2024 Cybersecurity Product / Service Awards – Winners All Award CategoriesAccess ControlAdvanced Persistent Threat Protection (APT)AI Security SolutionAnti-Fraud and Compliance for Mobile PaymentsAnti MalwareAnti PhishingAnti-PiracyAnti VirusAnti-VishingAPI SecurityApplication SecurityApplication-Aware Workload ProtectionArtificial Intelligence SecurityAttack Surface ManagementAuthorization and Data GovernanceAutomotive Security (IoT)Autonomous Penetration TestingAWS Cloud SecurityAzure Cloud SecurityBalanced Development AutomationBest Artificial Intelligence (AI) Threat DetectionBest Cloud Runtime Security SolutionBest Cloud Security CertificationBest Cybersecurity BookBest Cybersecurity CertificationBest Cybersecurity PodcastBest Cybersecurity SOC MonitoringBest Cybersecurity User ExperienceBest Free Cybersecurity ToolBest GRC Certification ProgramBest In Multi-Cloud Data Activity ServiceBest Integrated AuthenticationBest Integrated Security PlatformBest New Compliance SolutionBest Passwordless SolutionBest RDK Video Accelerator Solution and CertificationBiometricsBlockchain SecurityBoard Management SoftwareBot DefenseBreach and Attack SimulationBreach NotificationBreach ProtectionBring Your Own Device (BYOD)Browser IsolationBusiness Continuity / Disaster Recovery (BCDR)Case ManagementCCPA ComplianceCentral Log ManagementCertificate Lifecycle ManagementCertificate-Based AuthenticationChange DetectionChange ManagementClient-Side SecurityCloud Access Security Broker (CASB)Cloud File AnalysisCloud Native Data SecurityCloud-Native Firewall (CNF)Cloud Privileged Access ManagementCloud SecurityCloud Identity GovernanceCloud Identity ManagementCloud Infrastructure Entitlements Management (CIEM)Cloud Infrastructure SecurityCloud Key Lifecycle ManagementCloud Security AutomationCloud Security OperationsCloud Workload ProtectionCMMC ComplianceCommunication Fraud ProtectionCommunication RisksCompliance Program ManagementCompliance SolutionConsumer Privacy ProtectionContent Disarm and Reconstruction (CDR)Continuous Controls MonitoringContinuous Detection Posture Management (CDPM)Continuous Improvement and OptimizationContinuous Penetration TestingContinuous Security ValidationContinuous Threat Exposure Management (CTEM)Critical Infrastructure SecurityCyber Asset ManagementCyber Defense Planning and Optimization (CDPO)Cyber Exposure ManagementCyber Portfolio ManagementCyber Risk Quantification ManagementCyber SkillingCyber Threat IntelligenceCybersecurity-as-a-Service (CSaaS)Cybersecurity AssessmentCybersecurity AuditCybersecurity BlogCybersecurity for Connected HomeCybersecurity Learning Management SystemCybersecurity NewsCybersecurity Performance ManagementCybersecurity PostureCybersecurity Product of the YearCybersecurity Professional AssociationCybersecurity Program ManagementCybersecurity ResearchCybersecurity Talent ScreeningCybersecurity TrainingCyberstorageDark Web MonitoringData-centric SecurityData ClassificationData Cloud SecurityData GovernanceData Leakage Prevention (DLP)Data RetentionData SecurityData Security PlatformData Security Posture Management (DSPM)Database SecurityDeception TechnologyDevOps Mobile Security ToolDevSecOpsDigital CertificatesDigital Document SecurityDigital Footprint ManagementDigital Rights Management (DRM)Digital Risk ProtectionDNS SecurityeDiscoveryEmail SecurityEmbedded SecurityEmployee Privacy ProtectionEncryptionEndpoint Detection and ResponseEndpoint SecurityEndpoint Security AnalyticsERP CybersecurityExecutive Privacy ProtectionExtended Detection and Response (XDR)FirewallFirmware SecurityForensicsFraud PreventionFraud ProtectionFree Patch Management ToolGDPR ComplianceGoogle Cloud SecurityHardware Access ControlHuman Risk ManagementHybrid Active Directory ProtectionHybrid Cloud SecurityICS / SCADA SecurityIdentity and Access GovernanceIdentity and Access ManagementIdentity Proofing and CorroborationIdentity Theft Resolution ServiceIdentity Threat Detection and Response (ITDR)Incident ResponseInformation ArchivingInsider Threat SolutionIntegrated Risk ManagementIntelligence Powered CybersecurityInternet Connectivity with Embedded SecurityInternet of Things Security (IoT)Intrusion Detection & PreventionJust-in-Time AdministrationLevel 0 OT DetectionMachine LearningMagecart ProtectionManaged Detection and Response (MDR)Managed Security ServiceMemory ProtectionMessaging SecurityMicro-SegmentationMobile Application SecurityMobile Application Security TestingMobile Bot DefenseMobile Device Management (MDM)Mobile Geo ComplianceMobile Payment SecurityMobile Risk AI PlatformMobile SecurityMobile Security AutomationMobile Security DiagnosticsMobile Security PlatformMobile Social Engineering DefenseMobile Threat DefenseMobile XDRModular CybersecurityMulti-Factor AuthenticationNetwork Access Control (NAC)Network and System Admin TrainingNetwork Detection and ResponseNetwork SecurityNetwork Security Policy Management (NSPM)Network Traffic AnalysisNext Generation Firewall (NGFW)Open Source SecurityOptical Document SecurityOT Cyber Risk ManagementOT