Excellence Awards: Threat Solutions
Best Authentication Technology
Shortlist: Portnox Conditional Access for Applications
Portnox
Shortlist: SendQuick Conexa – Secure Remote Access with MultiFactor Authentication
SendQuick Pte
Shortlist: YubiKey 5 Series facilitates secure and seamless authentication without fail
Yubico
Best Biometric Solution NEW
Best Behaviour Analytics / Enterprise Threat Detection
Shortlist: Cleafy Fraud Extended Detection and Response (FxDR) platform
Cleafy
Shortlist: Data Security Fabric Data Risk Intelligence
Thales
Shortlist: ExtraHop RevealX
ExtraHop
Shortlist: Unified Account Takeover Protection
Abnormal AI
Shortlist: Varonis Data Security Platform
Varonis
Best Cloud Security Solution.
Shortlist: Falcon Cloud Security
CrowdStrike
Shortlist: Singularity Cloud Security Platform
SentinelOne
Shortlist: Sysdig Secure
Sysdig
Shortlist: Tenable Cloud Security
Tenable
Shortlist: The Delinea Platform
Delinea
Shortlist: TotalCloud
Qualys
Shortlist: Wiz™ Cloud Security Platform
Wiz
Best SaaS Solution NEW
Shortlist: Best SaaS Solution
AppOmni
Shortlist: Building Operational Cyber Readiness for the Cloud
Cyberbit
Shortlist: CrowdStrike Falcon Shield
CrowdStrike
Shortlist: Keyfactor’s PKI as-a-Service
Keyfactor
Shortlist: NordLayer
Best Communications Security Solution
Best Data Leakage Prevention (DLP) Solution
Shortlist: Metomic
Shortlist: Proofpoint Data Security
Proofpoint
Shortlist: Zero-Trust Mobile Access
Symmetrium
Best Email Security Solution
Shortlist: Inbound Email Security
Abnormal AI
Shortlist: Mimecast Advanced Email Security
Mimecast
Shortlist: Proofpoint Core Email Protection
Proofpoint
Shortlist: Secure Communication
Zivver
Best Endpoint Security
Shortlist: Bitdefender GravityZone XDR
Bitdefender
Shortlist: CrowdStrike Endpoint Security
CrowdStrike
Shortlist: ESET PROTECT Elite
ESET
Shortlist: Huntress Managed Endpoint Detection and Response
Huntress
Shortlist: Singularity Endpoint
SentinelOne
Shortlist: Stellar
TXOne Networks
Best Identity and Access Management Solution
Shortlist: Identity and Access Management Platform
Imprivata
Shortlist: JumpCloud SaaS Management
JumpCloud
Shortlist: My1Login Enterprise
My1Login
Shortlist: Universal Non-Human Identity Security Platform
Clutch Security
Best Incident Response Solution
Shortlist: EndaceProbe: Always-on Packet Capture
Endace
Shortlist: Incident Response JumpStart
Arctic Wolf
Shortlist: Pentest People - Incident Response
Pentest People
Shortlist: Varonis
Varonis Managed Data Detection and Response
Shortlist: Zero Trust Segmentation
Illumio
Best IOT/IIOT Security Solution
Shortlist: Anomaly Detection Solution
Wireless Logic
Shortlist: Claroty Platform
Claroty
Shortlist: IoT Security
Forescout
Shortlist: OPSWAT MetaDefender Kiosk
OPSWAT
Best Managed Security Service
Shortlist: CYREBRO Total Protect - Managed Detection and Response
CYREBRO
Shortlist: Falcon Complete Next-Gen MDR
CrowdStrike
Shortlist: Rapid7 Managed Threat Complete
Rapid7
Shortlist: Reliance Cyber XDR
Reliance Cyber
Shortlist: Smarttech247 Global MDR
Smarttech247
Shortlist: Trustwave Managed Detection and Response (MDR)
Trustwave
Best SIEM Solution
Shortlist: Huntress Managed Security Information and Event Management
Huntress
Shortlist: InsightIDR
Rapid7
Shortlist: ManageEngine Log360
Shortlist: Sumo Logic Cloud SIEM
Sumo Logic
Shortlist: Talion Managed SIEM Solution
Talion
