Categories and Criteria


Entrants will be asked to submit a 200 word summary and a 800 word entry that fulfils the stated objectives for each category.

Submissions will be accepted via the online entry system only.

All information submitted will be for the use of judging and will remain confidential.

Please read on for further information on each category and application criteria. The deadline for entering is: Friday 17 September, 5pm.

CATEGORIES 2021

Security Excellence Awards 

While large firms struggle with complex environments, SMEs face their own challenges. They are often forced to make do with ageing infrastructure and legacy systems, and may be unable or unwilling to protect against new threats. This prize will go to the company who can best aid SMEs in their constant battle to avoid becoming the ‘low-hanging fruit’ of cybersecurity. This category defines a large organisation as a firm employing fewer than 250 employees.

Judging Criteria:

  • Proven Results
  • Convincing Proposition
  • Customer Case Studies
This item is not available

Bringing together development and operations is becoming common in business; but security can be forgotten in the fast pace. This award will go to the team or business that most competently integrates security into their DevOps methodology.

Judging Criteria:

  • Proof of use
  • Integration with existing methods
This item is not available

Important information:

Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements:

Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

It’s no longer enough to build a wall around your network; at some point, you must accept that attackers will get in. While backup, recovery and DLP systems will vary in their approach, they all aim to block or mitigate data loss and the damaging effects of ransomware. We are looking for more than a description of a product’s capabilities here: you must include evidence of the product’s use in the real world, with customer stories.

This item is not available

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

More and more data processing happens at the edge of the network, especially in the age of remote work. Not only does this raise processing speeds and lower costs, it also increases security by avoiding unnecessary data transfer – at least, potentially.

Edge computing devices traditionally lack the protections of centralised systems, and compromised devices can serve a multitude of nefarious purposes. We are looking for the product or vendor that can best protect the valuable data at the edge of modern computing networks, while retaining the speed and reliability required. You must include examples of customer stories to demonstrate success.

This item is not available

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

Email is now a common attack vector for cyber criminals, with techniques such as phishing and the more targeted spear-phishing regularly seen by firms of all sizes.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption
This item is not available

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

All businesses are under almost constant cyber attack, from low-level scattergun attacks to more targeted, sophisticated strategies. Enterprise Threat Detection tools help organisations identify attacks as they occur, and analyse the threats quickly enough to respond and mitigate them.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption
This item is not available

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

Identity and access management is of critical importance to networks forever under attack in a world increasingly dependent on digital profiles to protect data. Regulatory compliance is also an extremely important factor in a good IAM solution.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption
This item is not available

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

Some organisations prefer to outsource some of their security responsibilities to the experts. Usually this involves round-the-clock monitoring of threats, and managing various security technologies.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption
This item is not available

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter

Cyber criminals are using ever more sophisticated methods to attack corporate networks. In the game of cat and mouse between security firms and hackers, only the most cutting edge of security products can offer the protection demanded by today's firms.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption
This item is not available

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

Remote working is the hot topic of 2020, but it brings new challenges compared to having everyone on-site – like staff using public WiFi, or saving sensitive information on personal devices. Even companies that regularly had people working from home have had to scale their efforts this year. The company winning this award will be able to demonstrate how they have risen to and overcome the challenges of a rise in remote working through education, policies and technology, with a minimal impact on performance.

This item is not available

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

Risk management solutions help organisations to recognise, quantify, and ultimately manage and mitigate their security risks.

Judging Criteria:

Functionality

Competitive Differentiation

Adoption 

This item is not available

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

Awarded to the most compelling security solution using artificial intelligence, machine learning or automation for success. This can be aimed at consumers or businesses. Judges will be looking for innovation and proof of effectiveness - customer case studies are vital.

