Results 2018

Editor's Choice Award

WINNER: National Cyber Security Centre

The National Cyber Security Centre - the NCSC - has quickly established itself as the public-face of GCHQ, making this country’s cyberintelligence expertise available to a wider public, playing a coordinating role in responding to attacks, delivering specific advice on new threats, and generally contributing to increase the re...

Excellence Awards: Threat Solutions

WINNER: SecureAuth

SecureAuth + Core Security

SecureAuth has developed an effective and flexible solution that ensures every identity authenticating is known and verified from sign-in to log-off. SecureAuth uses techniques that can check something they have (e.g. a device), something they know (e.g. knowledgebased questions) and something they are (e.g. biometric) creating infinitely custo...

Highly Commended: OneLogin

Ping Identity Platform

Ping Identity

SafeNet Trusted Access

Gemalto

Duo Security

VASCO

WINNER: Verint Threat Protection System

Verint

Siloed detection and investigation tools, multiple, unprioritised alerts and insufficient automation exacerbated by cyberskills shortage make it difficult to fully detect, understand, and remediate cyberattacks quickly. Many attacks go undetected for months. Verint Threat Protection System, the first unified, preintegrated i...

Highly Commended: Fidelis Cybersecurity

Bitdefender Gravity Zone Elite

Bitdefender

Lastline Enterprise

Proofpoint Targeted Attack Protection

Proofpoint

Sophos Intercept X

Sophos

CrowdStrike Falcon

Crowdstrike

WINNER: Exabeam Advanced Analytics

Exabeam

Exabeam pairs automated threat detection with rapid search and investigation technology. Its proprietary Session Data model automatically stitches together user activities into timelines. These are used to baseline normal behaviour and identify anomalous activity. This allows analysts to tackle the often-labour-intensive task of tracking lateral mo...

Highly Commended: Varonis Data Security Platform

Varonis

ZoneFox

Forcepoint UEBA

Forcepoint UK

Splunk User Behavior Analytics

Splunk

WINNER: USM Anywhere

AlienVault

AlienVault USM Anywhere enables organisations with limited resources, expertise, and budgets to benefit from the latest, cutting-edge security technologies. It’s the industry’s first all-in-one SaaS security monitoring platform that centralises and simplifies threat detection, incident response, and compliance manage...

Highly Commended: Cloud Defender

Alert Logic

SaaS Protection

Proofpoint

My1Login

Vormetric Transparent Encryption, Live Data Transformation and Container Security

Thales

Forcepoint CASB

Forcepoint

WINNER: Code42 Security Center

Code42

First-generation DLP solutions prevented inadvertent loss of sensitive data from being transferred outside the corporate network. The current generation is evolving fast to prevent data loss from insider threats and malicious external attacks. Consequently, there’s an increased focus on protecting endpoint devices, which hold 60 per c...

Highly Commended: Endpoint Protector

CoSoSys

Digital Guardian Data Protection Platform

Digital Guardian

Forcepoint DLP

Forcepoint UK

Proofpoint Information Protection Platform

Proofpoint

DLP for the Cloud & Mobile Era

Bitglass

WINNER: TrapX Security DeceptionGrid

TrapX Security

DeceptionGrid is used to bait, engage, and ultimately trap hackers that have penetrated a network. Deception enhances visibility and helps identify attackers that have bypassed all other cyber defences. Deception fills your network with lures (tokens) and decoys (traps) to deceive and detect hackers within the network. Deception surrounds t...

Highly Commended: Attivo Networks® ThreatDefend™ Deception and Response Platform

Attivo Networks

InsightIDR

Rapid7

GuardiCore Centra Security Platform

GuardiCore

WINNER: FireEye Email Solution

FireEye

Email is the highest volume data ingress point, making it the most vulnerable vector for cyber-attacks. FireEye Email Security catches traditional, mass email, phishing attacks with known malicious attachments, links and content, and emerging and targeted attacks as they occur. Emails are analysed for threats hidden in passwordp...

Highly Commended: Proofpoint Email Protection

Proofpoint

Agari Email Trust Platform

Agari

Egress Switch

Egress Software Technologies

Barracuda Essentials for Email Security

Barracuda

Glasswall FileTrust for Enterprise Email

Glasswall Solutions

WINNER: Symantec Endpoint Protection

Symantec

Symantec’s machine learning and AI capabilities are not only some of the most sophisticated in the security industry, but they are matched with a broad suite of advanced security capabilities like Memory Exploit Mitigation, virtual machine emulation, as well as traditional anti-virus and IPS, to deliver the industry’s mo...

Highly Commended: IBM BigFix

IBM

Webroot SecureAnywhere Business Endpoint Protection

Webroot

Sophos Intercept X

Sophos

Carbon Black

Trustwave

WINNER: CyberArk Privileged Account Security Solution

CyberArk

The CyberArk Privileged Account Security Solution expands access control to any IT environment, from on-premises and hybrid cloud to DevOps, helping organisations prioritise risk management without sacrificing efficiency, productivity or innovation. Specifically, in DevOps, secrets - which consist of privileged accounts, SSH...

