Welcome to the InfoSec Awards for 2018. It’s been nearly six months in the making – our annual review of the hottest, most innovative, best, market leaders, next-generation and cutting edge INFOSEC companies offering incredible products and services.
This year we decided to also include and give credit to a small list of public relations firms that do a great job to help get the word out about these innovators and we’ve included a small list of very important people to keep an eye on – because they are making a difference.
We scoured the globe and found nearly 3,000 companies who create and offer the most respected InfoSec products and services. Some of them you have never even heard of until today. Some are startups and some are early stage. Some are bigger known players. But what they all have in common is a drive for innovation. They truly want to help you get ahead of the next breach. They are on a mission to help you comply with regulations, stop the cyber-criminals, hackers, hacktivists, cyber terrorists and threats against critical infrastructure.
They offer solutions for businesses and government agencies of all sizes, big and small.
The judging continues to be challenging and difficult and to those who are finalists but don’t win this year, stay tuned. There will always be future opportunities to continue to improve and innovate and let us know. The finalists are here for your review.
Please join us during RSA Conference 2018 in April, when we announce the winners and let them know you found them in Cyber Defense Magazine.
Finalists, please feel free to click this link and download a zip file containing the InfoSec Awards 2018 Finalist logo to use on your site and in your marketing. We took this list of almost 3,000 cyber-security companies around the globe and narrowed it down to just under 500 market leaders as finalists and of those our judges will select, there will be less than 200 winners.
Here are the finalists:
1E |
360 Skylar |
A10 Networks Inc. |
Absolute |
Acalvio Technologies |
Accend Networks |
Access Layers |
Accolade Technology |
Acunetix |
Adaptiva |
Agari |
AlgoSec |
Alibaba Group |
AlienVault |
Allegro Software |
ALLPRIV |
AllthatSoft |
Allure Security Technology, Inc. |
Alsid |
Alta Associates |
Anomali |
Antiy Labs |
APCON |
AppGuard |
Appthority |
AppViewX |
Apricorn |
Apvera |
Arcon TechSolution |
Arctic Wolf |
ARPR |
Artifex Software Inc. |
Arxan Technologies |
AT&T |
Ataata, Inc. |
AttackIQ |
Attivo Networks |
Auth0 |
AUTHEN2CATE |
Authentic8 |
AuthLite |
Avanan Inc |
Avast |
AvePoint |
AVL Mobile Security |
Awake Security |
Axonius |
Ayehu Inc. |
BAE Systems |
Baffle, Inc. |
Balabit |
Balbix |
Bandura Systems |
Barkly |
Bastille |
Bay Dynamics |
BEEZZ |
BehavioSec |
Beyond Security |
BeyondTrust |
Bitdefender |
Big Switch Networks |
Biscom |
Bitglass |
BitSight Technologies |
BittWare |
Bivio Networks |
Black Duck Software |
Bloombase |
Blue Ridge Networks |
Bluedon Information Security Technologies Co, Ltd. |
Blueliv |
BlueTalon |
Bluink |
BluVector |
Boldon James |
Bomgar |
Booz Allen Hamilton |
Bracket Computing |
Bricata |
Bromium |
BT |
BUFFERZONE Security |
buguroo |
CA Technologies |
CA|Veracode |
Capgemini |
Carbon Black |
Cavirin |
Cavium |
CDW |
Centrify |
CenturyLink |
Check Point Software |
