Results 2017

Editors Choice Award

WINNER: No More Ransom

Kaspersky, EC3, Dutch Police, McAfee

Law enforcement and IT security companies have joined forces to disrupt cyber-criminal businesses with ransomware connections. The “No More Ransom” website is an initiative by the National High Tech Crime Unit of the Netherlands’ police, Europol’s European Cybercrime Centre (EC3) and two cyber-security companies – ...

Excellence Awards: Threat Solutions

WINNER: Carbon Black Cb Defense

Carbon Black

Cb Defense differs significantly from its competition because it focuses on preventing an attacker’s behaviours and not simply blocking files. Competing products, specifically legacy AV and machine learning AV, detect malware at the moment of execution. Cb Defense focuses on more than just malware. Cb Defense prevents nonmalware attac...

Highly Commended: CylancePROTECT®

Cylance

Finalist: Lastline Enterprise

Lastline

Finalist: Bromium Secure Platform

Bromium

Finalist: Fidelis Enterprise

Fidelis Cybersecurity

Finalist: TrapX DeceptionGrid

TrapX Security

WINNER: AlienVault USM Anywhere

AlienVault

AlienVault’s new USM Anywhere offers customers the same comprehensive, unified solution across cloud, hybrid cloud and on-premises environments. It is claimed to be the first all-in-one SaaS security monitoring platform designed to centralise threat detection, incident response and compliance management across these environments f...

Highly Commended: Bitdefender Security for AWS

Bitdefender

Finalist: Skyhigh Security Intelligence Platform

Skyhigh Networks

Finalist: BooleBox Secure Sharing

Boole Server srl

Finalist: Bitglass cloud access security broker (CASB)

Bitglass

WINNER: EnCase Endpoint Investigator and EnCase Forensic

Guidance Software

EnCase Forensic and EnCase Endpoint Investigator provide a powerful, judiciallyaccepted platform that serves as the foundation for corporations, government agencies and law enforcement to conduct digital investigations of any kind. Guidance knows the complexities of criminal investigations and what it takes to get to “case closed&rdqu...

Finalist: SureView Insider Threat

Forcepoint

Finalist: MSP Risk Intelligence

SolarWinds

Finalist: Veriato

Veriato Investigator

Finalist: ZDD Xanadata from Unipart Cyber Scurity

Unipart Cyber Security

WINNER: Druva Platform

Druva

Druva provides a platform for data protection in the Cloud. Companies can protect critical business information that is created and stored within remote office servers, virtualised environments, cloud applications and laptops, tablets and phones. More than 40 percent of company data exists outside the enterprise data centre. Data on lap...

Finalist: Databarracks DRaaS

Databarracks

Finalist: Zerto Virtual Replication

Zerto

Finalist: Everbridge Platform

Everbridge

WINNER: Sophos Email on Sophos Central

Sophos

Sophos Email is a clouddelivered secure email gateway engineered to keep businesses safe from email threats. It stops spam, phishing, malware and data loss and keeps employees productive. For SMEs that want to consolidate protection, it lets them control their email security alongside endpoint, mobile, web and wireless protectio...

Highly Commended: Mimecast Targeted Threat Protection

Mimecast

Finalist: Libra Esva

Libraesva Srl

Finalist: SonicWall Email Security

SonicWall

Finalist: Agari Enterprise Protect

Agari

WINNER: Proofpoint Email Fraud Defense

Proofpoint

Highly-targeted impostor email attacks, also known as business email compromise (BEC) scams, are one of the biggest threats to the enterprise today. The majority of these attacks spoof legitimate domains from trusted internal and third-party senders. Proofpoint’s Email Fraud Defense detects, blocks and responds to impostor email t...

Finalist: Protector

Trusted Knight

Finalist: IBM Trusteer

IBM

Finalist: NuDetect

NuData Security

Finalist: iovation Fraud Protection

iovation

WINNER: Sailpoint's Open Identity Management Platform

Sailpoint

To help enterprises adapt to new security strategies and embrace a user-centric approach, SailPoint introduced the first Open Identity and Access Management Platform, believed to be the most comprehensive, end-to-end suite of on-premises and cloud-based (Identity-as-aService) solutions for compliance, provisioning, password mana...

