• Cybersecurity Excellence Awards
  • Home
  • FAQs
  • Nominations
  • Winners
    • 2024 Winners
    • 2023 Winners
    • 2022 Winners
    • 2021 Winners
    • 2020 Winners
    • 2019 Winners
    • 2018 Winners
    • 2017 Winners
    • 2016 Winners
  • Pricing
  • Contact Us
START YOUR NOMINATION

Nomination deadline:
Jan 31, 2025

  • Cybersecurity Excellence Awards
  • Welcome, visitor! [ Register | Login ]  

Cybersecurity-Logo
  • Welcome, visitor! [ Register | Login ]  

new-award-logo Cybersecurity Excellence Awards

Cybersecurity Excellence Awards

  • Home
  • FAQs
  • Nominations
  • Winners
    • 2024 Winners
    • 2023 Winners
    • 2022 Winners
    • 2021 Winners
    • 2020 Winners
    • 2019 Winners
    • 2018 Winners
    • 2017 Winners
    • 2016 Winners
  • Pricing
  • Contact Us
START YOUR NOMINATION

Nomination deadline:
Jan 31, 2025

new-award-logo

Browse Nominations by Category

Start New Nomination
Can't find the right category for your product? Suggest a new one here!
  • Cybersecurity Product / Service (202)
    • Access Control (1)
    • Advanced Persistent Threat Protection (APT) (0)
    • AI Security Solution (11)
    • Anti-Fraud and Compliance for Mobile Payments (0)
    • Anti Malware (1)
    • Anti Phishing (0)
    • Anti-Piracy (0)
    • Anti Virus (0)
    • Anti-Vishing (0)
    • API Abuse Prevention (0)
    • API Security (1)
    • Application Security (2)
    • Application-Aware Workload Protection (0)
    • Artificial Intelligence Security (0)
    • Attack Surface Management (1)
    • Authorization and Data Governance (0)
    • Automotive Security (IoT) (0)
    • Autonomous Penetration Testing (0)
    • AWS Cloud Security (0)
    • Azure Cloud Security (0)
    • Balanced Development Automation (0)
    • Best Artificial Intelligence (AI) Threat Detection (1)
    • Best Cloud Runtime Security Solution (0)
    • Best Cloud Security Certification (1)
    • Best Cybersecurity Book (0)
    • Best Cybersecurity Certification (2)
    • Best Cybersecurity Certification Training (1)
    • Best Cybersecurity Podcast (2)
    • Best Cybersecurity SOC Monitoring (1)
    • Best Cybersecurity User Experience (1)
    • Best Free Cybersecurity Tool (1)
    • Best GRC Certification Program (0)
    • Best In Multi-Cloud Data Activity Service (0)
    • Best Integrated Authentication (0)
    • Best Integrated Security Platform (2)
    • Best New Compliance Solution (0)
    • Best Passwordless Solution (0)
    • Best RDK Video Accelerator Solution and Certification (0)
    • Biometrics (0)
    • Blockchain Security (0)
    • Board Management Software (0)
    • Bot Defense (0)
    • Breach and Attack Simulation (0)
    • Breach Notification (0)
    • Breach Protection (0)
    • Bring Your Own Device (BYOD) (0)
    • Browser Isolation (0)
    • Business Continuity / Disaster Recovery (BCDR) (1)
    • Case Management (0)
    • CCPA Compliance (0)
    • Central Log Management (0)
    • Certificate Lifecycle Management (1)
    • Certificate-Based Authentication (0)
    • Change Detection (0)
    • Change Management (0)
    • Client-Side Security (1)
    • Cloud Access Security Broker (CASB) (0)
    • Cloud File Analysis (0)
    • Cloud Native Data Security (0)
    • Cloud-Native Firewall (CNF) (0)
    • Cloud Privileged Access Management (1)
    • Cloud Security (3)
    • Cloud Identity Governance (1)
    • Cloud Identity Management (1)
    • Cloud Infrastructure Entitlements Management (CIEM) (0)
    • Cloud Infrastructure Security (0)
    • Cloud Key Lifecycle Management (0)
    • Cloud Security Automation (0)
    • Cloud Security Operations (0)
    • Cloud Workload Protection (1)
    • CMMC Compliance (1)
    • Communication Fraud Protection (0)
    • Communication Risks (0)
    • Compliance Program Management (0)
    • Compliance Solution (2)
    • Consumer Privacy Protection (0)
    • Content Disarm and Reconstruction (CDR) (0)
    • Continuous Controls Monitoring (0)
    • Continuous Detection Posture Management (CDPM) (0)
    • Continuous Improvement and Optimization (1)
    • Continuous Penetration Testing (1)
    • Continuous Security Validation (0)
    • Continuous Threat Exposure Management (CTEM) (3)
    • Critical Infrastructure Security (0)
    • Cyber Asset Management (0)
    • Cyber Defense Planning and Optimization (CDPO) (0)
    • Cyber Exposure Management (1)
    • Cyber Portfolio Management (0)
    • Cyber Risk Quantification Management (1)
    • Cyber Skilling (0)
    • Cyber Threat Intelligence (1)
    • Cybersecurity-as-a-Service (CSaaS) (1)
    • Cybersecurity Assessment (2)
    • Cybersecurity Audit (0)
    • Cybersecurity Blog (3)
    • Cybersecurity for Connected Home (0)
    • Cybersecurity Learning Management System (0)
    • Cybersecurity News (0)
    • Cybersecurity Performance Management (3)
    • Cybersecurity Posture (0)
    • Cybersecurity Product of the Year (4)
    • Cybersecurity Professional Association (0)
    • Cybersecurity Program Management (0)
    • Cybersecurity Research (2)
    • Cybersecurity Talent Screening (0)
    • Cybersecurity Training (4)
    • Cyberstorage (0)
    • Dark Web Monitoring (1)
    • Data-centric Security (1)
    • Data Classification (0)
    • Data Cloud Security (0)