Highly Commended: My1Login

Highly Commended: Identity Governance and Intelligence

IBM

One Identity, Identity Manager

One Identity

AppGate SDP

Cyxtera

Balabit- Privileged Access Management Solution

Balabit

WINNER: ImmuniWeb

High-Tech Bridge SA

For large companies, ImmuniWeb reduces application security testing costs and centralises application security testing into one single platform. The platform provides flexible access control and role management for internal security teams, application developers and even for external vendors if required. ImmuniWeb has several Technology All...

Highly Commended: Webroot BrightCloud Threat Intelligence

Webroot

Highly Commended: IBM WATSON for Cyber Security

IBM

ZoneFox

The ZeroFOX Platform

ZeroFox

empow Security Platform

empow

WINNER: IBM Managed Security Services

IBM

IBM is an industry-leading Managed Security Service partner providing outstanding personalised protection from attacks, including in the cloud. IBM has differentiated itself by making significant investments in people, facilities, tools and cutting-edge cognitive technologies to provide a service built on industry-leading security intel...

Highly Commended: NTT Security Managed Security Services

NTT Security

Redscan Cyber Security

CNS Mosaic Managed Security Services

CNS Group

Digital Guardian Managed Security Program

Digital Guardian

Mobliciti

Nuspire Networks

WINNER: IBM MaaS360 with Watson UEM

IBM

Managing endpoints plus their users and data is a time-consuming task with conventional MDM and EMM solutions. Smart IT leaders are turning towards a cognitive UEM approach that consolidates the management of devices along with their data and apps. IBM MaaS360 with Watson unified endpoint management (UEM) gives IT and security leaders one platform ...

Highly Commended: Sophos Mobile

Sophos

Wandera Secure Mobile Gateway

Wandera

Apricorn Aegis Secure Key 3z

Apricorn

Entersekt Transakt

Armour Mobile

Armour Communications

DIGIPASS for Apps

VASCO

WINNER: ForeScout CounterACT

ForeScout

ForeScout has pioneered an agentless approach to network security to address the explosive growth of mobile computing, cloud computing and the IoT. Outdated policies, such as ‘block everything that is not owned by the organisation’, stifle and disrupt business productivity. ForeScout CounterACT is a different type of network...

Pulse Policy Secure

Pulse Secure

Bradford Networks

WINNER: Exabeam Security Intelligence Platform

Exabeam

Recent data breaches suggest that SIEM as a security management solution, is broken. Attacks using stolen or misused passwords are on the rise, with companies struggling to detect or respond to them effectively. Exabeam’s Security Intelligence Platform (SIP) decreases the risk of cyber threats for any organisation. It incorporates a c...

Highly Commended: SolarWinds Log & Event Manager

SolarWinds

IBM QRadar

IBM

LogPoint

The LogRhythm NextGen SIEM Platform

LogRhythm

Splunk Enterprise Security

Splunk

WINNER: Tenable.io

Tenable

Vulnerability management hasn’t kept pace with the adoption of cloud, containers, web applications and the convergence of IT and OT. Headlines around Equifax and WannaCry underscore the importance of understanding and protecting the modern attack surface. To solve this challenge requires comprehensive visibility into any asset on any ...

Highly Commended: Skybox Vulnerability Control

Skybox Security

InsightVM

Rapid7

RiskSense Platform

RiskSense

Core Security

SecureAuth + Core Security

Quest KACE Systems Management Appliance

Quest

WINNER: Recorded Future

Recorded Future aims to deliver the only complete threat intelligence solution powered by patented machine learning to lower risk. The company empowers organisations to reveal unknown threats before they impact business and enable teams to respond to alerts ten times faster. To supercharge the efforts of security teams, the company’s tech...

Highly Commended: IBM X-Force Exchange

IBM

Highly Commended: EclecticIQ Platform

EclecticIQ

RiskIQ PassiveTotal

RiskIQ

DFLabs IncMan

DFLabs

AlienVault Open Threat Exchange (OTX)

AlienVault

CrowdStrike Falcon Intelligence

CrowdStrike

Excellence Awards: Industry Leadership

WINNER: Rapid7

Rapid7 has seen strong and steady growth of its customer base across all products and services - from 1,750 customers at the end of 2011, to more than 6,500 in 120 countries in 2017. In Q2 2017, total revenue had increased by 27 per cent since the same time the previous year. Additionally, Rapid7 experienced 17 per cent growth i...

