Shortlist 2018

Editor's Choice Award

National Cyber Security Centre

The National Cyber Security Centre - the NCSC - has quickly established itself as the public-face of GCHQ, making this country’s cyberintelligence expertise available to a wider public, playing a coordinating role in responding to attacks, delivering specific advice on new threats, and generally contributing to increase the re...

Excellence Awards: Threat Solutions

Duo Security

OneLogin

Ping Identity Platform

Ping Identity

SafeNet Trusted Access

Gemalto

SecureAuth

SecureAuth + Core Security

SecureAuth has developed an effective and flexible solution that ensures every identity authenticating is known and verified from sign-in to log-off. SecureAuth uses techniques that can check something they have (e.g. a device), something they know (e.g. knowledgebased questions) and something they are (e.g. biometric) creating infinitely custo...

VASCO

Excellence Awards: Threat Solutions

Bitdefender Gravity Zone Elite

Bitdefender

CrowdStrike Falcon

Crowdstrike

Fidelis Cybersecurity

Lastline Enterprise

Proofpoint Targeted Attack Protection

Proofpoint

Sophos Intercept X

Sophos

Verint Threat Protection System

Verint

Siloed detection and investigation tools, multiple, unprioritised alerts and insufficient automation exacerbated by cyberskills shortage make it difficult to fully detect, understand, and remediate cyberattacks quickly. Many attacks go undetected for months. Verint Threat Protection System, the first unified, preintegrated i...

Exabeam Advanced Analytics

Exabeam

Exabeam pairs automated threat detection with rapid search and investigation technology. Its proprietary Session Data model automatically stitches together user activities into timelines. These are used to baseline normal behaviour and identify anomalous activity. This allows analysts to tackle the often-labour-intensive task of tracking lateral mo...

Forcepoint UEBA

Forcepoint UK

Splunk User Behavior Analytics

Splunk

Varonis Data Security Platform

Varonis

ZoneFox

Cloud Defender

Alert Logic

Forcepoint CASB

Forcepoint

My1Login

SaaS Protection

Proofpoint

USM Anywhere

AlienVault

AlienVault USM Anywhere enables organisations with limited resources, expertise, and budgets to benefit from the latest, cutting-edge security technologies. It’s the industry’s first all-in-one SaaS security monitoring platform that centralises and simplifies threat detection, incident response, and compliance manage...

Vormetric Transparent Encryption, Live Data Transformation and Container Security

Thales

Code42 Security Center

Code42

First-generation DLP solutions prevented inadvertent loss of sensitive data from being transferred outside the corporate network. The current generation is evolving fast to prevent data loss from insider threats and malicious external attacks. Consequently, there’s an increased focus on protecting endpoint devices, which hold 60 per c...

Digital Guardian Data Protection Platform

Digital Guardian

DLP for the Cloud & Mobile Era

Bitglass

Endpoint Protector

CoSoSys

Forcepoint DLP

Forcepoint UK

Proofpoint Information Protection Platform

Proofpoint

Attivo Networks® ThreatDefend™ Deception and Response Platform

Attivo Networks

GuardiCore Centra Security Platform

GuardiCore

InsightIDR

Rapid7

TrapX Security DeceptionGrid

TrapX Security

DeceptionGrid is used to bait, engage, and ultimately trap hackers that have penetrated a network. Deception enhances visibility and helps identify attackers that have bypassed all other cyber defences. Deception fills your network with lures (tokens) and decoys (traps) to deceive and detect hackers within the network. Deception surrounds t...

Agari Email Trust Platform

Agari

Barracuda Essentials for Email Security

Barracuda

Egress Switch

Egress Software Technologies

FireEye Email Solution

FireEye

Email is the highest volume data ingress point, making it the most vulnerable vector for cyber-attacks. FireEye Email Security catches traditional, mass email, phishing attacks with known malicious attachments, links and content, and emerging and targeted attacks as they occur. Emails are analysed for threats hidden in passwordp...

Glasswall FileTrust for Enterprise Email

Glasswall Solutions

Proofpoint Email Protection

Proofpoint

Carbon Black

IBM BigFix

IBM

Sophos Intercept X

Sophos

Symantec Endpoint Protection

Symantec

Symantec’s machine learning and AI capabilities are not only some of the most sophisticated in the security industry, but they are matched with a broad suite of advanced security capabilities like Memory Exploit Mitigation, virtual machine emulation, as well as traditional anti-virus and IPS, to deliver the industry’s mo...