    • Data Governance (1)
    • Data Leakage Prevention (DLP) (2)
    • Data Retention (0)
    • Data Security (2)
    • Data Security Platform (3)
    • Data Security Posture Management (DSPM) (3)
    • Database Security (0)
    • DDoS Protection (1)
    • Deception Technology (0)
    • DevOps Mobile Security Tool (0)
    • DevSecOps (1)
    • Digital Certificates (0)
    • Digital Document Security (0)
    • Digital Footprint Management (1)
    • Digital Rights Management (DRM) (0)
    • Digital Risk Protection (1)
    • DNS Security (1)
    • eDiscovery (0)
    • Email Security (6)
    • Embedded Security (2)
    • Employee Privacy Protection (2)
    • Encryption (0)
    • Endpoint Detection and Response (0)
    • Endpoint Security (2)
    • Endpoint Security Analytics (0)
    • ERP Cybersecurity (1)
    • Executive Privacy Protection (0)
    • Extended Detection and Response (XDR) (2)
    • Exposure Assessment Platform (1)
    • Firewall (0)
    • Firmware Security (1)
    • Forensics (1)
    • Fraud Prevention (1)
    • Fraud Protection (1)
    • Free Patch Management Tool (1)
    • GDPR Compliance (0)
    • Google Cloud Security (0)
    • Hardware Access Control (0)
    • Human Risk Management (0)
    • Hybrid Active Directory Protection (1)
    • Hybrid Cloud Security (0)
    • ICS / SCADA Security (2)
    • Identity and Access Governance (3)
    • Identity and Access Management (11)
    • Identity Proofing and Corroboration (0)
    • Identity Theft Resolution Service (0)
    • Identity Threat Detection and Response (ITDR) (1)
    • Incident Response (1)
    • Information Archiving (0)
    • Insider Threat Solution (2)
    • Integrated Risk Management (0)
    • Intelligence Powered Cybersecurity (0)
    • Internet Connectivity with Embedded Security (0)
    • Internet of Things Security (IoT) (2)
    • Intrusion Detection & Prevention (0)
    • Just-in-Time Administration (1)
    • Leading CyberFusion Solution (0)
    • Level 0 OT Detection (0)
    • Machine Learning (0)
    • Magecart Protection (1)
    • Managed Detection and Response (MDR) (3)
    • Managed Security Service (1)
    • Memory Protection (1)
    • Messaging Security (0)
    • Micro-Segmentation (1)
    • Mobile Application Security (1)
    • Mobile Application Security Testing (0)
    • Mobile Bot Defense (0)
    • Mobile Device Access Management (1)
    • Mobile Device Management (MDM) (0)
    • Mobile Geo Compliance (0)
    • Mobile Payment Security (0)
    • Mobile Risk AI Platform (0)
    • Mobile Security (2)
    • Mobile Security Automation (0)
    • Mobile Security Diagnostics (0)
    • Mobile Security Platform (0)
    • Mobile Social Engineering Defense (0)
    • Mobile Threat Defense (2)
    • Mobile XDR (0)
    • Modular Cybersecurity (0)
    • Multi-Factor Authentication (1)
    • Network Access Control (NAC) (0)
    • Network and System Admin Training (0)
    • Network Detection and Response (0)
    • Network Security (4)
    • Network Security Policy Management (NSPM) (0)
    • Network Traffic Analysis (0)
    • Next Generation Firewall (NGFW) (1)
    • Open Source Security (0)
    • Optical Document Security (0)
    • OT Cyber Risk Management (1)
    • OT Security (3)
    • Patch and Configuration Management (1)
    • Payment Security (0)
    • Pentest as a Service (PtaaS) (1)
    • Phishing Detection and Response (PDR) (0)
    • Phishing-Resistant MFA (0)
    • Policy and User Management (0)
    • Post Quantum Authentication (0)
    • Post Quantum Crypto (0)
    • Post Quantum General Data Protection (0)
    • Post Quantum Network Data Protection (0)
    • Post Quantum Privacy Data Filter (0)
    • Post Quantum Privileged Access Management (0)
    • Quantum Key Distribution (0)
    • Privacy (0)
    • Privacy Enhancing Technology (0)
    • Privileged Access Management (0)
    • Privileged Access Workstations (0)
    • Product Security Platform (0)
    • Ransomware Protection (0)
    • Ransomware Recovery (1)
    • Red Teaming (0)
    • Remote Monitoring and Management (RMM) (0)
    • Remote Wipe (0)
    • Risk-Based Vulnerability Management (1)
    • Risk Management (0)
    • Runtime Application Protection (0)
    • Runtime Application Self-Protection (0)
    • SaaS Security Posture Management (SSPM) (1)
    • SBOM Management (1)
    • SDLC Security (0)
    • SDN / NFV Security (0)
    • Secure Access (1)
    • Secure Access Service Edge (SASE) (1)
    • Secure Data Erasure (0)
    • Secure File Transfer (0)
    • Secure Mobile Device (0)
    • Security Analytics (1)
    • Security Automation (1)
    • Security Awareness Program (4)
    • Secure Collaboration Platform (0)
    • Security Education (0)
    • Security Education Platform (0)
    • Security Information and Event Management (SIEM) (3)
    • Security Investigation (0)
    • Security Log Analysis (0)
    • Security Management (0)
    • Security Management and Operations (0)
    • Security Monitoring (0)
    • Security Operations (0)
    • Security Operations Center (SOC) (2)
    • Security Orchestration, Automation & Response (SOAR) (0)
    • Security Platform (2)
    • Security Posture (0)
    • Security Virtual Assistant (0)
    • Secure Remote Access (0)
    • Serverless Security (0)
