growth Consulting and Career Best Practices empower clients to
create a growth focused culture that generates, evaluates and implements effective growth strategies. Frost &
Sullivan employs over 45 years of experience in partnering with Global 1000 companies, emerging businesses
  © 2009 Frost & Sullivan
and the investment community from more than 30 offices on six continents. For more information about Frost
& Sullivan’s Growth Partnerships, visit http://www.frost.com.

www.awards.frost.com

More Related Content

What's hot

How to get deeper administration insights into your tenant
How to get deeper administration insights into your tenantHow to get deeper administration insights into your tenant
How to get deeper administration insights into your tenantRobert Crane
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016Nathan CAVRIL
 
NATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsNATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsBenjamin Rohé
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
 
Cybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabiaCybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabiaFaysal Ghauri
 
Cloud Security (CASB) for Slack
Cloud Security (CASB) for SlackCloud Security (CASB) for Slack
Cloud Security (CASB) for SlackSachin Yadav
 
Security is Hard
Security is HardSecurity is Hard
Security is HardMike Murray
 
History of Content Security: Take 2 - ShareCloudSummit Houston
History of Content Security: Take 2 - ShareCloudSummit HoustonHistory of Content Security: Take 2 - ShareCloudSummit Houston
History of Content Security: Take 2 - ShareCloudSummit HoustonAdam Levithan
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanSPS Paris
 
The 15 best cloud security practices
The 15 best cloud security practices The 15 best cloud security practices
The 15 best cloud security practices Cloudride LTD
 
Cyber Ethics: Cyber Security Services | VAPT and WAPT
 Cyber Ethics: Cyber Security Services | VAPT and WAPT Cyber Ethics: Cyber Security Services | VAPT and WAPT
Cyber Ethics: Cyber Security Services | VAPT and WAPTSaeelRelekar
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Cisco do Brasil
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing presentJames Sutter
 
Debunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN SecurityDebunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN Securityinside-BigData.com
 
Microsoft Threat Protection
Microsoft Threat ProtectionMicrosoft Threat Protection
Microsoft Threat ProtectionThierry DEMAN
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - CybersecurityAbhilashYadav14
 

What's hot (20)

How to get deeper administration insights into your tenant
How to get deeper administration insights into your tenantHow to get deeper administration insights into your tenant
How to get deeper administration insights into your tenant
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016
 
NATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsNATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-Ups
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Cybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabiaCybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabia
 
Cloud Security (CASB) for Slack
Cloud Security (CASB) for SlackCloud Security (CASB) for Slack
Cloud Security (CASB) for Slack
 
Security is Hard
Security is HardSecurity is Hard
Security is Hard
 
History of Content Security: Take 2 - ShareCloudSummit Houston
History of Content Security: Take 2 - ShareCloudSummit HoustonHistory of Content Security: Take 2 - ShareCloudSummit Houston
History of Content Security: Take 2 - ShareCloudSummit Houston
 
Microsoft Digital Crimes Unit
Microsoft Digital Crimes UnitMicrosoft Digital Crimes Unit
Microsoft Digital Crimes Unit
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Secure remote work
Secure remote workSecure remote work
Secure remote work
 
The 15 best cloud security practices
The 15 best cloud security practices The 15 best cloud security practices
The 15 best cloud security practices
 
Cyber Ethics: Cyber Security Services | VAPT and WAPT
 Cyber Ethics: Cyber Security Services | VAPT and WAPT Cyber Ethics: Cyber Security Services | VAPT and WAPT
Cyber Ethics: Cyber Security Services | VAPT and WAPT
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing present
 
Debunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN SecurityDebunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN Security
 
Microsoft Threat Protection
Microsoft Threat ProtectionMicrosoft Threat Protection
Microsoft Threat Protection
 
Cipher Cloud - Company Profile
Cipher Cloud - Company ProfileCipher Cloud - Company Profile
Cipher Cloud - Company Profile
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
 

Viewers also liked

Genes Linked To Spread Of Breast Cancer
Genes Linked To Spread Of Breast CancerGenes Linked To Spread Of Breast Cancer
Genes Linked To Spread Of Breast CancerSamanthaAnderson
 
Link’s Transition Planning
Link’s Transition PlanningLink’s Transition Planning
Link’s Transition Planninggasanden
 
Guide to Cloud Computing (pdf) - Danish
Guide to Cloud Computing (pdf) - DanishGuide to Cloud Computing (pdf) - Danish
Guide to Cloud Computing (pdf) - DanishKim Jensen
 