This item is not available

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

Businesses are increasingly turning to the cloud for its flexibility and scalability. But security fears are often cited as the main barrier to cloud adoption. Judging Criteria: Functionality Competitive Differentiation Adoption

This item is not available

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

A self-explanatory award, here we're looking for the best enterprise-grade security solution on the market. It will be sitting on the bleeding edge of security requirement and covering every base required of today's security needs in its area.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption
This item is not available

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

Small-to-medium enterprises have a different set of considerations than larger enterprises, and SMEs are also becoming absolutely prime targets to malicious agents. The cost of large and expensive security offerings can often make SMEs feel priced out of the market, so in this category we're looking at affordable services that still offer the range and scope of security coverage any larger organisation typically enjoys.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption
This item is not available

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

The demand for cybersecurity professionals continues to exceed supply, despite the rising level of threats. This award will go to the company – not necessarily a specialist training provider – that is working to bring new people into the world of security through a dedicated training programme. These could be new graduates, or existing staff who want to retrain themselves. We will look for a description of the programme and who it is aimed at, as well as evidence of success.

This item is not available

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

As either the full-time IT security team at an organisation or a special project team or task force set up for a specific project, your team will be blazing a trail of success as an example to others in the industry. A well-oiled unit with provable results, you'll show everybody else how it's done.

There is no judging criteria, please submit an 800 word free text entry. 

This item is not available

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

IT talent is widespread among younger people, and we want to discover the UK's most trendsetting young security professional. You'll be involved in key projects in your company, and work closely with the CISO and CSO on agenda-driving projects. You'll have expert and defined views on key security industry trends, and be pushing your own projects forward. You must include evidence of how your work has changed security for the better at your organisation.

This award is open to anyone in the security industry who is under 30 years old.

There is no judging criteria, please submit an 800 word free text entry.

This item is not available

There is no judging criteria, please submit an 800 word free text entry.

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

This award is dedicated to recognising the talent, leadership and contribution of women in the IT industry. Whether working at the top level of security in an organisation, or as a key member of a team endeavour, we want to highlight exceptional women in the UK IT industry across the board.

There is no judging criteria, please submit an 800 word free text entry.

This item is not available

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

Every organisation has a head of security, and we'd like to find the UK's most effective security professional. You'll be knowledgable, respected and responsible for introducing business-changing security concepts and policies. You'll be an excellence ambassador for IT security throughout your organisation, and be a well-known wider industry figure along with it.

There is no judging criteria, please submit an 800 word free text entry.

This item is not available

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

Large firms have very specific and specialised security environments, with a massive attack surface and the budget to defend it. However, their digital landscape can be complex and difficult to navigate. Judges will look for security vendors who are uniquely suited to protecting the world’s largest companies. This is not a product award – we want to know what makes your company an enterprise specialist, and you’ll need to tell us why and how. This category defines a large organisation as a firm employing 250 or more employees.

Judging Criteria:

  • Proven Results
  • Convincing Proposition
  • Customer Case Studies
This item is not available

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

This one-time award will be presented to the team or company that has risen to the security challenge of COVID-19. Our judges want to hear what issues you faced, exactly how you overcame them and what the outcome of your work will be on the future of the company. Has the culture changed for good? What lessons have your learned that will affect how you work going forward?

This item is not available

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

The security industry and its products are continually evolving, as it keeps pace with the new tricks and tactics developed by hackers to attack corporate networks. This award will be given to the product or service which demonstrates something truly new and original. Customer stories are a must; entries that do not include an example of real-world use, preferably in the UK, will be disqualified.

This item is not available

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

Security demands change quickly, and new innovations are always needed to counter emerging threats: it could be anything, from a new piece of software to a different approach to staff training. The award isn’t limited to a specific type of project, as long as it uses IT to benefit your organisation or clients. You must explain why you undertook the project, what it entailed and the end result; the winner will be determined based mainly on the project outcomes, not only the technology.

This item is not available

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

Cyber security is essential to modern businesses, but staying ahead of attackers is a constant struggle. Using AI or automating security to watch for attacks and respond in real time can remove a significant burden from overworked staff. The judges are looking for real-world examples of the technology in action; customer case studies will be given more weight than a sales pitch of the product.

This item is not available

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.