Highly Commended: Symantec

Proofpoint

FireEye

Duo Security

Sophos

WINNER: Panaseer

Panaseer’s core commercial offering includes the Panaseer Platform and corresponding professional and managed services tailored for the Enterprise market. The product portfolio is strong and rapidly growing, serving a broad range of strategic and tactical cyber-security use cases. Currently the portfolio consists of core platform, dep...

XM Cyber

WINNER: Proofpoint Essentials

Proofpoint

Proofpoint Essentials offers a follow-the-sun support with very high-level consistency and high levels of customer service satisfaction scores. Globally, customers have access to 24x7x365 support within the Proofpoint Essentials subscription with phone, email and live chat communication options available. The Proofpoint Essentials support t...

Highly Commended: Netwrix Auditor

Netwrix Corporation

Barracuda Essentials for Office 365

Barracuda Networks

Redscan Cyber Security

WINNER: CrowdStrike Falcon

CrowdStrike

The CrowdStrike Falcon Platform is the only cloud delivered, next-gen endpoint protection solution that unifies next-gen AV, endpoint detection and response (EDR), managed hunting, IT Hygiene, threat intelligence, and vulnerability management. Due to its modularity, customers can choose whether to replace their AV for mo...

Highly Commended: Proofpoint Advanced Email Security

Proofpoint

IBM Resilient Incident Response Platform

IBM

Onapsis Security Platform

Onapsis

BooleBox

Boole Server srl

WINNER: Redscan Cyber Security

Redscan provides managed security services that protect organisations against cyber-crime. It applies its offensive security expertise to deliver market leading managed detection and incident response services, red team operations, penetration testing, and security consulting services. Redscan ThreatDetect is a 24/7 managed detection an...

Highly Commended: Flashpoint

Proofpoint

Mobliciti

Barracuda Networks

Avecto

WINNER: Report URI - Real-time Security Reporting

Report URI Ltd

Modern web browsers can now send reports when they observe events that may impact security. The company’s service, Report URI, allows websites to quickly and easily setup reporting by sending their reports to URI for processing instead of having to build their own infrastructure to handle and process the reports themselves. Any indivi...

Highly Commended: Neustar DNS Shield

Neustar

Barracuda Sentinel

Barracuda

Bitdefender HVI

Bitdefender

IRONSCALES Federation - The Only Real-time Automated Phishing Intelligence Sharing

IRONSCALES

Lastline Breach Defender

Lastline

Avecto's new Quick Start policy and Trusted Application Protection features

Avecto

WINNER: Skybox Security Suite

Skybox Security

Skybox Security has more than 700 customers in over 50 countries and nearly every industry. 40 percent of Skybox customers are ranked on the Global 2000 list of the world’s largest enterprises. Skybox Professional Services offers extensive end–user and administrator training, deployment customisation, system integration, ong...

Highly Commended: OneTrust Privacy Management Software

OneTrust

Varonis Data Security Platform

Varonis

SureCloud Platform - Risk Management and EU GDPR Applications

SureCloud

AlgoSec Security Management Solution

AlgoSec

Professional Awards

WINNER: Andrew Rose

NATS

The National Air Traffic Services (NATS) is Britain’s air traffic control service and controls 200,000 square miles of UK and North Atlantic airspace, manages 2.2 million flights annually and protects the safety of 220 million passengers. NATS also controls aircraft ground movements at major airports in the UK and runs a highly succes...

WINNER: Royal Bank of Scotland

The security team has developed and managed itself to be invaluable within the corporate environment – particularly seeing as cyber-crime is such an important concern for financial organisations. The team has worked to position cyber-security as a critical business issue by actively engaging with leaders and colleagues. This is evident in the...

Highly Commended: Knights of Security

Manchester Airports Group

Stiftung Wagerenhof Foundation

WINNER: ISACA CISM

ISACA

CISM is a managementlevel certification for information security professionals. Most security certifications measure the candidate’s understanding of security technologies and processes – CISM differentiates itself by also measuring the candidate’s understanding of how these processes support business goals. Earned by more than 38...

Highly Commended: ISACA CRISC

ISACA

Doctorate Training Programme, University of West London

Cybersecurity and Criminology Centre

ISACA CISA

ISACA

Wombat Security Technologies' Product Portfolio

Wombat Security Technologies

Secure Code Warrior

WINNER: Team CDT

Georgia Crossland, Amy Ertan, Lydia Garms & Angela Heeler - University of London, Royal Holloway

The growing demand for cyber-security professionals has led both government and industry to introduce initiatives to increase the range and variety of cyber-security relevant courses, supplemented by competitions that also draw in mature students and nonSTEM candidates. Now there are GCHQ accredited cyber-related Masters, competitions for s...

Cyber incident detection for Electronic Medical Record Systems

David McGlade - Queen’s University Belfast

Team Anonymoose

Nick Lynch, Harvey Stocks, Joshua Green, Alistair Greaves - University of Edinburgh

Book of the night 2018

Website Menu