IT sikkerhed 2009
IT sikkerhed 2009IT sikkerhed 2009
IT sikkerhed 2009Kim Jensen
 
TLS and SSL v3 vulnerabilities
TLS and SSL v3 vulnerabilitiesTLS and SSL v3 vulnerabilities
TLS and SSL v3 vulnerabilitiesKim Jensen
 
Collaborative Practice for Civil matters
Collaborative Practice for Civil mattersCollaborative Practice for Civil matters
Collaborative Practice for Civil matterscarlMichaelrossi
 
Brave New World Trends That Will Change Your Life
Brave New World   Trends That Will Change Your LifeBrave New World   Trends That Will Change Your Life
Brave New World Trends That Will Change Your LifeTom Barrett
 

Viewers also liked (8)

Genes Linked To Spread Of Breast Cancer
Genes Linked To Spread Of Breast CancerGenes Linked To Spread Of Breast Cancer
Genes Linked To Spread Of Breast Cancer
 
Link’s Transition Planning
Link’s Transition PlanningLink’s Transition Planning
Link’s Transition Planning
 
Guide to Cloud Computing (pdf) - Danish
Guide to Cloud Computing (pdf) - DanishGuide to Cloud Computing (pdf) - Danish
Guide to Cloud Computing (pdf) - Danish
 
IT sikkerhed 2009
IT sikkerhed 2009IT sikkerhed 2009
IT sikkerhed 2009
 
TLS and SSL v3 vulnerabilities
TLS and SSL v3 vulnerabilitiesTLS and SSL v3 vulnerabilities
TLS and SSL v3 vulnerabilities
 
Collaborative Practice for Civil matters
Collaborative Practice for Civil mattersCollaborative Practice for Civil matters
Collaborative Practice for Civil matters
 
CreditUnionVMS
CreditUnionVMSCreditUnionVMS
CreditUnionVMS
 
Brave New World Trends That Will Change Your Life
Brave New World   Trends That Will Change Your LifeBrave New World   Trends That Will Change Your Life
Brave New World Trends That Will Change Your Life
 

Similar to Product Innovation Award 2009

Top 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdfTop 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdfSolviosTechnology
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Securitycrussell79
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersCloudflare
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsRedhuntLabs2
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --SymantecAbhishek Sood
 
Web Security For Enterprise
Web Security For EnterpriseWeb Security For Enterprise
Web Security For Enterprisedigital.signage
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - PrintAndrew Kanikuru
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsCognizant
 
Research challenges and issues in web security
Research challenges and issues in web securityResearch challenges and issues in web security
Research challenges and issues in web securityIAEME Publication
 
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...white paper
 
Global Market Leader Award 2009
Global Market Leader Award 2009Global Market Leader Award 2009
Global Market Leader Award 2009Kim Jensen
 
Clearswift f5 integration
Clearswift f5 integrationClearswift f5 integration
Clearswift f5 integrationMarco Essomba
 
Best Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdfBest Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdfDigital Auxilio Technologies
 
Derek J Mezack Resume 2015-AppSec_k
Derek J Mezack Resume 2015-AppSec_kDerek J Mezack Resume 2015-AppSec_k
Derek J Mezack Resume 2015-AppSec_kDerek Mezack
 
Strategies for Effective Cybersecurity in Web Development pdf.pdf
Strategies for Effective Cybersecurity in Web Development pdf.pdfStrategies for Effective Cybersecurity in Web Development pdf.pdf
Strategies for Effective Cybersecurity in Web Development pdf.pdfLondonAtil1
 
Top 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptxTop 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptxSonaliG6
 
Symantec-CWS_Brochure
Symantec-CWS_BrochureSymantec-CWS_Brochure
Symantec-CWS_BrochureJustyna Majek
 
Mobile content generation application | Wireless Community Network Enabler#
Mobile content generation application | Wireless Community Network Enabler#Mobile content generation application | Wireless Community Network Enabler#
Mobile content generation application | Wireless Community Network Enabler#Mike Taylor
 

Similar to Product Innovation Award 2009 (20)

Top 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdfTop 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdf
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --Symantec
 
Web Security For Enterprise
Web Security For EnterpriseWeb Security For Enterprise
Web Security For Enterprise
 
Passmarked.com
Passmarked.comPassmarked.com
Passmarked.com
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - Print
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
 
Research challenges and issues in web security
Research challenges and issues in web securityResearch challenges and issues in web security
Research challenges and issues in web security
 
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
 
Global Market Leader Award 2009
Global Market Leader Award 2009Global Market Leader Award 2009
Global Market Leader Award 2009
 
Clearswift f5 integration
Clearswift f5 integrationClearswift f5 integration
Clearswift f5 integration
 
Best Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdfBest Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdf
 