Finalist: Integrated Privileged Access Management Platform

Balabit and Lieberman Software

Finalist: Omada Identity Suite

Omada

Finalist: IBM Identity Cloud Service

IBM

Finalist: IBM Identity Governance and Intelligence

IBM

Finalist: Centrify Identity Service

Centrify

WINNER: IBM Security - Managed Security Services

IBM

IBM is an industry-leading managed security services partner which can provide a high level of personalised protection from attacks, including in the cloud. IBM has differentiated itself from other managed security services providers by making significant investments in people, facilities, tools and cuttingedge cognitive technologies to...

Highly Commended: ZENEDGE Malicious Bot Detection Managed Security Services

ZENEDGE

Highly Commended: Threat2Alert from Nettitude

Nettitude

Finalist: Protection Service for Business (PSB)

F-Secure

Finalist: ECS Managed SOC Service

ECS

WINNER: Secure Mobile Gateway

Wandera

Mobile is the new frontier for cyber-threats. As adoption of corporate mobility continues to grow, so too does the number of attacks. Wandera provides enterprise-grade threat defence against these mobile security risks, keeping devices secure across all four levels of protection as identified by Gartner including app scans, network secu...

Highly Commended: IBM Security - Best Mobile Secuirty Solution. IBM MaaS360 UEM

IBM Security

Finalist: MobileIron Access

MobileIron

Finalist: Proofpoint Mobile Defense

Proofpoint

Finalist: Freedome for Business (FFB)

F-Secure

Finalist: CipherCloud Mobile App

CipherCloud

WINNER: YubiKey 4

Yubico

Trillions of pounds are lost and billions of internet users risk getting their online accounts hacked because of compromised static credentials. YubiKey provides an additional layer of security beyond the password with the touch of a button. YubiKey 4 introduces an ease-of-use that has historically been a barrier to entry for large-scale adoption o...

Finalist: OpenOTP Enterprise MFA Server

RCDevs

Finalist: SafeNet Authentication Service

Gemalto

Finalist: CensorNet MFA

CensorNet

Finalist: Duo Security's Trusted Access Solution

Duo Security

WINNER: CounterACT

Forescout

Enterprise networks contain a vast, increasing range of devices: computers, mobiles, industrial controls, VMs and other ‘things’. Diversity accelerates hybrid IT environments, and IoT is becoming the norm. With increasing diversity, the complexity and confusion of security increases. ForeScout has pioneered an ag...

Finalist: AppGate

Cryptzone

Finalist: F5 Networks Big IP

F5 Networks

Finalist: Cisco Identity Services Engine

Cisco

Finalist: Network Sentry

Bradford Networks

WINNER: LightCyber Magna

LightCyber now part of Palo Alto Networks

The LightCyber Magna platform directly addresses the data breach crisis by quickly and accurately detecting external and internal attackers working towards a data breach. Currently, the industry average dwell time is five months, giving attackers healthy odds to successfully reach their objectives. Traditional security is simply not effecti...

Highly Commended: Securonix SNYPR Security Analytics Platform

Securonix

Finalist: The Vectra cybersecurity platform

Vectra Networks

Finalist: NuDetect TM

NuData Security

Finalist: CyberArk Privileged Threat Analytics

CyberArk

Finalist: ZoneFox AI

ZoneFox

Finalist: Cisco Stealthwatch

Cisco

WINNER: Splunk Enterprise Security 4.5 (ES) with Adaptive Response

Splunk

Advanced cyber adversaries are leveraging new attack methods that span multiple domains, launching devastating attacks that leave enterprises vulnerable. Despite advancements in security technologies, most solutions are not designed to work together or out of the box. Splunk Enterprise Security 4.5 (ES) is a next-generation SIEM platform us...