Best Threat Intelligence Technology
Shortlist: Arbor Edge Defense (AED)
NETSCOUT
Shortlist: CrowdStrike Counter Adversary Operations
CrowdStrike
Shortlist: ESET Threat Intelligence
ESET
Shortlist: Rapid7 Labs
Rapid7
Best AI solution
Shortlist: AI Security Mailbox
Abnormal AI
Shortlist: Charlotte AI
CrowdStrike
Shortlist: Cyber AI Analyst
Darktrace
Shortlist: Cyberfraud Protection Platform
DataDome
Shortlist: Dynamic Application Security Testing for AI (DAST-AI)
Mindgard
Shortlist: Proofpoint Nexus
Proofpoint
Best Vulnerability Management Solution
Shortlist: BackBox Vulnerability Intelligence
BackBox
Shortlist: CrowdStrike Falcon Exposure Management
CrowdStrike
Shortlist: Rapid7 Exposure Command
Rapid7
Shortlist: Vulnerability Management, Detection & Response (VMDR)
Qualys
Shortlist: WithSecure™ Elements Exposure Management
WithSecure
Shortlist: XM Cyber Vulnerability Risk Management
XM Cyber
Excellence Awards: Industry Leadership
Best Customer Service
Shortlist: Arctic Wolf Concierge Security Team
Arctic Wolf
Shortlist: Cyber Hero® Support
ThreatLocker®
Shortlist: ESET Customer Service
ESET
Shortlist: Illumio Zero Trust Segmentation
Illumio
Shortlist: NinjaOne
Best Emerging Technology
Shortlist: AQtive Guard
SandboxAQ
Shortlist: FireBreak™
Goldilock
Shortlist: Keeper Security remote Browser Isolation
Keeper Security
Shortlist: Rapid7 Surface Command
Rapid7
Shortlist: TotalAI
Qualys
Shortlist: WithSecure™ Elements Exposure Management
WithSecure
Best Enterprise Security Solution
Shortlist: Cato Networks
Shortlist: CrowdStrike Falcon Platform
CrowdStrike
Shortlist: Immersive One
Immersive Labs
Shortlist: ReliaQuest GreyMatter
ReliaQuest
Shortlist: SentinelOne Singularity Platform
SentinelOne
Shortlist: The Delinea Platform
Delinea
Shortlist: YubiKey Bio Multi-protocol Edition
Yubico
Best Risk Management and Regulation Solution
Shortlist: Cyber Risk Insights (CRI)
KPMG
Shortlist: Mimecast Cloud Archive
Mimecast
Shortlist: Proofpoint Digital Communications Governance/DCG
Proofpoint
Shortlist: Vanta Trust Management Platform
Vanta
Best Security Company
Shortlist: Arctic Wolf
Shortlist: Bugcrowd
Shortlist: CyberArk
Shortlist: Delinea
Shortlist: ReliaQuest
Shortlist: SentinelOne
Shortlist: Tenable
Shortlist: Varonis
Best New Company NEW
Shortlist: Dynamic Application Security Testing for AI (DAST-AI)
Mindgard
Shortlist: watchTowr
Best SME Security Solution
Shortlist: CrowdStrike Falcon Go
CrowdStrike
Shortlist: CyberSmart
Shortlist: ESET PROTECT MDR
ESET
Shortlist: Guardz AI-Powered Unified Detection and Response
Guardz
Shortlist: WithSecure™ Elements Cloud
WithSecure
Professional Awards
Best Professional Training or Certification Programme
Shortlist: Certified Cybersecurity Operations Analyst (CCOA)
ISACA
Shortlist: Certified in Cybersecurity
ISC2
Shortlist: Certified Information Systems Auditor (CISA)
ISACA
Shortlist: Immersive One
Immersive
Shortlist: MetaCompliance
MetaCompliance
Shortlist: PEN-200: Penetration Testing with Kali Linux
OffSec
Shortlist: Proofpoint ZenGuide
Proofpoint
Shortlist: ThinkCyber Redflags®
ThinkCyber Security
Rising Star
Shortlist: Ayena Gupta
Smart DCC
Shortlist: Peter Lane
Cyro Cyber
Woman of Influence Award
Shortlist: Helen Randall
Netwrix Corporation
Shortlist: Natacha Bakir
Senthorus
Shortlist: Siân John MBE
NCC Group
CSO/CISO of the Year NEW
Shortlist: Brian Jack
KnowBe4
Shortlist: Tal Arad
Carlsberg Group