Trustwave

Webroot SecureAnywhere Business Endpoint Protection

Webroot

AppGate SDP

Cyxtera

Balabit- Privileged Access Management Solution

Balabit

CyberArk Privileged Account Security Solution

CyberArk

The CyberArk Privileged Account Security Solution expands access control to any IT environment, from on-premises and hybrid cloud to DevOps, helping organisations prioritise risk management without sacrificing efficiency, productivity or innovation. Specifically, in DevOps, secrets - which consist of privileged accounts, SSH...

Identity Governance and Intelligence

IBM

My1Login

One Identity, Identity Manager

One Identity

empow Security Platform

empow

IBM WATSON for Cyber Security

IBM

ImmuniWeb

High-Tech Bridge SA

For large companies, ImmuniWeb reduces application security testing costs and centralises application security testing into one single platform. The platform provides flexible access control and role management for internal security teams, application developers and even for external vendors if required. ImmuniWeb has several Technology All...

The ZeroFOX Platform

ZeroFox

Webroot BrightCloud Threat Intelligence

Webroot

ZoneFox

Excellence Awards: Threat Solutions

CNS Mosaic Managed Security Services

CNS Group

Digital Guardian Managed Security Program

Digital Guardian

IBM Managed Security Services

IBM

IBM is an industry-leading Managed Security Service partner providing outstanding personalised protection from attacks, including in the cloud. IBM has differentiated itself by making significant investments in people, facilities, tools and cutting-edge cognitive technologies to provide a service built on industry-leading security intel...

Mobliciti

NTT Security Managed Security Services

NTT Security

Nuspire Networks

Redscan Cyber Security

Excellence Awards: Threat Solutions

Apricorn Aegis Secure Key 3z

Apricorn

Armour Mobile

Armour Communications

DIGIPASS for Apps

VASCO

Entersekt Transakt

IBM MaaS360 with Watson UEM

IBM

Managing endpoints plus their users and data is a time-consuming task with conventional MDM and EMM solutions. Smart IT leaders are turning towards a cognitive UEM approach that consolidates the management of devices along with their data and apps. IBM MaaS360 with Watson unified endpoint management (UEM) gives IT and security leaders one platform ...

Sophos Mobile

Sophos

Wandera Secure Mobile Gateway

Wandera

Bradford Networks

ForeScout CounterACT

ForeScout

ForeScout has pioneered an agentless approach to network security to address the explosive growth of mobile computing, cloud computing and the IoT. Outdated policies, such as ‘block everything that is not owned by the organisation’, stifle and disrupt business productivity. ForeScout CounterACT is a different type of network...

Pulse Policy Secure

Pulse Secure

Exabeam Security Intelligence Platform

Exabeam

Recent data breaches suggest that SIEM as a security management solution, is broken. Attacks using stolen or misused passwords are on the rise, with companies struggling to detect or respond to them effectively. Exabeam’s Security Intelligence Platform (SIP) decreases the risk of cyber threats for any organisation. It incorporates a c...

IBM QRadar

IBM

LogPoint

SolarWinds Log & Event Manager

SolarWinds

Splunk Enterprise Security

Splunk

The LogRhythm NextGen SIEM Platform

LogRhythm

Core Security

SecureAuth + Core Security

InsightVM

Rapid7

Quest KACE Systems Management Appliance

Quest

RiskSense Platform

RiskSense

Skybox Vulnerability Control

Skybox Security

Tenable.io

Tenable

Vulnerability management hasn’t kept pace with the adoption of cloud, containers, web applications and the convergence of IT and OT. Headlines around Equifax and WannaCry underscore the importance of understanding and protecting the modern attack surface. To solve this challenge requires comprehensive visibility into any asset on any ...

AlienVault Open Threat Exchange (OTX)

AlienVault

CrowdStrike Falcon Intelligence

CrowdStrike

DFLabs IncMan

DFLabs

EclecticIQ Platform

EclecticIQ

IBM X-Force Exchange

IBM

Recorded Future

Recorded Future aims to deliver the only complete threat intelligence solution powered by patented machine learning to lower risk. The company empowers organisations to reveal unknown threats before they impact business and enable teams to respond to alerts ten times faster. To supercharge the efforts of security teams, the company’s tech...

RiskIQ PassiveTotal

RiskIQ

Excellence Awards: Industry Leadership

Duo Security

FireEye

Proofpoint

Rapid7

Rapid7 has seen strong and steady growth of its customer base across all products and services - from 1,750 customers at the end of 2011, to more than 6,500 in 120 countries in 2017. In Q2 2017, total revenue had increased by 27 per cent since the same time the previous year. Additionally, Rapid7 experienced 17 per cent growth i...