Finalist: IBM Security - Best SIEM: IBM QRadar

IBM

Finalist: LogRhythm Security Intelligence and Analytics Platform

LogRhythm

Finalist: Trustwave Managed SIEM

Trustwave

Finalist: AlienVault Unified Security Management (USM)

AlienVault

WINNER: Sophos XG Firewall

Sophos

Sophos XG Firewall makes managing advanced protection simple by providing more defence in a single appliance than any other firewall. Sophos XG Firewall provides unprecedented visibility into your network, users and applications right from the control centre. The Security Heartbeat pulses real-time information about suspicious behaviour or mali...

Finalist: SonicWall TZ Series Wireless Series

SonicWall

Finalist: 5nine Cloud security v9

5nine Cloud security

Finalist: Cisco Meraki MX

Cisco

Finalist: WatchGuard Firebox T70

WatchGuard Technologies

WINNER: Netskope Cloud DLP (intergrated with the Netskope Active Platform)

Netskope

The proliferation of cloud services has led to an exponential rise in the volume of sensitive business data stored in and shared across cloud environments. Netskope Cloud DLP enables IT to protect against intentional and unintentional data theft and loss across all SaaS, IaaS and PaaS solutions. Through extensive data classification algorithms&...

Finalist: Digital Guardian for DLP

Digital Guardian

Finalist: Security Sheriff

Cryptzone

Finalist: AP-DATA & AP-ENDPOINT

Forcepoint

Finalist: BooleBox Secure Sharing

Boole Server srl

WINNER: Core Security 2017 Vulnerability Management Submission

Core Security

Core Vulnerability Insight allows customers to evolve their vulnerability management programme and improve their overall security posture. It offers greater scalability and advanced attack path analytics, to help users accurately identify the vulnerabilities that pose the greatest threat to critical business assets. It also allows for multiple ...

Highly Commended: Rapid7 Nexpose: Find all the vulnerabilities

Rapid7

Finalist: SecurityCenter Continuous View®

Tenable

Finalist: F-Secure Radar with Riddler plug-in

F-Secure

Finalist: Skybox Vulnerability Control

Skybox Security

WINNER: Sophos

Organisations need comprehensive protection from the latest web threats. IT managers also need to be able to control web usage to ensure employee productivity. The way users access the web has changed. They use multiple devices and cloud services and consume these anywhere, both in the office and remotely. IT teams need a solution that enforces...

Finalist: Blue Coat Secure Web Gateway

Symantec

Finalist: White Hat Security

Excellence Awards: Industry Leadership

WINNER: Symantec

Symantec is the largest cyber-security company in the world, helping consumers, small businesses and the world’s leading enterprises secure and manage their data. The company counts 90 percent of the Fortune 500 as customers of its SSL certificates, and has the largest market share (31.5 percent) and protection capabilities in end...

Highly Commended: IBM

Finalist: Malwarebytes

Finalist: Crowdstrike

Finalist: Egress Software Technologies

Finalist: Cylance

WINNER: Aqua Security

Virtual containers are rapidly being adopted in enterprise deployments, but they present particular security challenges due to the scale, agility and open nature of the container operating environment. The rapid DevOps process that is often behind container deployments and the inclusion of many open source components require tight governanc...

Highly Commended: Redscan Cyber Security

Finalist: Coronet

Finalist: Verint Threat Protection System

Finalist: Vectra Networks

WINNER: Proofpoint Essentials

Proofpoint

Proofpoint Essentials provides an extremely high level of follow-the-sun support with consistently high levels of customer service satisfaction scores. Global support 24/7/365 is included as part of the Proofpoint Essentials subscription with phone, email and live chat communication options. The support team not only contributes to Proofpoint&r...

Highly Commended: Netwrix Auditor

Netwrix Corporation

Finalist: WatchGuard Firebox M300

WatchGuard Technologies

Finalist: FGX-Web

Foregenix

Finalist: Bitdefender Gravity Zone

Bitdefender

WINNER: CylancePROTECT

Cylance

Complementing Cylance’s revolutionary technology is a set of consulting services that provide pre-attack penetration and vulnerability testing, compromise assessments and post-attack incident response. Its experts organise information so customers can see their full security picture, and then offer strategic and tactical recommendatio...

