2024 Cybersecurity Product / Service Awards – Winners All Award Categories Access ControlAdvanced Persistent Threat Protection (APT)Agentic AI GovernanceAgentic AI PlatformAgentic AI SecurityAI-Powered Vulnerability ManagementAI Data Security & GovernanceAI Model SecurityAI SecOpsAI Security SolutionAnti MalwareAnti PhishingAnti-PiracyAnti VirusAPI Abuse PreventionAPI SecurityApplication SecurityArtificial Intelligence SecurityAttack Surface ManagementAutomated Investigation and ResponseAutomotive Security (IoT)Best Cybersecurity BookBest Cybersecurity PodcastBest Cybersecurity User ExperienceBest Non-Human Identity Management SolutionPasswordless AuthenticationBiometricsBot DefenseBreach and Attack SimulationBreach ProtectionBrowser IsolationBusiness Continuity / Disaster Recovery (BCDR)Central Log ManagementCertificate Lifecycle ManagementChange ManagementCloud Access Security Broker (CASB)Cloud-Native Firewall (CNF)Cloud Privileged Access ManagementCloud SecurityCloud Security Posture Management (CSPM)Cloud Identity ManagementCloud Infrastructure Entitlements Management (CIEM)Cloud Infrastructure SecurityCloud Security AutomationCloud Security OperationsCloud Workload ProtectionCompliance Program ManagementCompliance SolutionContent Disarm and Reconstruction (CDR)Continuous Controls MonitoringContinuous Detection Posture Management (CDPM)Continuous Threat Exposure Management (CTEM)Critical Infrastructure SecurityCyber Asset ManagementCyber Defense ServicesCyber Exposure ManagementCyber Resilience ServicesCyber Risk Quantification ManagementCyber SkillingCybersecurity-as-a-Service (CSaaS)Cybersecurity AssessmentCybersecurity BlogCybersecurity Performance ManagementCybersecurity Posture ManagementCybersecurity Professional AssociationCybersecurity Program ManagementCybersecurity ResearchCybersecurity TrainingDark Web MonitoringData ClassificationData GovernanceData Leakage Prevention (DLP)Data SecurityData Security PlatformData Security Posture Management (DSPM)DDoS ProtectionDevSecOpsDigital CertificatesDigital Document SecurityDigital Rights Management (DRM)DNS SecurityEmail SecurityEmbedded SecurityEncryptionEndpoint Detection and ResponseEndpoint SecurityERP CybersecurityExcellence in Cybersecurity InnovationExtended Detection and Response (XDR)Exposure Assessment PlatformFirewallFirmware SecurityForensicsFraud PreventionGDPR ComplianceHuman Risk ManagementICS / SCADA SecurityIdentity and Access ManagementIdentity Threat Detection and Response (ITDR)Incident ResponseInsider Risk ManagementInternet of Things Security (IoT)Intrusion Detection & PreventionISPM (Identity Security Posture Management)Machine Identity SecurityMachine LearningManaged Detection and Response (MDR)Managed SASEManaged Security ServiceMessaging SecurityMicro-SegmentationMobile Application SecurityMobile Device Management (MDM)Mobile SecurityMulti-Factor AuthenticationNetwork Access Control (NAC)Network and System Admin TrainingNetwork Detection and ResponseNetwork SecurityNetwork Security Policy Management (NSPM)Network Traffic AnalysisNext Generation Firewall (NGFW)NHI SecurityOpen Source SecurityOT SecurityOT Cyber Risk ManagementPatch and Configuration ManagementPayment SecurityPentest as a Service (PtaaS)Phishing Detection and Response (PDR)Phishing-Resistant MFAPolicy and User ManagementPost Quantum AuthenticationPost Quantum CryptoPost Quantum General Data ProtectionPost Quantum Network Data ProtectionPost Quantum Privileged Access ManagementQuantum Key DistributionPrivacyPrivileged Access ManagementProduct Security PlatformRansomware ProtectionRansomware RecoveryRemote Monitoring and Management (RMM)Risk-Based Vulnerability ManagementRisk ManagementRuntime Application Self-Protection (RASP)SaaS Security Posture Management (SSPM)SBOM ManagementSDLC SecuritySecret and Credential ManagementSecure AccessSecure Access Service Edge (SASE)Secure Collaboration PlatformSecure Data ErasureSecure File TransferSecurity AnalyticsSecurity AutomationSecurity Awareness