Sophos

Symantec

Excellence Awards: Industry Leadership

Panaseer

Panaseer’s core commercial offering includes the Panaseer Platform and corresponding professional and managed services tailored for the Enterprise market. The product portfolio is strong and rapidly growing, serving a broad range of strategic and tactical cyber-security use cases. Currently the portfolio consists of core platform, dep...

XM Cyber

Barracuda Essentials for Office 365

Barracuda Networks

Netwrix Auditor

Netwrix Corporation

Proofpoint Essentials

Proofpoint

Proofpoint Essentials offers a follow-the-sun support with very high-level consistency and high levels of customer service satisfaction scores. Globally, customers have access to 24x7x365 support within the Proofpoint Essentials subscription with phone, email and live chat communication options available. The Proofpoint Essentials support t...

Redscan Cyber Security

BooleBox

Boole Server srl

CrowdStrike Falcon

CrowdStrike

The CrowdStrike Falcon Platform is the only cloud delivered, next-gen endpoint protection solution that unifies next-gen AV, endpoint detection and response (EDR), managed hunting, IT Hygiene, threat intelligence, and vulnerability management. Due to its modularity, customers can choose whether to replace their AV for mo...

IBM Resilient Incident Response Platform

IBM

Onapsis Security Platform

Onapsis

Proofpoint Advanced Email Security

Proofpoint

AlgoSec Security Management Solution

AlgoSec

OneTrust Privacy Management Software

OneTrust

Skybox Security Suite

Skybox Security

Skybox Security has more than 700 customers in over 50 countries and nearly every industry. 40 percent of Skybox customers are ranked on the Global 2000 list of the world’s largest enterprises. Skybox Professional Services offers extensive end–user and administrator training, deployment customisation, system integration, ong...

SureCloud Platform - Risk Management and EU GDPR Applications

SureCloud

Varonis Data Security Platform

Varonis

Avecto

Barracuda Networks

Flashpoint

Mobliciti

Proofpoint

Redscan Cyber Security

Redscan provides managed security services that protect organisations against cyber-crime. It applies its offensive security expertise to deliver market leading managed detection and incident response services, red team operations, penetration testing, and security consulting services. Redscan ThreatDetect is a 24/7 managed detection an...
Excellence Awards: Industry Leadership

Avecto's new Quick Start policy and Trusted Application Protection features

Avecto

Barracuda Sentinel

Barracuda

Bitdefender HVI

Bitdefender

IRONSCALES Federation - The Only Real-time Automated Phishing Intelligence Sharing

IRONSCALES

Lastline Breach Defender

Lastline

Neustar DNS Shield

Neustar

Report URI - Real-time Security Reporting

Report URI Ltd

Modern web browsers can now send reports when they observe events that may impact security. The company’s service, Report URI, allows websites to quickly and easily setup reporting by sending their reports to URI for processing instead of having to build their own infrastructure to handle and process the reports themselves. Any indivi...

Professional Awards

Professional Awards

Andrew Rose

NATS

The National Air Traffic Services (NATS) is Britain’s air traffic control service and controls 200,000 square miles of UK and North Atlantic airspace, manages 2.2 million flights annually and protects the safety of 220 million passengers. NATS also controls aircraft ground movements at major airports in the UK and runs a highly succes...
Professional Awards

Knights of Security

Manchester Airports Group

Royal Bank of Scotland

The security team has developed and managed itself to be invaluable within the corporate environment – particularly seeing as cyber-crime is such an important concern for financial organisations. The team has worked to position cyber-security as a critical business issue by actively engaging with leaders and colleagues. This is evident in the...

Stiftung Wagerenhof Foundation

Professional Awards

Doctorate Training Programme, University of West London

Cybersecurity and Criminology Centre

ISACA CISA

ISACA

ISACA CISM

ISACA

CISM is a managementlevel certification for information security professionals. Most security certifications measure the candidate’s understanding of security technologies and processes – CISM differentiates itself by also measuring the candidate’s understanding of how these processes support business goals. Earned by more than 38...

ISACA CRISC

ISACA

Secure Code Warrior

Wombat Security Technologies' Product Portfolio

Wombat Security Technologies

Professional Awards

Cyber incident detection for Electronic Medical Record Systems

David McGlade - Queen’s University Belfast

Team Anonymoose

Nick Lynch, Harvey Stocks, Joshua Green, Alistair Greaves - University of Edinburgh

Team CDT

Georgia Crossland, Amy Ertan, Lydia Garms & Angela Heeler - University of London, Royal Holloway

The growing demand for cyber-security professionals has led both government and industry to introduce initiatives to increase the range and variety of cyber-security relevant courses, supplemented by competitions that also draw in mature students and nonSTEM candidates. Now there are GCHQ accredited cyber-related Masters, competitions for s...

Website Menu