Categories

 

Computing's Security Excellence Awards, celebrate the achievements of the IT industry's best security companies, solutions, products and personalities.

 

From the greatest firewall product to the most impressive IT leader in the industry, we're covering every major touchpoint of success in the security landscape. You don't want to miss this event.

 

Submission requirements

 

Entrants will be asked to submit a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only.

 

All information submitted will be for the use of judging and will remain confidential.

 

Please read on for further information on each category and application criteria.

 

APT Solution Award

Persistent and continuous threats are becoming an increasingly common method of criminal targeting towards organisations, cunning and covert plans underscoring espionage attempts that require solutions to be one step ahead of the game at all times.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption

 

Show All

Big Data Security Product of the Year

With GDPR coming into force in May 2018, firms are more concerned about data security than ever. This award will go to the big data security product which most impresses the judges in terms of its features, efficiency and ease of both use and installation. Customer references will help, as will evidence of innovation in the product's development, operation or both.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption

 

Show All

Cloud Security Award

Businesses are increasingly turning to the cloud for its flexibility and scalability. But security fears are often cited as the main barrier to cloud adoption.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption

 

Show All

Data Encryption Award

With cyber criminals increasingly successful at breaking into corporate networks and siphoning off sensitive and valuable data, encryption is one of the surest ways to protect that data, even if it falls into the wrong hands.

Judging Criteria:

  • Functionality
  • Adoption

 

Show All

DLP Award

The best way to secure a system is to stop attacks before they start, and monitoring, detecting and blocking breaches is key to data loss prevention. DLP systems can vary in their focus and approach, but what's important is comprehensive and proven effects in protection and prevention.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption

 

Show All

DR or Backup Product of the Year

After an attack, recovery is essential. Be it data or product keys, having a robust solution to rebuild an infrastructure is a staple of any security armoury. We want to find the best, with engaging examples of results in the field.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption

 

Show All

Email Security Award

Email is now a common attack vector for cyber criminals, with techniques such as phishing and the more targeted spear-phishing regularly seen by firms of all sizes.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption

 

Show All

Enterprise Security Award

A self-explanatory award, here we're looking for the best enterprise-grade security solution on the market. It will be sitting on the bleeding edge of security requirement and covering every base required of today's security needs in its area.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption

 

Show All

Enterprise Threat Detection Award

All businesses are under almost constant cyber attack, from low-level scattergun attacks to more targeted, sophisticated strategies. Enterprise Threat Detection tools help organisations identify attacks as they occur, and analyse the threats quickly enough to respond and mitigate them.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption

 

Show All

Firewall Solution Award

Tried, tested and true, the firewall remains the classic gatehouse to any enterprise network. But as unauthorised access attempts become ever more complex in an evolving security world, a firewall product needs to have developed alongside it to offer absolutely water-tight security. We'd like to see examples of what sets yours apart from the pack.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption

 

Show All

IAM Award

Identity and access management is of critical importance to networks forever under attack in a world increasingly dependent on digital profiles to protect data. Regulatory compliance is also an extremely important factor in a good IAM solution.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption

 

Show All

IoT Security Solution Award

Whilst the Internet of Things can offer many advantages to firms looking to manage a supply chain and other form of network, the concept has been proven time and time again to be hugely vulnerable to hackers. Advanced security solutions are needed to protect the valuable and sensitive data generated by and carried across IoT networks.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption

 

Show All

Mobile Security Award

With mobile apps increasing in power, and the volume and complexity of data they handle growing, cyber criminals are increasingly targeted mobile devices for the valuable corporate data they contain. There has never been a greater need for sophisticated mobile security.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption

 

Show All

Network Security Award

Cyber criminals are using ever more sophisticated methods to attack corporate networks. In the game of cat and mouse between security firms and hackers, only the most cutting edge of security products can offer the protection demanded by today's firms.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption

 

Show All

Risk Management Award

Risk management solutions help organisations to recognise, quantify, and ultimately manage and mitigate their security risks.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption

 

Show All

Security Innovation of the Year

The security industry and its products are continually evolving, as it keeps pace with the new tricks and tactics developed by hackers to attack corporate networks. This award will be given to the product or service which demonstrates something truly new and original.