Derek J Mezack Resume 2015-AppSec_k
Derek J Mezack Resume 2015-AppSec_kDerek J Mezack Resume 2015-AppSec_k
Derek J Mezack Resume 2015-AppSec_k
 
Strategies for Effective Cybersecurity in Web Development pdf.pdf
Strategies for Effective Cybersecurity in Web Development pdf.pdfStrategies for Effective Cybersecurity in Web Development pdf.pdf
Strategies for Effective Cybersecurity in Web Development pdf.pdf
 
Top 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptxTop 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptx
 
Symantec-CWS_Brochure
Symantec-CWS_BrochureSymantec-CWS_Brochure
Symantec-CWS_Brochure
 
CYRENWebSecurity
CYRENWebSecurityCYRENWebSecurity
CYRENWebSecurity
 
Mobile content generation application | Wireless Community Network Enabler#
Mobile content generation application | Wireless Community Network Enabler#Mobile content generation application | Wireless Community Network Enabler#
Mobile content generation application | Wireless Community Network Enabler#
 

More from Kim Jensen

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsKim Jensen
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter packKim Jensen
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedKim Jensen
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Kim Jensen
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003Kim Jensen
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Kim Jensen
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportKim Jensen
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat ReportKim Jensen
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UKKim Jensen
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Kim Jensen
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012Kim Jensen
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Kim Jensen
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Kim Jensen
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011Kim Jensen
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Kim Jensen
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web SecurityKim Jensen
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Kim Jensen
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011Kim Jensen
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Kim Jensen
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Kim Jensen
 

More from Kim Jensen (20)

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter pack
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security Report
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UK
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web Security
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010
 

Recently uploaded

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Recently uploaded (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Product Innovation Award 2009

