In pictures: The 12 most powerful security companies

It's not just revenues and size, influence counts and excellence matters.

As the official point for Android open-source code, Google plays a major role in guiding the security architecture of mobile devices based on it. In Google search, “Google hacking” techniques can be used to locate vulnerable websites. And with its cloud-based applications and large user base, Google infrastructure is a target of government cyber-espionage and hackers. All this means Google executive chairman Eric Schmidt can find his day filled with security and privacy controversies worldwide.

13 of 13
VIEW ALL THUMBNAILS

Comments on this image

There are currently no comments for this image.

Comments are now closed.

Related Slideshows

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?