ProgramSecurity Data LayerSecurity EducationSecurity Information and Event Management (SIEM)Security InvestigationSecurity Log AnalysisSecurity Management and OperationsSecurity MonitoringSecurity OperationsSecurity Orchestration, Automation & Response (SOAR)Security PlatformSecure Remote AccessServerless SecuritySession Monitoring and RecordingSingle Sign-On (SSO)SOC-as-a-ServiceSOC AutomationSocial Media SecuritySoftware Supply Chain SecurityStorage and ArchivingThird Party Risk Management (TPRM)Threat Detection and ResponseThreat HuntingThreat IntelligenceThreat ModelingUnified HSM and Key ManagementUnified Threat Management (UTM)Unstructured Data SecurityUser and Entity Behavior Analytics (UEBA)Vendor Risk ManagementVirtual CISOVirtual Private Network (VPN)Vulnerability ManagementWeb Application SecurityWeb Content FilteringWebsite SecurityWireless SecurityZero Day Exploit DetectionZero Trust Security All Regions North America South America Europe Africa Asia Middle East All Company Sizes Between 1 to 9 employees Between 10 to 49 employees Between 50 to 99 employees Between 100 to 499 employees Between 500 to 999 employees Between 1,000 to 4,999 employees 10,000 or more employees Sort by Title Sort by Award Category Sort by Region ReversingLabs Software Supply Chain Security 2024 Award Recipient World Region: North America Company Size: 100 to 499 runZero Platform Cyber Asset Management 2024 Award Recipient World Region: North America Company Size: 50 to 99 S-Scan Web Content Filtering 2024 Award Recipient World Region: Asia Company Size: 50 to 99 Safous Zero Trust Platform Identity and Access Management 2024 Award Recipient World Region: Asia Company Size: 1,000 to 4,999 Safous Zero Trust Platform Zero Trust Security 2024 Award Recipient World Region: Asia Company Size: 1,000 to 4,999 Safous Zero Trust Platform API Security 2024 Award Recipient World Region: Asia Company Size: 1,000 to 4,999 Salt Security API Protection Platform API Security 2024 Award Recipient World Region: North America Company Size: 100 to 499 Sangfor Access Secure Secure Access Service Edge (SASE) 2024 Award Recipient World Region: Asia Company Size: 5,000 to 9,999 Sangfor Cyber Command Network Detection and Response 2024 Award Recipient World Region: Asia Company Size: 5,000 to 9,999 Sangfor Cyber Guardian Managed Detection and Response (MDR) 2024 Award Recipient World Region: Asia Company Size: 5,000 to 9,999 Sangfor Endpoint Secure Endpoint Security 2024 Award Recipient World Region: Asia Company Size: 5,000 to 9,999 Sangfor Endpoint Secure Ransomware Protection 2024 Award Recipient World Region: Asia Company Size: 5,000 to 9,999 ← 1 2 3 … 18 19 20 21 22 23 24 … 27 28 29 →
ReversingLabs Software Supply Chain Security 2024 Award Recipient World Region: North America Company Size: 100 to 499
runZero Platform Cyber Asset Management 2024 Award Recipient World Region: North America Company Size: 50 to 99
Safous Zero Trust Platform Identity and Access Management 2024 Award Recipient World Region: Asia Company Size: 1,000 to 4,999
Safous Zero Trust Platform Zero Trust Security 2024 Award Recipient World Region: Asia Company Size: 1,000 to 4,999
Safous Zero Trust Platform API Security 2024 Award Recipient World Region: Asia Company Size: 1,000 to 4,999
Salt Security API Protection Platform API Security 2024 Award Recipient World Region: North America Company Size: 100 to 499
Sangfor Access Secure Secure Access Service Edge (SASE) 2024 Award Recipient World Region: Asia Company Size: 5,000 to 9,999
Sangfor Cyber Command Network Detection and Response 2024 Award Recipient World Region: Asia Company Size: 5,000 to 9,999
Sangfor Cyber Guardian Managed Detection and Response (MDR) 2024 Award Recipient World Region: Asia Company Size: 5,000 to 9,999
Sangfor Endpoint Secure Endpoint Security 2024 Award Recipient World Region: Asia Company Size: 5,000 to 9,999
Sangfor Endpoint Secure Ransomware Protection 2024 Award Recipient World Region: Asia Company Size: 5,000 to 9,999