SecurityPatch and Configuration ManagementPayment SecurityPentest as a Service (PtaaS)Phishing Detection and Response (PDR)Phishing-Resistant MFAPolicy and User ManagementPost Quantum AuthenticationPost Quantum CryptoPost Quantum General Data ProtectionPost Quantum Network Data ProtectionPost Quantum Privacy Data FilterPost Quantum Privileged Access ManagementQuantum Key DistributionPrivacyPrivacy Enhancing TechnologyPrivileged Access ManagementPrivileged Access WorkstationsProduct Security PlatformRansomware ProtectionRansomware RecoveryRed TeamingRemote Monitoring and Management (RMM)Remote WipeRisk-Based Vulnerability ManagementRisk ManagementRuntime Application ProtectionRuntime Application Self-ProtectionSaaS Security Posture Management (SSPM)SBOM ManagementSDLC SecuritySDN / NFV SecuritySecure AccessSecure Access Service Edge (SASE)Secure Data ErasureSecure File TransferSecure Mobile DeviceSecurity AnalyticsSecurity AutomationSecurity Awareness ProgramSecure Collaboration PlatformSecurity EducationSecurity Education PlatformSecurity Information and Event Management (SIEM)Security InvestigationSecurity Log AnalysisSecurity ManagementSecurity Management and OperationsSecurity MonitoringSecurity OperationsSecurity Operations Center (SOC)Security Orchestration, Automation & Response (SOAR)Security PlatformSecurity PostureSecurity Virtual AssistantSecure Remote AccessServerless SecuritySession Monitoring and RecordingSingle Sign-On (SSO)SOC Automation SolutionSocial Media SecuritySoftware Composition Analysis (SCA)Software Supply Chain SecurityStorage and ArchivingThird Party Risk Management (TPRM)Third-Party Security Risk ManagementThreat Detection and ResponseThreat HuntingThreat IntelligenceThreat ModelingTrusted User ExperienceUnified HSM and Key ManagementUnified Threat Management (UTM)Unstructured Data SecurityUser and Entity Behavior Analytics (UEBA)Vendor Risk ManagementVirtual CISOVirtual Private Network (VPN)Vulnerability ManagementWeb Application SecurityWeb Content FilteringWebsite SecurityWireless SecurityZero Day Exploit DetectionZero Trust Security All RegionsNorth AmericaSouth AmericaEuropeAfricaAsiaMiddle East All Company SizesBetween 1 to 9 employeesBetween 10 to 49 employeesBetween 50 to 99 employeesBetween 100 to 499 employeesBetween 500 to 999 employeesBetween 1,000 to 4,999 employees10,000 or more employees Sort by TitleSort by Award CategorySort by Region CrowdStrike Adversary Universe PodcastBest Cybersecurity Podcast Headquarters: North America Company Size: 5,000 to 9,999 CrowdStrike Charlotte AIAI Security Solution Headquarters: North America Company Size: 5,000 to 9,999 CrowdStrike Falcon Cloud SecurityCloud Security Headquarters: North America Company Size: 5,000 to 9,999 CrowdStrike Falcon Data ProtectionData Leakage Prevention (DLP) Headquarters: North America Company Size: 5,000 to 9,999 CrowdStrike Falcon Exposure ManagementRisk-Based Vulnerability Management Headquarters: North America Company Size: 5,000 to 9,999 CrowdStrike Falcon Identity ProtectionIdentity Threat Detection and Response (ITDR) Headquarters: North America Company Size: 5,000 to 9,999 CUJO AI Device Intelligence and Security for Network OperatorsInternet of Things Security (IoT) Headquarters: North America Company Size: 100 to 499 CUJO AI LabsCybersecurity Research Headquarters: North America Company Size: 100 to 499 CultureAI Human Risk Management PlatformHuman Risk Management Headquarters: Europe Company Size: 10 to 49 CultureAI Human Risk Management PlatformSecurity Automation Headquarters: Europe Company Size: 10 to 49 Cyber 360 – eGRCBest New Compliance Solution Headquarters: Middle East Company Size: 50 to 99 Cyber Defense Group – Cybersecurity as a ServiceCybersecurity-as-a-Service (CSaaS) Headquarters: North America Company Size: 10 to 49 ←123…6789101112…343536→
CrowdStrike Adversary Universe PodcastBest Cybersecurity Podcast Headquarters: North America Company Size: 5,000 to 9,999
CrowdStrike Charlotte AIAI Security Solution Headquarters: North America Company Size: 5,000 to 9,999
CrowdStrike Falcon Cloud SecurityCloud Security Headquarters: North America Company Size: 5,000 to 9,999
CrowdStrike Falcon Data ProtectionData Leakage Prevention (DLP) Headquarters: North America Company Size: 5,000 to 9,999
CrowdStrike Falcon Exposure ManagementRisk-Based Vulnerability Management Headquarters: North America Company Size: 5,000 to 9,999
CrowdStrike Falcon Identity ProtectionIdentity Threat Detection and Response (ITDR) Headquarters: North America Company Size: 5,000 to 9,999
CUJO AI Device Intelligence and Security for Network OperatorsInternet of Things Security (IoT) Headquarters: North America Company Size: 100 to 499
CultureAI Human Risk Management PlatformHuman Risk Management Headquarters: Europe Company Size: 10 to 49
CultureAI Human Risk Management PlatformSecurity Automation Headquarters: Europe Company Size: 10 to 49
Cyber Defense Group – Cybersecurity as a ServiceCybersecurity-as-a-Service (CSaaS) Headquarters: North America Company Size: 10 to 49