Award Nominations All Award CategoriesBest Cybersecurity CompanyBest Cybersecurity Compliance CompanyBest Cybersecurity Education ProviderBest Cybersecurity Marketing AgencyBest Cybersecurity Solutions ConsolidatorBest Cybersecurity StartupBest Cybersecurity ConferenceBest Data Security CompanyBest Device Risk Intelligence CompanyBest Fraud Protection CompanyBest Managed Security Service Provider (MSSP)Best Mobile App Defense CompanyBest Network Monitoring Solution ProviderBiggest Cybersecurity Brand GrowthCybersecurity PR Agency of the YearCybersecurity Compliance Service Provider of the YearCybersecurity Service Provider of the YearDefensive Cyberspace Operations Service ProviderFastest Growing Cybersecurity CompanyInnovative OT Security ProviderMost Innovative Cybersecurity CompanyMSSP of the YearvCISO Service Provider of the YearAccess ControlAdvanced Persistent Threat Protection (APT)AI-Powered Vulnerability ManagementAI SecOpsAI Security SolutionAnti-Fraud and Compliance for Mobile PaymentsAnti MalwareAnti PhishingAnti-PiracyAnti VirusAnti-VishingAPI Abuse PreventionAPI SecurityApplication SecurityApplication-Aware Workload ProtectionArtificial Intelligence SecurityAttack Surface ManagementAuthorization and Data GovernanceAutomated Investigation and ResponseAutomotive Security (IoT)Autonomous Penetration TestingAWS Cloud SecurityAzure Cloud SecurityBalanced Development AutomationBest Artificial Intelligence (AI) Threat DetectionBest Cloud Detection and Response SolutionBest Cloud Runtime Security SolutionBest Cloud Security CertificationBest Cybersecurity BookBest Cybersecurity CertificationBest Cybersecurity Certification TrainingBest Cybersecurity PodcastBest Cybersecurity SOC MonitoringBest Cybersecurity User ExperienceBest Free Cybersecurity ToolBest GRC Certification ProgramBest In Multi-Cloud Data Activity ServiceBest Integrated AuthenticationBest Integrated Security PlatformBest New Compliance SolutionBest Non-Human Identity Management SolutionBest Packet Capture PlatformBest Passwordless SolutionBest RDK Video Accelerator Solution and CertificationBest Secure Mobile Hardware PlatformBiometricsBlockchain SecurityBoard Management SoftwareBot DefenseBreach and Attack SimulationBreach NotificationBreach ProtectionBring Your Own Device (BYOD)Browser IsolationBusiness Continuity / Disaster Recovery (BCDR)Case ManagementCCPA ComplianceCentral Log ManagementCertificate Lifecycle ManagementCertificate-Based AuthenticationChange DetectionChange ManagementClient-Side SecurityCloud Access Security Broker (CASB)Cloud File AnalysisCloud Native Data SecurityCloud-Native Firewall (CNF)Cloud Privileged Access ManagementCloud SecurityCloud Identity GovernanceCloud Identity ManagementCloud Infrastructure Entitlements Management (CIEM)Cloud Infrastructure SecurityCloud Key Lifecycle ManagementCloud Security AutomationCloud Security OperationsCloud Workload ProtectionCMMC ComplianceCommunication Fraud ProtectionCommunication RisksCompliance Program ManagementCompliance SolutionConsumer Privacy ProtectionContent Disarm and Reconstruction (CDR)Continuous Controls MonitoringContinuous Detection Posture Management (CDPM)Continuous Improvement and OptimizationContinuous Penetration TestingContinuous Security ValidationContinuous Threat Exposure Management (CTEM)Critical Infrastructure SecurityCyber Asset ManagementCyber Defense Planning and Optimization (CDPO)Cyber Defense ServicesCyber Exposure ManagementCyber Portfolio ManagementCyber Resilience ServicesCyber Risk Quantification ManagementCyber SkillingCyber Threat IntelligenceCybersecurity-as-a-Service (CSaaS)Cybersecurity AssessmentCybersecurity AuditCybersecurity BlogCybersecurity for Connected HomeCybersecurity Learning Management SystemCybersecurity NewsCybersecurity