    • Session Monitoring and Recording (0)
    • Single Sign-On (SSO) (1)
    • SOC Automation Solution (2)
    • Social Media Security (0)
    • Software Composition Analysis (SCA) (1)
    • Software Supply Chain Security (5)
    • Storage and Archiving (0)
    • Third Party Risk Management (TPRM) (1)
    • Third-Party Security Risk Management (0)
    • Threat Detection and Response (4)
    • Threat Hunting (0)
    • Threat Intelligence (3)
    • Threat Modeling (1)
    • Trusted User Experience (0)
    • Unified HSM and Key Management (0)
    • Unified Threat Management (UTM) (0)
    • Unstructured Data Security (0)
    • User and Entity Behavior Analytics (UEBA) (1)
    • Vendor Risk Management (0)
    • Virtual CISO (1)
    • Virtual Private Network (VPN) (0)
    • Vulnerability Exposure Management (1)
    • Vulnerability Management (0)
    • Web Application Security (1)
    • Web Content Filtering (0)
    • Website Security (0)
    • Wireless Security (0)
    • Workload Identity (1)
    • Zero Day Exploit Detection (0)
    • Zero Trust Security (3)
  • Cybersecurity Company (47)
    • Best Cybersecurity Company (10)
    • Best Cybersecurity Compliance Company (2)
    • Best Cybersecurity Education Provider (5)
    • Best Cybersecurity Marketing Agency (2)
    • Best Cybersecurity Solutions Consolidator (0)
    • Best Cybersecurity Startup (6)
    • Best Cybersecurity Conference (0)
    • Best Data Security Company (1)
    • Best Device Risk Intelligence Company (0)
    • Best Fraud Protection Company (0)
    • Best Managed Security Service Provider (MSSP) (5)
    • Best Mobile App Defense Company (1)
    • Best Network Monitoring Solution Provider (0)
    • Biggest Cybersecurity Brand Growth (0)
    • Cybersecurity PR Agency of the Year (0)
    • Cybersecurity Compliance Service Provider of the Year (1)
    • Cybersecurity Service Provider of the Year (3)
    • Defensive Cyberspace Operations Service Provider (0)
    • Fastest Growing Cybersecurity Company (2)
    • Innovative OT Security Provider (1)
    • Most Innovative Cybersecurity Company (8)
    • MSSP of the Year (0)
    • vCISO Service Provider of the Year (0)
  • Cybersecurity Industry Solution (11)
    • Automotive (0)
    • Best Cybersecurity Industry Solution (3)
    • Best Maritime Cybersecurity (0)
    • Brand Protection and Darkweb Monitoring Provider of the Year (2)
    • Construction (0)
    • Cyber Insurance (0)
    • Energy (0)
    • Financial Services (0)
    • Government (1)
    • Healthcare (2)
    • Hospitality (0)
    • Internet of Medical Things (IoMT) (0)
    • Manufacturing (1)
    • Modern Banking Cybersecurity Solution (0)
    • National Cyber Defense (2)
    • Pharmaceuticals & Biotech (0)
    • Professional Services (0)
    • Retail (0)
    • Security Risk Management for Healthcare (0)
    • Software (0)
    • Software & Internet (0)
    • Supply Chain Security for Healthcare (0)
    • Technology (0)
    • Vulnerability Management for Healthcare (0)
  • Cybersecurity Professional / Team (61)
    • Best Cybersecurity Awareness Program (1)
    • Best Cybersecurity Strategy (0)
    • Best Risk and Compliance Program (0)
    • Chief Executive Officer of the Year (CEO) (7)
    • Chief Information Security Officer of the Year (CISO) (3)
    • Chief Technology Officer of the Year (CTO) (1)
    • Continuous Improvement and Optimization Expert of the Year (0)
    • CSO Team of the Year (0)
    • Cybersecurity and Privacy Management Excellence (0)
    • Cybersecurity Application Security Leader of the Year (1)
    • Cybersecurity Architect of the Year (3)
    • Cybersecurity Audit Professional of the Year (1)
    • Cybersecurity Audit Team of the Year (0)
    • Cybersecurity Blogger of the Year (0)
    • Cybersecurity Compliance & Assurance Professional of the Year (0)
    • Cybersecurity Compliance Service Provider of the Year (0)
    • Cybersecurity Consultant of the Year (3)
    • Cybersecurity Educator of the Year (2)
    • Cybersecurity Entrepreneur of the Year (2)
    • Cybersecurity Executive of the Year (4)
    • Cybersecurity Innovator of the Year (3)
    • Cybersecurity Instructor Team of the Year (1)
    • Cybersecurity Journalist of the Year (0)
    • Cybersecurity Marketer of the Year (2)
    • Cybersecurity PR Professional of the Year (0)
    • Cybersecurity Product Leader of the Year (3)
    • Cybersecurity Professional in Financial Services (2)
    • Cybersecurity Professional in Healthcare (2)
    • Cybersecurity Professional of the Year (6)
    • Cybersecurity Project of the Year (1)
    • Cybersecurity Recruiter of the Year (0)
    • Cybersecurity Risk Management Professional (1)
    • Cybersecurity Service Provider Auditor of the Year (0)
    • Cybersecurity Strategist of the Year (1)
    • Cybersecurity Team of the Year (5)
    • Cybersecurity Vulnerability Management Professional of the Year (2)
    • Cybersecurity Woman of the Year (1)
    • Defensive Cyberspace Operations Team of the Year (0)
    • Global Cybersecurity Advocate (0)
    • Global Cybersecurity Visionary (0)
    • Junior Cybersecurity Professional of the Year (0)
    • Pentest Team of the Year (1)
    • SOC Team of the Year (1)
    • Threat Intelligence Team of the Year (1)