Finalist: Skybox Security Suite

Skybox

Finalist: WhiteHat Security - Sentinel Platform

Whitehat Security

Finalist: Symantec DLP 14.5

Symantec

Finalist: Neustar SiteProtect

Neustar

WINNER: Barracuda Networks

Barracuda strives to provide fanatical and awesome customer service with live people always on the receiving end to help troubleshoot – there are no phone trees and no automated service. Barracuda offers 24/7 phone-based technical support as part of the purchase price. Customers also can purchase additional options as part of an annual subscr...

Finalist: Avecto

Finalist: Globalscape

Finalist: Ciphercloud

Finalist: Proofpoint

WINNER: IRM SYNERGi

IRM

IRM works to defend organisations against cyber threats. Founded in 1998, IRM provides visibility and control across entire cyber landscapes by combining more than 17 years of consultancy with advanced software technology.  By covering all aspects of cyber security from PCI compliance to automated threat intelligence, IRM supports orga...

Highly Commended: Netwrix Auditor

Netwrix

Finalist: TRUSTArc Assessment Manager

TRUSTArc

Finalist: TRITON AP-DATA

Forcepoint

Finalist: SureCloud Platform for Risk Management and Compliance

SureCloud

Finalist: IBM Resilient IRP Privacy Module

IBM

WINNER: ImmuniWeb®, application security testing platform

High-Tech Bridge SA

ImmuniWeb Web Security Testing Platform leverages a machine learning technology for intelligent automation of web vulnerability scanning. Complemented by human intelligence, it detects the most sophisticated vulnerabilities and contractually guarantees zero false-positives. The first prototype of ImmuniWeb was launched in 2014 based on High-Tec...

Finalist: ZoneFox AI

ZoneFox

Finalist: Watson for Cyber Security

IBM

Finalist: Recorded Future Intel Cards

Recorded Future

Finalist: Sqrrl

Sqrrl

Professional Categories

WINNER: The Information Security Group (ISG) at Royal Holloway University of London (RHUL)

The Information Security Group (ISG) at Royal Holloway, University of London, is a world-leading interdisciplinary research group dedicated to research and education in information (cyber) security. It has been recognised by EPSRC and GCHQ as one of eight Academic Centres of Excellence in Cyber Security Research in the UK. The ISG contains ...

Finalist: Cyber Security Challenge Schools Programme

Finalist: Open University Online Mooc (Mass open online course) on Cyber Security

WINNER: Ed Tucker, Head of cyber security at HMRC

Ed Tucker has been working in IT and Security for more than 15 years. He currently leads HM Revenues and Customer’s Cyber Security and Response capability, looking into areas such as Online Fraud, Hacking Analysis & Capability Scoring, Forensic Investigations, Cyber Threat. Previously, Tucker was service security manag...

Finalist: Phil Cracknell, CISO Homeserve

Finalist: Michele Hanson, CISO, Transport for London

WINNER: Camelot

The team at Camelot has been re-built over the past 24 months. It started from humble beginnings with a security team of just two people following the departure, over the preceding three-month period, of the rest of the team. The first 12 months was tough for the team as it had to both maintain business as usual whilst recruiting. With no h...

Highly Commended: Canon Europe

Finalist: Skyscanner

WINNER: PhishMe Simulator and Reporter

PhishMe

The PhishMe methodology turns every employee into an IT security-aware professional, transforming a company’s biggest liability into its strongest security asset. The behavioural conditioning methods prepare employees to recognise and resist malicious phishing attempts. Employees are conditioned not only to identify and report phishing at...

Finalist: (ISC)2 SSCP

Finalist: Certified Information Security Manager (CISM) Certification

ISACA

Finalist: (ISC)2 CCSP

Finalist: (ISC)2 CISSP

Book of the night 2017

Gallery

Website Menu