Results 2017

Editors Choice Award

WINNER: No More Ransom

Kaspersky, EC3, Dutch Police, McAfee

Law enforcement and IT security companies have joined forces to disrupt cyber-criminal businesses with ransomware connections. The “No More Ransom” website is an initiative by the National High Tech Crime Unit of the Netherlands’ police, Europol’s European Cybercrime Centre (EC3) and two cyber-security companies – ...

Excellence Awards: Threat Solutions

WINNER: Carbon Black Cb Defense

Carbon Black

Cb Defense differs significantly from its competition because it focuses on preventing an attacker’s behaviours and not simply blocking files. Competing products, specifically legacy AV and machine learning AV, detect malware at the moment of execution. Cb Defense focuses on more than just malware. Cb Defense prevents nonmalware attac...

Highly Commended: CylancePROTECT®


Finalist: Lastline Enterprise


Finalist: Bromium Secure Platform


Finalist: Fidelis Enterprise

Fidelis Cybersecurity

Finalist: TrapX DeceptionGrid

TrapX Security

WINNER: AlienVault USM Anywhere


AlienVault’s new USM Anywhere offers customers the same comprehensive, unified solution across cloud, hybrid cloud and on-premises environments. It is claimed to be the first all-in-one SaaS security monitoring platform designed to centralise threat detection, incident response and compliance management across these environments f...

Highly Commended: Bitdefender Security for AWS


Finalist: Skyhigh Security Intelligence Platform

Skyhigh Networks

Finalist: BooleBox Secure Sharing

Boole Server srl

Finalist: Bitglass cloud access security broker (CASB)


WINNER: EnCase Endpoint Investigator and EnCase Forensic

Guidance Software

EnCase Forensic and EnCase Endpoint Investigator provide a powerful, judiciallyaccepted platform that serves as the foundation for corporations, government agencies and law enforcement to conduct digital investigations of any kind. Guidance knows the complexities of criminal investigations and what it takes to get to “case closed&rdqu...

Finalist: SureView Insider Threat


Finalist: MSP Risk Intelligence


Finalist: Veriato

Veriato Investigator

Finalist: ZDD Xanadata from Unipart Cyber Scurity

Unipart Cyber Security

WINNER: Druva Platform


Druva provides a platform for data protection in the Cloud. Companies can protect critical business information that is created and stored within remote office servers, virtualised environments, cloud applications and laptops, tablets and phones. More than 40 percent of company data exists outside the enterprise data centre. Data on lap...

Finalist: Databarracks DRaaS


Finalist: Zerto Virtual Replication


Finalist: Everbridge Platform


WINNER: Sophos Email on Sophos Central


Sophos Email is a clouddelivered secure email gateway engineered to keep businesses safe from email threats. It stops spam, phishing, malware and data loss and keeps employees productive. For SMEs that want to consolidate protection, it lets them control their email security alongside endpoint, mobile, web and wireless protectio...

Highly Commended: Mimecast Targeted Threat Protection


Finalist: Libra Esva

Libraesva Srl

Finalist: SonicWall Email Security


Finalist: Agari Enterprise Protect


WINNER: Proofpoint Email Fraud Defense


Highly-targeted impostor email attacks, also known as business email compromise (BEC) scams, are one of the biggest threats to the enterprise today. The majority of these attacks spoof legitimate domains from trusted internal and third-party senders. Proofpoint’s Email Fraud Defense detects, blocks and responds to impostor email t...

Finalist: Protector

Trusted Knight

Finalist: IBM Trusteer


Finalist: NuDetect

NuData Security

Finalist: iovation Fraud Protection


WINNER: Sailpoint's Open Identity Management Platform


To help enterprises adapt to new security strategies and embrace a user-centric approach, SailPoint introduced the first Open Identity and Access Management Platform, believed to be the most comprehensive, end-to-end suite of on-premises and cloud-based (Identity-as-aService) solutions for compliance, provisioning, password mana...

Finalist: Integrated Privileged Access Management Platform

Balabit and Lieberman Software

Finalist: Omada Identity Suite


Finalist: IBM Identity Cloud Service


Finalist: IBM Identity Governance and Intelligence


Finalist: Centrify Identity Service


WINNER: IBM Security - Managed Security Services


IBM is an industry-leading managed security services partner which can provide a high level of personalised protection from attacks, including in the cloud. IBM has differentiated itself from other managed security services providers by making significant investments in people, facilities, tools and cuttingedge cognitive technologies to...

Highly Commended: ZENEDGE Malicious Bot Detection Managed Security Services


Highly Commended: Threat2Alert from Nettitude


Finalist: Protection Service for Business (PSB)


Finalist: ECS Managed SOC Service


WINNER: Secure Mobile Gateway


Mobile is the new frontier for cyber-threats. As adoption of corporate mobility continues to grow, so too does the number of attacks. Wandera provides enterprise-grade threat defence against these mobile security risks, keeping devices secure across all four levels of protection as identified by Gartner including app scans, network secu...

