Excellence Awards - Industry Leadership

Francesco Cipollone

NSC42

Pieter Danhieux

Secure Code Warrior

Alison Nixon

Tech Data

Nicola Whiting

Titania

Emma Smith

Vodafone

Bridewell Consulting

Digital Shadows

KnowBe4

Recorded Future

Sophos

Tenable

Edgescan

Edgescan

Forescout - Device Visibility and Control Platform

Forescout Technologies

Panaseer Continuous Controls Monitoring platform

Panaseer

Proofpoint P1 Advanced Email Security Solution

Proofpoint

Pulse Access Suite

Pulse Secure

Aegis - Cyber Security Maturity

CNS a part of Six Degrees

Fusion Risk Management

Fusion Risk Management

Vendorpedia

OneTrust

Skybox Security Suite

Skybox Security

Tufin Orchestration Suite

Tufin

Censornet Platform

Censornet

Duo Security

Duo Security at Cisco

F-Secure Rapid Detection & Response (RDR)

F-Secure

GCI Best SME Security Solution

GCI

Malwarebytes Endpoint Protection

Malwarebytes

Barracuda Networks

Mimecast

Proofpoint

Redscan

Vectra

Elemendar AI for CTI Engine

Elemendar

NTX

Nominet

SecuPi Data-Centric Security Compliance

SecuPi Security Solutions

Skurio Digital Risk Protection platform

Skurio

Threat Detection Marketplace

SOC Prime

Wire™ - The Most Secure Collaboration Platform

Wire

Excellence Awards - Threat Solutions

bugFraud: A Comprehensive Authentication Strategy Through Advanced Behavioural Biometrics’

buguroo

iDENprotect

iDENprotect

iProov Remote Authentication for Genuine Presence Assurance

iProov

Jumio Authentication

Jumio

SafeNet Trusted Access

Thales

VeridiumID

Veridium

Code42 Insider Threat Detection, Investigation and Response

Code42

Exabeam Advanced Analytics

Exabeam

Flowmon

Flowmon Networks

Forcepoint Behavioural Analytics

Forcepoint

Gurucul

Gurucul

Vectra Cognito

Vectra

Bitglass CASB

Bitglass

Netskope Security Cloud

Netskope

Proofpoint CASB

Proofpoint

Sophos Cloud Optix

Sophos

Wandera Mobile Private Access

Wandera

Endpoint Protector by CoSoSys

CoSoSys

Digital Guardian Data Protection Platform

Digital Guardian

Fidelis Elevate

Fidelis Cybersecurity

Forcepoint DLP

Forcepoint

Proofpoint Information Protection

Proofpoint

Agari Phishing Defense and Response

Agari

Total Email Protection

Barracuda

Glasswall FileTrust™ for Email

Glasswall

Email Security 3.0

Mimecast

Proofpoint Email Security

Proofpoint

OnDMARC

Red Sift

CrowdStrike Falcon

CrowdStrike

Cyber Defense Platform

Cybereason

Ericom Shield

Ericom Software

FireEye Endpoint Security

FireEye

Sophos Intercept X Advanced

Sophos

Auth0

Auth0

My1Login Enterprise IAM

My1Login

Okta Identity Cloud

Okta

OneLogin

OneLogin

Ping Intelligent Identity Platform

Ping Identity

FireEye Incident Response

FireEye

GCI Best Incident Response Solution Award Entry

GCI

Intezer Analyze

Intezer

CyberCPR

Logically Secure

Trustwave Best Incident Response

Trustwave

Demisto by Palo Alto Networks

XSOAR by Palo Alto Networks

Barracuda Secure Connector

Barracuda

Claroty Continuous Threat Detection (CTD)

Claroty

Guardian

Nozomi Networks

Sectigo IoT Identity Manager

Sectigo

Tripwire Enterprise for Industrial Devices

Tripwire

Adarma Managed SOC Service

Adarma

Digital Guardian Managed Security Program

Digital Guardian

GCI Best Managed Security Service

GCI

Nettitude – Best Managed Security Service

Nettitude

Redscan ThreatDetect™ - Best Managed Security Service

Redscan

AdaptiveMobile Security’s Network Protection Platform

AdaptiveMobile Security

Apricorn Aegis Fortress L3 hardware encrypted USB drive and the Aegis Configurator

Apricorn

Armour Technology

Armour Communications

Mobile Security Suite

OneSpan

Wandera Security Cloud

Wandera

ADSecure

Attivo Networks

BeyondTrust Universal Privilege Management

BeyondTrust

Privileged Access Management

CyberArk

One Identity Safeguard

One Identity

Secret Server

Thycotic

Privacy Management Software

OneTrust

Panaseer Continuous Controls Monitoring platform

Panaseer

Proofpoint Enterprise Archiving and Compliance

Proofpoint

Skybox Security Suite

Skybox Security

Tufin Orchestration Suite

Tufin

Exabeam Security Management Platform

Exabeam

NextGen SIEM Platform

LogRhythm

InsightIDR

Rapid7

Securonix

Securonix

Sumo Logic Cloud SIEM

Sumo Logic

AT&T Alien Labs

AT&T Cybersecurity

DomainTools Best Threat Intelligence Technology

DomainTools

Kaspersky Threat Intelligence

Kaspersky

RADARK

KELA

Recorded Future

Recorded Future

Encrypted traffic visibility through AI/ML

Barac

Barracuda Sentinel

Barracuda

AI for Identity Verification

Onfido

SentinelOne ActiveEDR

SentinelOne

Vectra Cognito

Vectra

Black Duck Software Composition Analysis (SCA)

By Synopsys

Coverity Static Application Security Testing (SAST)

By Synopsys

Seeker – Interactive Application Security Testing (IAST) Solution

By Synopsys

Edgescan

Edgescan

Onapsis Best Vulnerability Management Solution

Onapsis

InsightVM

Rapid7

Professional Awards

Winner to be announced in June

Lloyds Banking Group

McAfee Advanced Threat Research (ATR)

National Enabling Programmes (NEP)

William Hill

CCSP

(ISC)2

Certified Information Security Manager (CISM)

ISACA

CSX Cybersecurity Practitioner (CSX-P)

ISACA

Layer 8 Ltd and Melrose - Changing Security Culture Through Conversation

Layer 8

Redflags Real-time Security Awareness

Think Cyber Security

Vodafone Training and Certification Award

Vodafone

James Campbell

Aviva

Sophia McCall

Bournemouth University

Georgina Harvey

BT Security

Emma Heffernan

Edgescan

Patryk Zajdel

University of West London

James Packer

(ISC)2 London Chapter

Kevin Jones

Airbus

Richard Atkins

Cyber Griffin

Jane Frankland

Cyber Security Capital

Richard De Vere

The AntiSocial Engineer

Joseph Carson

Thycotic