Checkmarx |
Cisco |
Citrix Systems, Inc. |
Claroty |
Classidocs |
Cleafy |
Clearswift |
Cloud Security Alliance |
Cloudera |
Coalfire |
Code 42 |
Code Dx |
Cofense |
Comodo |
Contrast Security |
Corelight |
Corero Network Security, Inc. |
Corvil |
CoSoSys |
CounterCraft |
CounterTack |
cPacket Networks |
Cradlepoint |
CrowdStrike |
Cryptsoft |
CSPi |
CTERA Networks |
CyberArk |
Cyberbit |
Cybereason |
CyberGRX |
CyberInt |
CyberMaryland |
CyberVista |
CyberX |
CYBONET |
CYBRIC |
Cylance Inc. |
Cymmetria |
Cymulate |
Cynerio |
Cyren |
Cyxtera |
D3 Security |
Daon |
DarkMatter |
DarkOwl |
Darktrace |
Darktrace Industrial |
Dashlane |
DataLocker Inc. |
DataPassports |
DataSunrise Database Security |
DB Networks |
DBAPPSecurity |
Dedrone |
Deep Instinct |
Deep Secure |
Deepfence Inc. |
DeferPanic, Inc. |
Demisto |
Denim Group |
DFLabs |
D-ID |
DigiCert |
Digital Defense, Inc. |
Digital Guardian |
Digital Shadows |
Distil Networks |
DomainTools |
Dome9 Security |
DriveLock SE |
Dtex Systems |
Duo Security |
Eastwind Networks |
Edgewave |
Edgewise Networks |
Egis Technology Inc. |
Ekran System |
Elastic |
eLearnSecurity |
empow |
Endgame |
Engage Black |
Entrust Datacard |
Enveil |
Equinix |
Ericom Software |
ERPScan |
eSentire, Inc. |
ESET |
eWBM, Co. Ltd |
Exabeam |
Executive Women’s Forum |
ExtraHop Networks |
F5 Networks |
Farsight Security |
Fasoo |
Fastly, Inc. |
Federal Bureau of Investigation |
FEITIAN |
FFRI |
Fidelis Cybersecurity |
FIDO Alliance, Inc. |
FinalCode |
Finn Partners |
FireEye |
FireMon |
Flexera |
Flowmon Networks |
Fluency |
Forcepoint |
Forceshield |
ForeScout |
ForgeRock |
Fortanix |
Fortinet, Inc. |
Futurex |
Gemalto |
GENIANS |
Gigamon |
Global Knowledge |
Global Learning Systems |
GlobalSign |
GoSecure Inc. |
Great Bay |
GreatHorn |
GreeNet |
Ground Labs |
GTB Technologies |
GuardiCore |
GuardSquare NV |
Guidance Software |
Gurucul |
Hacker House |
HDIV Security |
Heimdal Security |
Herjavec Group |
HID Global |
Hillstone Networks |
Hitachi ID Systems |
HOB |
HOPZERO |
Hornetsecurity |
HyTrust |
IBASE Technology |
iboss |
ID DataWeb |
IDenticard |
Illumio |
Illusive Networks |
Imperva |
Infineon Technologies |
InfoArmor, Inc. |
Infoblox |
Inky |
Inspired eLearning |
Interface Masters Technologies |
Interset |
IntSights |
iovation |
IRONSCALES |
ISACA |
iTrust |
Ivanti |
Ixia Solutions Group, A Keysight Business |
Janus Technologies, Inc. |
JASK |
Javelin Networks |
Jazz Networks |
Jiransoft |
Jumio |
Juniper Networks |
Kaspersky Lab North America |
Kaymera Technologies |
Kenna Security |
Kereon |
Kip James |
KnowBe4 |
Lacework |
Lastline |
LastPass |
LayeredInsight |
Lieberman Software |
LockPath |
LogMeOnce |
LogRhythm |
LookingGlass |
Lynx Software Technologies, Inc. |
Madison Alexander PR, Inc |
Malwarebytes |
ManagedMethods |
Masergy Communications |
McAfee |
Mellanox |
Menlo Security |
Messageware |
MetricStream |
Mimecast |
Minerva Labs |
Mi-Token |
MobileIron |
Mocana |
M-Secure |
Napatech |
NC4 |
Nehemiah Security |
Netcope Technologies, a.s. |
Netmonastery Network Security |
NetQuest Corporation |
NetSHIELD Corp. |
Netskope |
Netsparker |
Netsurion |
New Net Technologies |
Netwrix |
Neustar |
News & Experts |
NOMINET |
NopSec |
NowSecure |
Nozomi Networks |
NRI SecureTechnologies |
NSFOCUS |