  • 1. 2009 North American Web Content Management Product Innovation of the Year Award Websense The 2009 Frost & Sullivan North American Product Innovation of the Year Award in Web Content Management goes to Websense in recognition of the company’s development of a series of innovative Web security products that include a Web filter and Web security gateway. Websense’s solutions can cope with the needs of the dynamic content of feature-rich Web sites, especially Web 2.0. They provide policy- based control over hundreds of network protocols against security threats along with bandwidth optimization to efficiently manage real-time network traffic. Company Background Headquartered in San Diego, California, Websense was founded by Phil Trubey in 1994. Incorporated with a mission to develop software to block inappropriate websites, Websense emerged as a pioneer in the domain of Web filtering. A public company since 2000, Websense is led by network security veteran Gene Hodges, who serves as the company’s chief executive officer. With more than 1,300 employees, Websense has a global presence. Considering the rapid increase in the number and severity of internet threats, Websense has established a security lab of more than 80 dedicated content researchers to constantly discover, investigate, and report such threats. Relevance in the Market Place The nature of Web content today is more dynamic than before. Web users have begun to actively use Web sites as a medium of communication, for application sharing, and content updates. Web 2.0 applications and technologies from AJAX, Flash, online storage, webmail, and SaaS services to content-sharing and online messaging technologies like Wikipedia and social networking tools such as Facebook and Twitter are increasingly being used and leveraged in the workplace. According to Websense Security Labs the top 100 Web sites are the most popular targets for attackers due to their large user base, good reputations and support of Web 2.0 applications. With malware attacks becoming major threats that compromise confidential data such as usernames and passwords, the hacker community is currently developing security © 2009 Frost & Sullivan
  • 2. breach tactics ranging from phishing attacks to deploying botnets in order to acquire critical personal and corporate data from Web users. How the Technology Works Websense has developed the Websense Web Security Gateway (WSG), an integrated Web proxy and cache purpose-built for protecting organizations from malicious or inappropriate Web content and Web sites that are accessed by organizational employees. WSG allows an organization to create internet user policies by choosing a series of options such as ‘Allow,’ ‘Block,’ ‘Continue,’ ‘Quota,’ ‘Block by File Type,’ around Web site and content categories as well as network application categories such as Instant Messaging or Peer-to-Peer applications. To prevent malware and virus attacks, WSG incorporates many advanced real-time site, file, object, reputation, virus, and exploit scanning capabilities. At the same time it leverages these and additional content and protocol analysis capabilities to prevent inappropriate use of Web content and network resources that can violate HR, Acceptable Use, and legal liability policies. As an additional critical capability, the WSG can also look at the outbound data content leveraging Websense award-winning Data Loss Prevention technology, and it can enforce polices to protect sensitive and regulated data from leaving the organization based on the user, the actual data, and the destination of that data. These policies set by organizations can be created based on users or even groups as defined in the Microsoft Windows Active Directory, the Sun Java System Directory Server, RADIUS (remote authentication dial in user service), and Novell eDirectory access via Lightweight Directory Access Control. By leveraging more than 1,800 proprietary analytical engines as well as the patent- pending Websense ThreatSeeker™ Network, the Websense Web Security Gateway analyzes and classifies in real-time Web site content accessed by end users. The ThreatSeeker Network provides intelligence to address malicious content with the most up-to-date protection. Over the years Websense has made many enhancements to this system, and its acquisition of Defensio in early 2009 is a recent example. Defensio's ability to sit in social networks and provide content and blog-spam intelligence into the ThreatSeeker™ Network puts Websense ahead in detecting and protecting end users, while these new sites, links and content are simply not seen by traditional email and Web detection systems. This WSG technology also has been incorporated in the v10000 gateway appliance, which was developed to especially address Web 2.0 threats and to mitigate the risks of leveraging Web 2.0 for its obvious benefits. Websense Web security is also available © 2009 Frost & Sullivan
  • 3. as a Software as a Service (SaaS) solution which provides another key deployment option and advantage. Websense Hosted Web Security is a highly scalable, zero- latency SaaS option that ensures only clean traffic reaches customer networks, thus reducing time and costs associated with administration, maintenance and support and freeing IT to focus on strategic business initiatives. Traffic is routed through globally distributed data centers and scanned in real time for malicious and inappropriate content using a combination of commercial antivirus scanning, the Websense ThreatSeeker Network, and correlated heuristics. The service utilizes a multi-tenant architecture with purpose-built high-performance proxies and is backed by industry- leading SLAs to ensure uptime and availability. Best Practices One of the important features of the Websense Web Security Gateway solution is its ability to support the rising dynamics of the Web by conducting real-time content analysis of the most frequented Web sites. Although, these popular Web sites perform daily updates to their Web pages, WSG seamlessly tracks these sites constantly across millions of individual Web pages. Due to the immense popularity of social networking sites such as Facebook and Twitter, Websense has begun offering Web security solutions directly on the client sites to enhance real-time threat protection. With its deep knowledge of the Web and real-time dynamic threat protection, Websense provides complete coverage, visibility, and control over who can send what information, where, and how, enabling corporations to keep their networks and data safe while still leveraging the benefits of Web 2.0. Websense has been awarded a total of 18 patents so far. A majority of the issued patents are in the area of Web filtering and content filtering, which include patents from filtering techniques to flexible filtering technologies. The company has approximately 100 patents in the filing process. Conclusion Frost & Sullivan is pleased to present Websense with the 2009 Award for Product Innovation of the Year in Web Content Management for its development of an advanced, innovative policy-based control Web security solution, which can cope with the dynamic needs of today’s internet communication spectrum while addressing the latest security threats. © 2009 Frost & Sullivan
  • 4. Award Description The Frost & Sullivan Award for Product Innovation is presented each year to the company that has demonstrated excellence in new products and technologies within its industry. The recipient company has shown innovation by launching a broad line of emerging products and technologies. Research Methodology To choose a recipient of this Award, the analyst team tracks all new product launches, research and development spending, products in development, and new product features and modifications. This is accomplished through interviews with the market participants and extensive secondary and technology research. All new product launches and new products in development in each company are compared and evaluated based on degree of innovation and customer satisfaction. Companies are then ranked by number of new product launches and new products in development. Measurement Criteria In addition to the methodology described above, there are specific criteria used to determine final competitor rankings in this industry. The recipient of this Award has excelled based on one or more of the following criteria:  Significance of new product(s) in its industry  Competitive advantage of new product(s) in its industry  Product innovation in terms of unique or revolutionary technology  Product acceptance in the marketplace  New product value-added services provided to customers  Number of competitors with similar product(s). About Best Practices Frost & Sullivan Best Practices Awards recognize companies in a variety of regional and global markets for demonstrating outstanding achievement and superior performance in areas such as leadership, technological innovation, customer service, and strategic product development. Industry analysts compare market participants and measure performance through in-depth interviews, analysis, and extensive secondary research in order to identify best practices in the industry. About Frost & Sullivan Frost & Sullivan, the Growth Consulting Company, partners with clients to accelerate their growth. The company's Growth Partnership Services, Growth Consulting and Career Best Practices empower clients to create a growth focused culture that generates, evaluates and implements effective growth strategies. Frost & Sullivan employs over 45 years of experience in partnering with Global 1000 companies, emerging businesses © 2009 Frost & Sullivan and the investment community from more than 30 offices on six continents. For more information about Frost & Sullivan’s Growth Partnerships, visit http://www.frost.com. www.awards.frost.com