Browse Nominations by Category
Start New Nomination- Cybersecurity Product / Service (581)
- Access Control (5)
- Advanced Persistent Threat Protection (APT) (3)
- Anti Malware (4)
- Anti Phishing (8)
- Anti Virus (2)
- API Security (2)
- Application Security (10)
- Application-Aware Workload Protection (1)
- Artificial Intelligence Security (6)
- Automotive Security (IoT) (2)
- AWS Cloud Security (6)
- Azure Cloud Security (4)
- Balanced Development Automation (1)
- Best Cybersecurity Podcast (8)
- Best Free Cybersecurity Tool (7)
- Biometrics (2)
- Blockchain Security (0)
- Board Management Software (0)
- Bot Defense (7)
- Breach and Attack Simulation (7)
- Breach Protection (4)
- Bring Your Own Device (BYOD) (2)
- Browser Isolation (2)
- Business Continuity / Disaster Recovery (BCDR) (3)
- CCPA Compliance (2)
- Central Log Management (1)
- Change Detection (0)
- Change Management (0)
- Client-Side Security (2)
- Cloud Access Security Broker (CASB) (3)
- Cloud File Analysis (1)
- Cloud Privileged Access Management (3)
- Cloud Security (17)
- Cloud Identity Governance (6)
- Cloud Infrastructure Entitlements Management (CIEM) (4)
- Cloud Key Lifecycle Management (1)
- Cloud Workload Protection (2)
- Communication Fraud Protection (0)
- Compliance Solution (12)
- Content Disarm and Reconstruction (CDR) (1)
- Continuous Controls Monitoring (0)
- Continuous Improvement and Optimization (2)
- Critical Infrastructure Security (3)
- Cyber Skilling (1)
- Cyber Threat Intelligence (10)
- Cybersecurity-as-a-Service (CSaaS) (2)
- Cybersecurity Assessment (4)
- Cybersecurity Audit (2)
- Cybersecurity for Connected Home (3)
- Cybersecurity Learning Management System (1)
- Cybersecurity News (0)
- Cybersecurity Performance Management (1)
- Cybersecurity Program Management (2)
- Cybersecurity Research (0)
- Cybersecurity Talent Screening (1)
- Cybersecurity Training (4)
- Data-centric Security (8)
- Data Classification (3)
- Data Cloud Security (0)
- Data Governance (2)
- Data Leakage Prevention (DLP) (7)
- Data Retention (0)
- Data Security (6)
- Database Security (2)
- Deception Technology (3)
- Digital Certificates (1)
- Digital Rights Management (DRM) (3)
- eDiscovery (1)
- Email Security (7)
- Embedded Security (2)
- Encryption (4)
- Endpoint Detection and Response (7)
- Endpoint Security (14)
- ERP Cybersecurity (0)
- Firewall (3)
- Firmware Security (3)
- Forensics (4)
- Fraud Prevention (9)
- Fraud Protection (5)
- GDPR Compliance (4)
- Google Cloud Security (3)
- Hardware Access Control (3)
- Hybrid Active Directory Protection (1)
- Hybrid Cloud Security (5)
- ICS / SCADA Security (4)
- Identity and Access Governance (5)
- Identity and Access Management (9)
- Identity Proofing and Corroboration (3)
- Identity Theft Resolution Service (2)
- Incident Response (8)
- Information Archiving (1)
- Insider Threat Solution (10)
- Integrated Risk Management (4)
- Internet of Things Security (IoT) (3)
- Intrusion Detection & Prevention (3)
- Machine Learning (3)
- Magecart Protection (1)
- Managed Detection and Response (MDR) (11)
- Managed Security Service (9)
- Memory Protection (1)
- Messaging Security (0)
- Micro-Segmentation (3)
- Mobile Application Security (3)
- Mobile Application Security Testing (0)
- Mobile Device Management (MDM) (1)
- Mobile Security (1)
- Mobile Security Diagnostics (0)
- Mobile Threat Defense (1)
- Multi-Factor Authentication (1)
- Network Access Control (NAC) (2)
- Network Detection and Response (1)
- Network Security (11)
- Network Security Policy Management (NSPM) (1)
- Network Traffic Analysis (6)