Performance ManagementCybersecurity PostureCybersecurity Product of the YearCybersecurity Professional AssociationCybersecurity Program ManagementCybersecurity ResearchCybersecurity Talent ScreeningCybersecurity TrainingCyberstorageDark Web MonitoringData-centric SecurityData ClassificationData Cloud SecurityData GovernanceData Leakage Prevention (DLP)Data RetentionData SecurityData Security PlatformData Security Posture Management (DSPM)Database SecurityDDoS ProtectionDeception TechnologyDevOps Mobile Security ToolDevSecOpsDigital CertificatesDigital Document SecurityDigital Footprint ManagementDigital Rights Management (DRM)Digital Risk ProtectionDNS SecurityeDiscoveryEmail SecurityEmbedded SecurityEmployee Privacy ProtectionEncryptionEndpoint Detection and ResponseEndpoint SecurityEndpoint Security AnalyticsERP CybersecurityExcellence in Cybersecurity InnovationExecutive Privacy ProtectionExtended Detection and Response (XDR)Exposure Assessment PlatformFirewallFirmware SecurityForensicsFraud PreventionFraud ProtectionFree Patch Management ToolGDPR ComplianceGoogle Cloud SecurityHardware Access ControlHuman Risk ManagementHybrid Active Directory ProtectionHybrid Cloud SecurityICS / SCADA SecurityIdentity and Access GovernanceIdentity and Access ManagementIdentity Proofing and CorroborationIdentity Theft Resolution ServiceIdentity Threat Detection and Response (ITDR)Incident ResponseInformation ArchivingInsider Threat SolutionIntegrated Risk ManagementIntelligence Powered CybersecurityInternet Connectivity with Embedded SecurityInternet of Things Security (IoT)Intrusion Detection & PreventionISPM (Identity Security Posture Management)Just-in-Time AdministrationLeading CyberFusion SolutionLevel 0 OT DetectionMachine LearningMagecart ProtectionManaged Detection and Response (MDR)Managed SASEManaged Security ServiceMemory ProtectionMessaging SecurityMicro-SegmentationMobile Application SecurityMobile Application Security TestingMobile Bot DefenseMobile Device Access ManagementMobile Device Management (MDM)Mobile Geo ComplianceMobile Payment SecurityMobile Risk AI PlatformMobile SecurityMobile Security AutomationMobile Security DiagnosticsMobile Security PlatformMobile Social Engineering DefenseMobile Threat DefenseMobile XDRModular CybersecurityMulti-Factor AuthenticationNetwork Access Control (NAC)Network and System Admin TrainingNetwork Detection and ResponseNetwork SecurityNetwork Security Policy Management (NSPM)Network Traffic AnalysisNext Generation Firewall (NGFW)Open Source SecurityOptical Document SecurityOT Cyber Risk ManagementOT SecurityPatch and Configuration ManagementPayment SecurityPentest as a Service (PtaaS)Phishing Detection and Response (PDR)Phishing-Resistant MFAPolicy and User ManagementPost Quantum AuthenticationPost Quantum CryptoPost Quantum General Data ProtectionPost Quantum Network Data ProtectionPost Quantum Privacy Data FilterPost Quantum Privileged Access ManagementQuantum Key DistributionPrivacyPrivacy Enhancing TechnologyPrivileged Access ManagementPrivileged Access WorkstationsProduct Security PlatformRansomware ProtectionRansomware RecoveryRed TeamingRemote Monitoring and Management (RMM)Remote WipeRisk-Based Vulnerability ManagementRisk ManagementRuntime Application ProtectionRuntime Application Self-ProtectionSaaS Security Posture Management (SSPM)SBOM ManagementSDLC SecuritySDN / NFV SecuritySecure AccessSecure Access Service Edge (SASE)Secure Data ErasureSecure File TransferSecure Mobile DeviceSecurity AnalyticsSecurity AutomationSecurity Awareness ProgramSecure Collaboration PlatformSecurity EducationSecurity Education PlatformSecurity Information and Event Management (SIEM)Security InvestigationSecurity Log AnalysisSecurity ManagementSecurity Management and