Judging Criteria:

  • Originality
  • Functionality

 

Show All

SIEM Solution Award

SIEM gives organisations a holistic, centralised single view of security events, which could be occuring across a multitude of systems worldwide. The award will be given to the solution which stands out from the crowd for its differentiation, superior functionality, or widespread adoption.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption

 

Show All

SME Security Solution Award

Small-to-medium enterprises have a different set of considerations than larger enterprises, and SMEs are also becoming absolutely prime targets to malicious agents. The cost of large and expensive security offerings can often make SMEs feel priced out of the market, so in this category we're looking at affordable services that still offer the range and scope of security coverage any larger organisation typically enjoys.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption

 

Show All

Vulnerability Management Award

Vulnerability management is defined as the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. Once mitigated, organisations can be more confident of not being the 'low hanging fruit' which cyber criminals can successfully attack with little effort.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption

 

Show All

Security team of the year

As either the full-time IT security team at an organisation or a special project team or task force set up for a specific project, your team will be blazing a trail of success as an example to others in the industry. A well-oiled unit with provable results, you'll show everybody else how it's done.

Ther eis no judging criteria, please submit an 800 word free text entry.

Show All

Best Place to Work in Security

Some organisations place a greater emphasis - and budget - on IT security than their peers. We want to identify the model organisation to set the example to the wider industry. Employees of all levels should be well-briefed and confident in security, with minimal breaches. With a knowledgable and charismatic security leadership, evidence that culture and policy has fed down to the entire company - with measurable results - is key to competing in this award.

There is no judging criteria, please submit an 800 word free text entry.

Show All

Managed Security Award

Some organisations prefer to outsource some of their security responsibilities to the experts. Usually this involves round-the-clock monitoring of threats, and managing various security technologies.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption

 

Show All

Rising Star of Security Award

In an ever-changing security landscape, new use cases and trends drive innovation. Specialists in new and exciting disciplines are emerging all the time, and we want to champion those developments. The Rising Star of Security will be a newer, younger company, hungry for success and able to prove it.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption

 

Show All

Security Training Provider of the Year

Security is often at least as much about the skills of your staff as it is about the technology you employ. This award will go to the training provider which best demonstrates the ability to equip its customers for today's dynamic threat-scape. Customer quotes and stories will help, as will demonstrations of the breadth of your training, and its impact. Any evidence around innovation in the creation and delivery of your training materials will also help.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption

 

Show All

CISO/CSO of the year

Every organisation has a head of security, and we'd like to find the UK's most effective security professional. You'll be knowledgable, respected and responsible for introducing business-changing security concepts and policies. You'll be an excellence ambassador for IT security throughout your organisation, and be a well-known wider industry figure along with it.

There is no judging criteria, please submit an 800 word free text entry.

Show All

Ethical Hacker of the Year Award

Security has its individual champions, and none is more celebrated than the penetration tester. What better way to test a system than to attack it full-on? We want to hear from the industry's most knowledgeable and dynamic White Hats, and hear their stories from the front lines.

Judging Criteria:

  • Proven Results
  • Industry Knowledge

 

Show All

Security professional under 30

Security talent is rife in the younger generation, and we want to discover the UK's most trendsetting young security executive. You'll be involved in key projects in your company, and working closely with the CISO and CSO on agenda-driving projects. You'll have expert and defined views on key security industry trends, and be a well-known and respected figure in the community.

There is no judging criteria, please submit an 800 word free text entry.

Show All

Security woman of the year

This award is dedicated to recognising the talent, leadership and contribution of women in the IT industry. Whether working at the top level of security in an organisation, or as a key member of a team endeavour, we want to highlight exceptional women in the UK IT industry across the board.

There is no judging criteria, please submit an 800 word free text entry.

Show All

Security Vendor of the Year

The big one. Do you feel your security company's overall proposition is the best in the entire industry? Whether targeted at large or small companies, and in any particular area of security, you'll be confident that your company does it best. And then you'll need to tell us why and how.


Juding Criteria:

  • Proven Results
  • Convincing Proposition
  • Customer Case Studies

 

Show All

*NEW* Security Automation Award

Awarded to the most compelling security solution using artificial intelligence, machine learning or other types of automation. This can be aimed at consumers or businesses. Judges will be looking for innovation and proof of effectiveness - customer case studies will be highly valued.


Juding Criteria:

  • Innovation
  • Ease of use
  • Manual labour reduction

 

Show All

*NEW* DevSecOps Award

Bringing together development and operations is becoming common in business; but security can be forgotten in the fast pace. This award will go to the team or business that most competently integrates security into their DevOps methodology.


Juding Criteria:

  • Proof of use
  • Integration with existing methods

 

Show All