- Open Source Security (0)
- Passwordless Authentication (0)
- Patch and Configuration Management (1)
- Payment Security (1)
- Pentest as a Service (PtaaS) (2)
- Phishing Detection and Response (PDR) (1)
- Policy and User Management (3)
- Privacy (4)
- Privileged Access Management (7)
- Privileged Access Workstations (0)
- Ransomware Protection (5)
- Ransomware Recovery (1)
- Remote Wipe (1)
- Risk Management (9)
- Runtime Application Protection (2)
- Runtime Application Self-Protection (2)
- SDN / NFV Security (0)
- Secure Access (2)
- Secure Access Service Edge (SASE) (4)
- Secure Data Erasure (1)
- Secure File Transfer (4)
- Secure Mobile Device (1)
- Security Analytics (3)
- Security Automation (4)
- Security Awareness Program (2)
- Security Education (5)
- Security Education Platform (5)
- Security Information and Event Management (SIEM) (5)
- Security Investigation (4)
- Security Log Analysis (2)
- Security Management (4)
- Security Monitoring (3)
- Security Orchestration, Automation & Response (SOAR) (3)
- Security Platform (3)
- Secure Remote Access (3)
- Serverless Security (1)
- Session Monitoring and Recording (1)
- Single Sign-On (SSO) (0)
- Social Media Security (2)
- Software Composition Analysis (SCA) (0)
- Storage and Archiving (0)
- Third Party Risk Management (TPRM) (3)
- Threat Detection, Intelligence and Response (20)
- Threat Hunting (5)
- Threat Modeling (3)
- Unified Threat Management (UTM) (1)
- Unstructured Data Security (0)
- User and Entity Behavior Analytics (UEBA) (4)
- Vendor Risk Management (4)
- Virtual Private Network (VPN) (1)
- Vulnerability Management (10)
- Web Application Security (7)
- Website Security (2)
- Wireless Security (0)
- Zero Day Exploit Detection (3)
- Zero Trust Security (12)
- Cybersecurity Company (123)
- Best Cybersecurity Company (39)
- Best Cybersecurity Education Provider (9)
- Best Cybersecurity Marketing Agency (1)
- Best Cybersecurity Solutions Consolidator (0)
- Best Cybersecurity Startup (22)
- Best Cybersecurity Conference (2)
- Biggest Cybersecurity Brand Growth (0)
- Cybersecurity PR Agency of the Year (1)
- Cybersecurity Service Provider of the Year (11)
- Defensive Cyberspace Operations Service Provider (1)
- Fastest Growing Cybersecurity Company (11)
- Most Innovative Cybersecurity Company (26)
- Cybersecurity Industry Solution (43)
- Automotive (3)
- Construction (1)
- Energy (2)
- Financial Services (8)
- Government (5)
- Healthcare (6)
- Hospitality (1)
- Manufacturing (3)
- National Cyber Defense (3)
- Pharmaceuticals & Biotech (1)
- Professional Services (1)
- Retail (2)
- Software (3)
- Software & Internet (1)
- Technology (3)
- Cybersecurity Professional / Team (58)
- Chief Information Security Officer of the Year (CISO) (1)
- Chief Technology Officer of the Year (CTO) (2)
- Cybersecurity Audit Professional of the Year (1)
- Cybersecurity Audit Team of the Year (0)
- Cybersecurity Blogger of the Year (6)
- Cybersecurity Compliance & Assurance Professional of the Year (1)
- Cybersecurity Consultant of the Year (1)
- Cybersecurity Educator of the Year (3)
- Cybersecurity Executive of the Year (9)
- Cybersecurity Journalist of the Year (1)
- Cybersecurity Marketer of the Year (6)
- Cybersecurity PR Professional of the Year (1)
- Cybersecurity Professional of the Year (5)
- Cybersecurity Project of the Year (1)
- Cybersecurity Recruiter of the Year (0)
- Cybersecurity Strategist of the Year (5)
- Cybersecurity Team of the Year (5)
- Cybersecurity Woman of the Year (7)
- Defensive Cyberspace Operations Team of the Year (1)
- SOC Team of the Year (2)