Vote for Your Cybersecurity Favorites

  • New Listings
  • Popular
  • Alphabetical

Hadi Nasrulhaq

  • Cybersecurity Vulnerability Management Professional of the Year

Jscrambler Client-Side Protection Platform

  • Client-Side Security

Jscrambler Client-Side Protection Platform

  • Magecart Protection

Jscrambler

  • Best Cybersecurity Compliance Company

View More Nominations

Aparna Achanta

  • Cybersecurity Professional in Healthcare

PECB Group Inc.

  • Best Cybersecurity Education Provider

Ujas Bhadani

  • Cybersecurity Professional in Healthcare

Memory Protection for Embedded Software, RunSafe Security Platform, RunSafe Security

  • Memory Protection

View More Nominations

AccessMatrix Univeral Authentication Server (UAS)

  • Identity and Access Management

AccessMatrix Universal Access Management (UAM)

  • Secure Access

AccessMatrix™ Universal Sign-On (USO)

  • Single Sign-On (SSO)

Adam Cornelissen

  • Cybersecurity Executive of the Year

View More Nominations

ABOUT THE CYBERSECURITY EXCELLENCE AWARDS

The Cybersecurity Excellence Awards is an annual competition honoring individuals and companies that demonstrate excellence, innovation and leadership in information security.

Cybersecurity_insiders_white_logo-new

Quick Menu

  • Home
  • FAQs
  • Nominations
  • Winners
  • Pricing
  • Contact Us
  • Start Your Nomination
new-award-logo
  • Terms of Service
  • Privacy Policy
© 2025 Cybersecurity Excellence Awards | All Rights Reserved