Highly Commended: IBM Security - Best Mobile Secuirty Solution. IBM MaaS360 UEM

IBM Security

Finalist: MobileIron Access


Finalist: Proofpoint Mobile Defense


Finalist: Freedome for Business (FFB)


Finalist: CipherCloud Mobile App


WINNER: YubiKey 4


Trillions of pounds are lost and billions of internet users risk getting their online accounts hacked because of compromised static credentials. YubiKey provides an additional layer of security beyond the password with the touch of a button. YubiKey 4 introduces an ease-of-use that has historically been a barrier to entry for large-scale adoption o...

Finalist: OpenOTP Enterprise MFA Server


Finalist: SafeNet Authentication Service


Finalist: CensorNet MFA


Finalist: Duo Security's Trusted Access Solution

Duo Security



Enterprise networks contain a vast, increasing range of devices: computers, mobiles, industrial controls, VMs and other ‘things’. Diversity accelerates hybrid IT environments, and IoT is becoming the norm. With increasing diversity, the complexity and confusion of security increases. ForeScout has pioneered an ag...

Finalist: AppGate


Finalist: F5 Networks Big IP

F5 Networks

Finalist: Cisco Identity Services Engine


Finalist: Network Sentry

Bradford Networks

WINNER: LightCyber Magna

LightCyber now part of Palo Alto Networks

The LightCyber Magna platform directly addresses the data breach crisis by quickly and accurately detecting external and internal attackers working towards a data breach. Currently, the industry average dwell time is five months, giving attackers healthy odds to successfully reach their objectives. Traditional security is simply not effecti...

Highly Commended: Securonix SNYPR Security Analytics Platform


Finalist: The Vectra cybersecurity platform

Vectra Networks

Finalist: NuDetect TM

NuData Security

Finalist: CyberArk Privileged Threat Analytics


Finalist: ZoneFox AI


Finalist: Cisco Stealthwatch


WINNER: Splunk Enterprise Security 4.5 (ES) with Adaptive Response


Advanced cyber adversaries are leveraging new attack methods that span multiple domains, launching devastating attacks that leave enterprises vulnerable. Despite advancements in security technologies, most solutions are not designed to work together or out of the box. Splunk Enterprise Security 4.5 (ES) is a next-generation SIEM platform us...

Finalist: IBM Security - Best SIEM: IBM QRadar


Finalist: LogRhythm Security Intelligence and Analytics Platform


Finalist: Trustwave Managed SIEM


Finalist: AlienVault Unified Security Management (USM)


WINNER: Sophos XG Firewall


Sophos XG Firewall makes managing advanced protection simple by providing more defence in a single appliance than any other firewall. Sophos XG Firewall provides unprecedented visibility into your network, users and applications right from the control centre. The Security Heartbeat pulses real-time information about suspicious behaviour or mali...

Finalist: SonicWall TZ Series Wireless Series


Finalist: 5nine Cloud security v9

5nine Cloud security

Finalist: Cisco Meraki MX


Finalist: WatchGuard Firebox T70

WatchGuard Technologies

WINNER: Netskope Cloud DLP (intergrated with the Netskope Active Platform)


The proliferation of cloud services has led to an exponential rise in the volume of sensitive business data stored in and shared across cloud environments. Netskope Cloud DLP enables IT to protect against intentional and unintentional data theft and loss across all SaaS, IaaS and PaaS solutions. Through extensive data classification algorithms&...

Finalist: Digital Guardian for DLP

Digital Guardian

Finalist: Security Sheriff




Finalist: BooleBox Secure Sharing

Boole Server srl

WINNER: Core Security 2017 Vulnerability Management Submission

Core Security

Core Vulnerability Insight allows customers to evolve their vulnerability management programme and improve their overall security posture. It offers greater scalability and advanced attack path analytics, to help users accurately identify the vulnerabilities that pose the greatest threat to critical business assets. It also allows for multiple ...

Highly Commended: Rapid7 Nexpose: Find all the vulnerabilities


Finalist: SecurityCenter Continuous View®


Finalist: F-Secure Radar with Riddler plug-in


Finalist: Skybox Vulnerability Control

Skybox Security

WINNER: Sophos

Organisations need comprehensive protection from the latest web threats. IT managers also need to be able to control web usage to ensure employee productivity. The way users access the web has changed. They use multiple devices and cloud services and consume these anywhere, both in the office and remotely. IT teams need a solution that enforces...

Finalist: Blue Coat Secure Web Gateway


Finalist: White Hat Security

Excellence Awards: Industry Leadership

WINNER: Symantec

Symantec is the largest cyber-security company in the world, helping consumers, small businesses and the world’s leading enterprises secure and manage their data. The company counts 90 percent of the Fortune 500 as customers of its SSL certificates, and has the largest market share (31.5 percent) and protection capabilities in end...

