CATEGORIES & CRITERIA


Entrants will be asked to submit a 200-word summary, an 800-word entry that fulfills the stated objectives for each category and a 300-word UK-based case study. 

All categories are FREE TO ENTER

Submissions will be accepted via the online entry system only.

All information submitted will be for the use of judging and will be confidential for you.

Please read on for further information on each category and application criteria. The deadline for entering is Friday 2 February, 5 pm.

For any queries, please get in touch with Caitlin-Rose Bailey via crbailey@thechannelcompany.com

DevSecOps Award

Bringing together development and operations is becoming common in business; but security can be forgotten in the fast pace. This award will go to the team or business that most competently integrates security into their DevOps methodology.

Judging Criteria:

  • Proof of use
  • Integration with existing methods
This category is now closed

Important information:

Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements:

Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

Security Training Programme of the Year

The demand for cybersecurity professionals continues to exceed supply, despite the rising level of threats. This award will go to the company – not necessarily a specialist training provider – that is working to bring new people into the world of security through a dedicated training programme. These could be new graduates, or existing staff who want to retrain themselves. We will look for a description of the programme and who it is aimed at, as well as evidence of success.

This category is now closed

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

Security Innovation of the Year

The security industry and its products are continually evolving, as it keeps pace with the new tricks and tactics developed by hackers to attack corporate networks. This award will be given to the product or service which demonstrates something truly new and original. Customer stories are a must; entries that do not include an example of real-world use, preferably in the UK, will be disqualified.

This category is now closed

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

Backup, Recovery and DLP Award

It’s no longer enough to build a wall around your network; at some point, you must accept that attackers will get in. While backup, recovery and DLP systems will vary in their approach, they all aim to block or mitigate data loss and the damaging effects of ransomware. We are looking for more than a description of a product’s capabilities here: you must include evidence of the product’s use in the real world, with customer stories.

This category is now closed

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

SME Security Solution Award

Small-to-medium enterprises have a different set of considerations than larger enterprises, and SMEs are also becoming absolutely prime targets to malicious agents. The cost of large and expensive security offerings can often make SMEs feel priced out of the market, so in this category we're looking at affordable services that still offer the range and scope of security coverage any larger organisation typically enjoys.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption
This category is now closed

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

Security Vendor of the Year

While large firms struggle with complex environments, SMEs face their own challenges. They are often forced to make do with ageing infrastructure and legacy systems, and may be unable or unwilling to protect against new threats. This prize will go to the company who can best aid SMEs in their constant battle to avoid becoming the ‘low-hanging fruit’ of cybersecurity. This category defines a large organisation as a firm employing fewer than 250 employees.

Judging Criteria:

  • Proven Results
  • Convincing Proposition
  • Customer Case Studies
This category is now closed

Email Security Award

Email is now a common attack vector for cyber criminals, with techniques such as phishing and the more targeted spear-phishing regularly seen by firms of all sizes.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption
This category is now closed

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

Managed Security Award

Some organisations prefer to outsource some of their security responsibilities to the experts. Usually this involves round-the-clock monitoring of threats, and managing various security technologies.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption
This category is now closed

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter

Enterprise Threat Detection Award

All businesses are under almost constant cyber attack, from low-level scattergun attacks to more targeted, sophisticated strategies. Enterprise Threat Detection tools help organisations identify attacks as they occur, and analyse the threats quickly enough to respond and mitigate them.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption
This category is now closed

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

Security Project of the Year

Security demands change quickly, and new innovations are always needed to counter emerging threats: it could be anything, from a new piece of software to a different approach to staff training. The award isn’t limited to a specific type of project, as long as it uses IT to benefit your organisation or clients. You must explain why you undertook the project, what it entailed and the end result; the winner will be determined based mainly on the project outcomes, not only the technology.

This category is now closed

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

AI/Automation Security Product Award

Awarded to the most compelling security solution using artificial intelligence, machine learning or automation for success. This can be aimed at consumers or businesses. Judges will be looking for innovation and proof of effectiveness - customer case studies are vital.

This category is now closed

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

Best Use of AI/Automation in Security

Cyber security is essential to modern businesses, but staying ahead of attackers is a constant struggle. Using AI or automating security to watch for attacks and respond in real time can remove a significant burden from overworked staff. The judges are looking for real-world examples of the technology in action; customer case studies will be given more weight than a sales pitch of the product.

This category is now closed

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

Network Security Award

Cyber criminals are using ever more sophisticated methods to attack corporate networks. In the game of cat and mouse between security firms and hackers, only the most cutting edge of security products can offer the protection demanded by today's firms.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption
This category is now closed

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

Enterprise Security Solution Award

A self-explanatory award, here we're looking for the best enterprise-grade security solution on the market. It will be sitting on the bleeding edge of security requirement and covering every base required of today's security needs in its area.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption
This category is now closed

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

* NEW* Best Use of Zero Trust

Employees and third - parties with unrestricted access to company systems open a hole in security. While perimeter - focused solutions assume all threats are on the out side, the zero - trust model restricts permissions to only those required to perform a role. We are seeking the best implementation of zero - trust: one that has been fast, seamless and stress - free, while also cutting security incidents. Measurable impact and UK case studies will be prioritised when judging this category.

This category is now closed

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

IAM Award

Identity and access management is of critical importance to networks forever under attack in a world increasingly dependent on digital profiles to protect data. Regulatory compliance is also an extremely important factor in a good IAM solution.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption
This category is now closed

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

Cloud Security Award

Businesses are increasingly turning to the cloud for its flexibility and scalability. But security fears are often cited as the main barrier to cloud adoption. Judging Criteria: Functionality Competitive Differentiation Adoption

This category is now closed

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

Security Rising Star

IT talent is widespread among younger people, and we want to discover the UK's most trendsetting young security professional. You'll be involved in key projects in your company, and work closely with the CISO and CSO on agenda-driving projects. You'll have expert and defined views on key security industry trends, and be pushing your own projects forward. You must include evidence of how your work has changed security for the better at your organisation.

This award is open to anyone in the security industry who is under 30 years old.

There is no judging criteria, please submit an 800 word free text entry.

This category is now closed

There is no judging criteria, please submit an 800 word free text entry.

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

CISO/CSO of the Year

Every organisation has a head of security, and we'd like to find the UK's most effective security professional. You'll be knowledgable, respected and responsible for introducing business-changing security concepts and policies. You'll be an excellence ambassador for IT security throughout your organisation, and be a well-known wider industry figure along with it.

There is no judging criteria, please submit an 800 word free text entry.

This category is now closed

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

Security Team of the Year

As either the full-time IT security team at an organisation or a special project team or task force set up for a specific project, your team will be blazing a trail of success as an example to others in the industry. A well-oiled unit with provable results, you'll show everybody else how it's done.

There is no judging criteria, please submit an 800 word free text entry. 

This category is now closed

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.

Security Woman of the Year

This award is dedicated to recognising the talent, leadership and contribution of women in the IT industry. Whether working at the top level of security in an organisation, or as a key member of a team endeavour, we want to highlight exceptional women in the UK IT industry across the board.

There is no judging criteria, please submit an 800 word free text entry.

This category is now closed

Important information: Do not submit marketing copy, it will not be accepted as an entry Your entry must be specific to the category, do not enter the same submission across multiple categories All entrants must have presence in the UK Entrants are expected to attend the awards ceremony. You will receive your finalist logo after booking a table.

Submission requirements: Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only. All information submitted will be for the use of judging and will remain confidential. Please read on for further information on each category and application criteria. It is FREE to enter.