Ntrepid Corporation |
NuData Security |
Nuix |
Nyotron |
OASIS |
OATH |
ObserveIT |
Okta |
Onapsis |
One Identity |
OneLogin |
OneTrust |
OPAQ Networks |
OPSWAT |
Optiv |
Outpost24 |
Owl Cyber Defense |
PacketViper, LLC |
Panda Security |
PC Pitstop Inc. |
PFP Cybersecurity |
Phantom |
PhishLabs |
PhishLine |
Picus Security |
Pindrop |
Ping Identity |
Plixer |
Polarity |
Portnox |
Pradeo |
Preempt |
Prevoty |
Privakey, Inc. |
Process Unity |
Proficio |
Promon |
Proofpoint |
ProtectWise |
Protiviti |
Pulse Secure |
Qadium |
Qualys |
RackTop Systems |
Radiant Logic |
Radware |
Randtronics |
Rapid7 |
Red Canary |
RedSeal |
Reservoir Labs |
Rhombus Systems |
Risk Vision |
RiskIQ |
RiskRecon |
RiskSense |
SafeBreach |
SafeLogic |
SaferZone, Inc. |
Safe-T |
SageNet |
SailPoint |
Seceon |
Seclore |
Secudit |
SECUDRIVE |
Secure Channels |
SecureAuth |
SecureWorks |
Security Compass |
Security Mentor |
SecurityFirst |
SecurityScorecard |
Securonix |
Semperis |
SentinelOne Inc |
Sepio Systems |
ShiftLeft |
Siemplify |
Silent Circle |
Silobreaker |
Sixgill |
Skybox Security |
SonicWall |
SOPHOS |
Spirion |
Splunk |
SpyCloud |
SSH Communications Security |
StackRox |
STEALTHbits Technologies |
StrongAuth, Inc. |
SuAnSecurity |
Sumo Logic |
Swimlane |
Swivel Secure |
Symantec |
SyncDog, Inc. |
SynerComm |
Syniverse |
Synopsys |
Syscloud |
Tala Security, Inc. |
TechGuard Security |
Tenable, Inc. |
Teramind, Inc. |
Tessian |
Thales e-Security, Inc. |
The Chertoff Group |
The Media Trust |
ThinAir |
Thinkst Canary |
Threat Stack |
ThreatBook |
Threatcare |
ThreatConnect |
ThreatMetrix |
ThreatModeler Software |
ThreatQuotient |
Thycotic |
Titan IC Systems |
Titania |
TrapX |
Trend Micro |
TriagingX |
Tripwire |
TrustArc |
Trusted Knight |
Trustonic |
Trustwave |
Tufin |
Twistlock |
Unbotify, Ltd. |
Unbound |
UnifyID |
Unisys |
Untangle, Inc. |
Uplevel Security |
Upstream |
Utimaco |
Vade Secure |
Valimail |
Vaporstream |
Varonis Systems |
VASCO Data Security |
Vectra |
Venafi |
Veridium |
Veriflow |
Verodin |
Versive |
Virtual Forge Inc. |
VMRay |
VMware |
Votiro |
WALLIX |
Waratek |
WatchGuard Technologies |
WEBROOT |
Whistic Inc. |
WhiteHat Security |
WhiteSource |
WinMagic |
WolfSSL, Inc. |
Wombat Security Technologies |
XM Cyber |
XTN Cognitive Security |
Yubico |
Zentera Systems |
ZeroFOX |
Ziften |
Zimperium |
Zix |
Zscaler |
Sincerely,
Team CDM
Please feel free to leverage this good news on social media. Here’s a sample of what we recommend:
@COMPANY is thrilled to be a finalist in @CyberDefenseMag prestigious annual #INFOSEC #AWARDS 2018 with winners to be announced @RSAC 2018
P.S. Finalists, please feel free to click this link and download a zip file containing the InfoSec Awards 2018 Finalist logo to use on your site and in your marketing.
If you feel you deserve an award and didn’t make this list, please visit this link, before March 31, 2018. Please also stay tuned as we launch http://www.cyberdefense.tv during RSA Conference 2018 where we plan to stream live videos and produce “C” level HotSeat executive interviews with a select group of winners. Concerns, ideas, needs? For more information on “HotSeat” 5 min interviews (20 min total time needed) during RSA Conference 2018, reach out to us via email anytime at [email protected].
.