Highly Commended: IBM

Finalist: Malwarebytes

Finalist: Crowdstrike

Finalist: Egress Software Technologies

Finalist: Cylance

WINNER: Aqua Security

Virtual containers are rapidly being adopted in enterprise deployments, but they present particular security challenges due to the scale, agility and open nature of the container operating environment. The rapid DevOps process that is often behind container deployments and the inclusion of many open source components require tight governanc...

Highly Commended: Redscan Cyber Security

Finalist: Coronet

Finalist: Verint Threat Protection System

Finalist: Vectra Networks

WINNER: Proofpoint Essentials


Proofpoint Essentials provides an extremely high level of follow-the-sun support with consistently high levels of customer service satisfaction scores. Global support 24/7/365 is included as part of the Proofpoint Essentials subscription with phone, email and live chat communication options. The support team not only contributes to Proofpoint&r...

Highly Commended: Netwrix Auditor

Netwrix Corporation

Finalist: WatchGuard Firebox M300

WatchGuard Technologies

Finalist: FGX-Web


Finalist: Bitdefender Gravity Zone




Complementing Cylance’s revolutionary technology is a set of consulting services that provide pre-attack penetration and vulnerability testing, compromise assessments and post-attack incident response. Its experts organise information so customers can see their full security picture, and then offer strategic and tactical recommendatio...

Finalist: Skybox Security Suite


Finalist: WhiteHat Security - Sentinel Platform

Whitehat Security

Finalist: Symantec DLP 14.5


Finalist: Neustar SiteProtect


WINNER: Barracuda Networks

Barracuda strives to provide fanatical and awesome customer service with live people always on the receiving end to help troubleshoot – there are no phone trees and no automated service. Barracuda offers 24/7 phone-based technical support as part of the purchase price. Customers also can purchase additional options as part of an annual subscr...

Finalist: Avecto

Finalist: Globalscape

Finalist: Ciphercloud

Finalist: Proofpoint



IRM works to defend organisations against cyber threats. Founded in 1998, IRM provides visibility and control across entire cyber landscapes by combining more than 17 years of consultancy with advanced software technology.  By covering all aspects of cyber security from PCI compliance to automated threat intelligence, IRM supports orga...

Highly Commended: Netwrix Auditor


Finalist: TRUSTArc Assessment Manager




Finalist: SureCloud Platform for Risk Management and Compliance


Finalist: IBM Resilient IRP Privacy Module


WINNER: ImmuniWeb®, application security testing platform

High-Tech Bridge SA

ImmuniWeb Web Security Testing Platform leverages a machine learning technology for intelligent automation of web vulnerability scanning. Complemented by human intelligence, it detects the most sophisticated vulnerabilities and contractually guarantees zero false-positives. The first prototype of ImmuniWeb was launched in 2014 based on High-Tec...

Finalist: ZoneFox AI


Finalist: Watson for Cyber Security


Finalist: Recorded Future Intel Cards

Recorded Future

Finalist: Sqrrl


Professional Categories

WINNER: The Information Security Group (ISG) at Royal Holloway University of London (RHUL)

The Information Security Group (ISG) at Royal Holloway, University of London, is a world-leading interdisciplinary research group dedicated to research and education in information (cyber) security. It has been recognised by EPSRC and GCHQ as one of eight Academic Centres of Excellence in Cyber Security Research in the UK. The ISG contains ...

Finalist: Cyber Security Challenge Schools Programme

Finalist: Open University Online Mooc (Mass open online course) on Cyber Security

WINNER: Ed Tucker, Head of cyber security at HMRC

Ed Tucker has been working in IT and Security for more than 15 years. He currently leads HM Revenues and Customer’s Cyber Security and Response capability, looking into areas such as Online Fraud, Hacking Analysis & Capability Scoring, Forensic Investigations, Cyber Threat. Previously, Tucker was service security manag...

Finalist: Phil Cracknell, CISO Homeserve

Finalist: Michele Hanson, CISO, Transport for London

WINNER: Camelot

The team at Camelot has been re-built over the past 24 months. It started from humble beginnings with a security team of just two people following the departure, over the preceding three-month period, of the rest of the team. The first 12 months was tough for the team as it had to both maintain business as usual whilst recruiting. With no h...

Highly Commended: Canon Europe

Finalist: Skyscanner

WINNER: PhishMe Simulator and Reporter


The PhishMe methodology turns every employee into an IT security-aware professional, transforming a company’s biggest liability into its strongest security asset. The behavioural conditioning methods prepare employees to recognise and resist malicious phishing attempts. Employees are conditioned not only to identify and report phishing at...

Finalist: (ISC)2 SSCP

Finalist: Certified Information Security Manager (CISM) Certification


Finalist: (ISC)2 CCSP

Finalist: (ISC)2 CISSP

Book of the night 2017


Website Menu