The winners of the 2020 SC Awards Honored in the U.S. | SC Media

The winners of the 2020 SC Awards Honored in the U.S.

February 27, 2020
Cisco Systems Duo Security
ForgeRock ForgeRock Identity Platform
Jumio Jumio Authentication
RSA RSA SecurID Access
SecureAuth SecureAuth Identity Platform
Arcserve Arcserve Unified Data Protection (UDP)
Deloitte & Touche & Dell Technologies Data Destruction Recovery Services and Cyber Recovery Solution
Onspring Onspring's Business Continuity & Disaster Recovery Solution
Quest Software QoreStor 6.0
Semperis Semperis AD Forest Recovery
Bitglass  Bitglass CASB
Centrify Centrify Zero Trust Privilege Services
CipherCloud CipherCloud CASB+ Platform
Illumio Illumio Adaptive Security Platform® (ASP)
Mimecast Cyber Resilience for Email
AccessData Forensic Toolkit (FTK)
AccessData AD Enterprise
Endace EndaceProbe Analytics Platform Product Family
OpenText EnCase® Forensic, EnCase Endpoint Investigator & EnCase Mobile Investigator
Vectra Cognito Recall
Cybereason Cybereason's Customer Success Team
KnowBe4 Customer Success and Support
SecurityScorecard SecurityScorecard
ThreatConnect ThreatConnect Customer Success
Zix-AppRiver Zix-AppRiver
Capitol Technology University
New York University
NYU Cyber Fellows (NYU Cybersecruity MS) - New York University Tandon School of Engineering
Red Rocks Community College
Master of Science in Cybersecurity Technology - University of Maryland Global Campus
CoSoSys Endpoint Protector
Digital Guardian  Digital Guardian Data Protection Platform
Fidelis Cybersecurity Fidelis Network
Proofpoint Proofpoint Information Protection
SecurEnvoy  SecurEnvoy
Baffle Baffle Advanced Data Protection Service
comforte AG SecurDPS
Imperva Imperva Data Security
MarkLogic MarkLogic 10, also offered as a data hub service
Penta Security Systems MyDiamo
Attivo Networks ThreatDefend Deception Platform
Fidelis Cybersecurity Fidelis Deception
Morphisec Unified Threat Prevention
PacketViper Deception360
TrapX Security DeceptionGrid
Agari Agari Secure Email Cloud
FireEye FireEye Email Security
GreatHorn GreatHorn Email Security
Mimecast Cyber Resilience for Email
Proofpoint Proofpoint Email Security
Blue Hexagon Blue Hexagon Malware Protection
CyCognito The CyCognito Platform
Cymulate Breach and Attack Simulation
DUST Identity DUST: Diamond Unclonable Security Tag
OneTrust Vendorpedia
Checkmarx Software Security Platform
CyberArk CyberArk Privileged Access Security Solution
Proofpoint Proofpoint P1 Advanced Email Security Solution
Pulse Secure Pulse Secure
SaltStack SaltStack SecOps
CyberArk CyberArk Privileged Access Security Solution
ForgeRock ForgeRock Identity Platform
Okta Okta Identity Cloud
Ping Identity Ping Intelligent Identity Platform
Thycotic Thycotic Secret Server
Mimecast nominated by LogMeIn
Security Innovation
AT&T Cybersecurity  AT&T Managed Threat Detection and Response
Digital Guardian  Digital Guardian Managed Security Program
Gurucul  Gurucul Labs
Neustar  SiteProtect NG
Trustwave Trustwave Managed Security Services
Apricorn AEgis Fortress L3
Data Theorem API Discover and API Inspect
Hotshot Technologies Hotshot
Lookout Lookout Mobile Endpoint Security
MobileIron MobileIron’s mobile-centric, zero trust platform
Aruba, a Hewlett Packard Enterprise Company Aruba ClearPass
Cisco Systems Cisco Identity Services Engine (ISE)
AppGate AppGate SDP
Forescout Technologies Forescout Platform
Portnox Portnox CLEAR
(ISC)2  Certified Information Systems Security Professional (CISSP)
Cloud Security Alliance  Certificate of Cloud Certificate Knowledge (CCSK)
ISACA Certified Information Security Manager (CISM)
ISACA  Certified in Risk and Information Systems Control (CRISC)
Offensive Security Offensive Security Certified Professional (OSCP)
Cloud Conformity Cloud Conformity
Immuta Immuta Automated Data Governance Platform
Mimecast Mimecast Cloud Archive
OneTrust Privacy Management Software
Tripwire Tripwire Enterprise
Brinqa Brinqa Cyber Risk Services
ProcessUnity ProcessUnity Vendor Risk Management
RiskRecon RiskRecon
SaltStack SaltStack SecOps
Skybox Security Skybox Security Suite
BlackRidge Technology BlackRidge TAC Identity Device (TAC-ID)
CyberX CyberX IoT/ICS Cybersecurity Platform
Dragos, Inc. Dragos Platform
Tenable Tenable Industrial Cybersecurity Suite
Radiflow iSID Industrial Threat Detection solution
VMware Carbon Black
Penn Medicine SecurityTeam
empow empow
LogRhythm LogRhythm NextGen SIEM Platform
Rapid7 InsightIDR
RSA RSA NetWitness Platform
Securonix Securonix Next-Gen SIEM
Alert Logic Alert Logic Professional
Arctic Wolf Networks  Arctic Wolf SOC-as-a-Service
Netsurion  EventTracker
Sophos  Intercept X Advanced
Untangle  NG Firewall
Armis  Armis Agentless Device Security Platform
Bitdefender  Bitdefender GravityZone Ultra
ExtraHop  Reveal(x)
Fidelis Cybersecurity  Fidelis Elevate
Fortinet  FortiSandbox and FortiDeceptor
CrowdstrikeFalcon X
VMware Carbon Black CB ThreatHunter
LookingGlass Cyber Solutions LookingGlass scoutPRIME®
Anomali  Anomali Altitude
IntSights External Threat Protection Suite
Ericom Software Ericom Shield
SonicWall NSa 2650
UserGate UserGate
WatchGuard Technologies Firebox M270
Checkmarx Software Security Platform
Qualys Global IT Asset Inventory
ShiftLeft ShiftLeft Ocular
Tripwire Tripwire IP360
Cequence Security Cequence Application Security Platform
WhiteHat Security  WhiteHat Application Security Platform
White Ops White Ops Bot Mitigation Platform
Contrast Security
Vikrant Arora, CISO Hospital for Special Surgery
Derrick A. Butts, Chief Information & Cybersecurity Officer Truth Initiative
Dan Costantino, CISO Penn Medicine
Janice Lim, DEO & CISO Los Angeles County Metropolitan Transportation Authority (Metro)
John Masserini, CISO Millicom
Awake Security
Cloud Conformity (Note - Acq'd by Trend Micro in Oct.)
CloudKnox Security

prestitial ad