OperationsSecurity MonitoringSecurity OperationsSecurity Operations Center (SOC)Security Orchestration, Automation & Response (SOAR)Security PlatformSecurity PostureSecurity Virtual AssistantSecure Remote AccessServerless SecuritySession Monitoring and RecordingSingle Sign-On (SSO)SOC Automation SolutionSocial Media SecuritySoftware Composition Analysis (SCA)Software Supply Chain SecurityStorage and ArchivingThird Party Risk Management (TPRM)Third-Party Security Risk ManagementThreat Detection and ResponseThreat HuntingThreat IntelligenceThreat ModelingTrusted User ExperienceUnified HSM and Key ManagementUnified Threat Management (UTM)Unstructured Data SecurityUser and Entity Behavior Analytics (UEBA)Vendor Risk ManagementVirtual CISOVirtual Private Network (VPN)Vulnerability Exposure ManagementVulnerability ManagementWeb Application SecurityWeb Content FilteringWebsite SecurityWireless SecurityWorkload IdentityZero Day Exploit DetectionZero Trust SecurityAI Security Innovator of the YearBest Cybersecurity Awareness ProgramBest Cybersecurity StrategyBest Risk and Compliance ProgramChief Executive Officer of the Year (CEO)Chief Information Security Officer of the Year (CISO)Chief Technology Officer of the Year (CTO)Continuous Improvement and Optimization Expert of the YearCSO Team of the YearCybersecurity and Privacy Management ExcellenceCybersecurity Application Security Leader of the YearCybersecurity Architect of the YearCybersecurity Audit Professional of the YearCybersecurity Audit Team of the YearCybersecurity Blogger of the YearCybersecurity Compliance & Assurance Professional of the YearCybersecurity Compliance Service Provider of the YearCybersecurity Consultant of the YearCybersecurity Educator of the YearCybersecurity Entrepreneur of the YearCybersecurity Executive of the YearCybersecurity Innovator of the YearCybersecurity Instructor Team of the YearCybersecurity Journalist of the YearCybersecurity Marketer of the YearCybersecurity PR Professional of the YearCybersecurity Product Leader of the YearCybersecurity Professional in Financial ServicesCybersecurity Professional in HealthcareCybersecurity Professional of the YearCybersecurity Project of the YearCybersecurity Recruiter of the YearCybersecurity Risk Management ProfessionalCybersecurity Service Provider Auditor of the YearCybersecurity Strategist of the YearCybersecurity Team of the YearCybersecurity Vulnerability Management Professional of the YearCybersecurity Woman of the YearDefensive Cyberspace Operations Team of the YearGlobal Cybersecurity AdvocateGlobal Cybersecurity VisionaryJunior Cybersecurity Professional of the YearPentest Team of the YearSOC Team of the YearThreat Intelligence Team of the YearAutomotiveBest Cybersecurity Industry SolutionBest Maritime CybersecurityBrand Protection and Darkweb Monitoring Provider of the YearConstructionCritical InfrastructureCyber InsuranceEnergyFinancial ServicesGovernmentHealthcareHospitalityInternet of Medical Things (IoMT)ManufacturingModern Banking Cybersecurity SolutionNational Cyber DefensePharmaceuticals & BiotechProfessional ServicesRetailSecurity Risk Management for HealthcareSoftwareSoftware & InternetSupply Chain Security for HealthcareTechnologyVulnerability Management for Healthcare Select Award YearBefore 2017201720182019202020212022202320242025 All Regions North America South America Europe Africa Asia Middle East All Company Sizes Between 1 to 9 employees Between 10 to 49 employees Between 50 to 99 employees Between 100 to 499 employees Between 500 to 999 employees Between 1,000 to 4,999 employees 10,000 or more employees Sort by Title Sort by Award Category Sort by Region ZTEdge Web Ransomware Protection2022 Award Recipient ZTEdge Web Anti Phishing2022 Award Recipient←123…160161162163