Categories & Criteria


Computing's Security Excellence Awards, celebrate the achievements of the IT industry's best security companies, solutions, products and personalities.


From the greatest firewall product to the most impressive IT leader in the industry, we're covering every major touchpoint of success in the security landscape. You don't want to miss this event.


Submission requirements

Entrants will be asked to submit a summary of their entry and a maximum 800-word explanation, demonstrating how they meet the criteria. For product or service award entries, you are strongly encouraged to use the entry text to provide a customer case study. Submissions will be accepted via the online entry system only.

All information submitted will be for the use of judging and will remain confidential.

Please read on for further information on each category and application criteria. It is FREE to enter.



Big Data Security Product of the Year

With GDPR coming into force in May 2018, firms are more concerned about data security than ever. This award will go to the big data security product which most impresses the judges in terms of its features, efficiency and ease of both use and installation. Customer references will help, as will evidence of innovation in the product's development, operation or both.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption



Cloud Security Award

Businesses are increasingly turning to the cloud for its flexibility and scalability. But security fears are often cited as the main barrier to cloud adoption.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption


DLP Award

The best way to secure a system is to stop attacks before they start, and monitoring, detecting and blocking breaches is key to data loss prevention. DLP systems can vary in their focus and approach, but what's important is comprehensive and proven effects in protection and prevention.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption



Email Security Award

Email is now a common attack vector for cyber criminals, with techniques such as phishing and the more targeted spear-phishing regularly seen by firms of all sizes.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption 



Enterprise Security Award

A self-explanatory award, here we're looking for the best enterprise-grade security solution on the market. It will be sitting on the bleeding edge of security requirement and covering every base required of today's security needs in its area.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption 



Enterprise Threat Detection Award

All businesses are under almost constant cyber attack, from low-level scattergun attacks to more targeted, sophisticated strategies. Enterprise Threat Detection tools help organisations identify attacks as they occur, and analyse the threats quickly enough to respond and mitigate them.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption 



IAM Award

Identity and access management is of critical importance to networks forever under attack in a world increasingly dependent on digital profiles to protect data. Regulatory compliance is also an extremely important factor in a good IAM solution.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption 



IoT Security Solution Award

Whilst the Internet of Things can offer many advantages to firms looking to manage a supply chain and other form of network, the concept has been proven time and time again to be hugely vulnerable to hackers. Advanced security solutions are needed to protect the valuable and sensitive data generated by and carried across IoT networks.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption



Mobile Security Award


With mobile apps increasing in power, and the volume and complexity of data they handle growing, cyber criminals are increasingly targeted mobile devices for the valuable corporate data they contain. There has never been a greater need for sophisticated mobile security.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption 



Network Security Award

Cyber criminals are using ever more sophisticated methods to attack corporate networks. In the game of cat and mouse between security firms and hackers, only the most cutting edge of security products can offer the protection demanded by today's firms.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption



Security Innovation of the Year

The security industry and its products are continually evolving, as it keeps pace with the new tricks and tactics developed by hackers to attack corporate networks. This award will be given to the product or service which demonstrates something truly new and original.

Judging Criteria:

  • Originality
  • Functionality 



SME Security Solution Award

Small-to-medium enterprises have a different set of considerations than larger enterprises, and SMEs are also becoming absolutely prime targets to malicious agents. The cost of large and expensive security offerings can often make SMEs feel priced out of the market, so in this category we're looking at affordable services that still offer the range and scope of security coverage any larger organisation typically enjoys.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption



Security Team of the Year

As either the full-time IT security team at an organisation or a special project team or task force set up for a specific project, your team will be blazing a trail of success as an example to others in the industry. A well-oiled unit with provable results, you'll show everybody else how it's done.

There is no judging criteria, please submit an 800 word free text entry. 



Best Place to Work in Security

Some organisations place a greater emphasis - and budget - on IT security than their peers. We want to identify the model organisation to set the example to the wider industry. Employees of all levels should be well-briefed and confident in security, with minimal breaches. With a knowledgable and charismatic security leadership, evidence that culture and policy has fed down to the entire company - with measurable results - is key to competing in this award.

There is no judging criteria, please submit an 800 word free text entry.



Managed Security Award

Some organisations prefer to outsource some of their security responsibilities to the experts. Usually this involves round-the-clock monitoring of threats, and managing various security technologies.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption



Security Training Provider of the Year

Security is often at least as much about the skills of your staff as it is about the technology you employ. This award will go to the training provider which best demonstrates the ability to equip its customers for today's dynamic threat-scape. Customer quotes and stories will help, as will demonstrations of the breadth of your training, and its impact. Any evidence around innovation in the creation and delivery of your training materials will also help.

Judging Criteria:

  • Functionality
  • Competitive Differentiation
  • Adoption



CISO/CSO of the Year

Every organisation has a head of security, and we'd like to find the UK's most effective security professional. You'll be knowledgable, respected and responsible for introducing business-changing security concepts and policies. You'll be an excellence ambassador for IT security throughout your organisation, and be a well-known wider industry figure along with it.

There is no judging criteria, please submit an 800 word free text entry.




Security professional under 30

Security talent is rife in the younger generation, and we want to discover the UK's most trendsetting young security executive. You'll be involved in key projects in your company, and working closely with the CISO and CSO on agenda-driving projects. You'll have expert and defined views on key security industry trends, and be a well-known and respected figure in the community.

There is no judging criteria, please submit an 800 word free text entry.



Security Woman of the Year

This award is dedicated to recognising the talent, leadership and contribution of women in the IT industry. Whether working at the top level of security in an organisation, or as a key member of a team endeavour, we want to highlight exceptional women in the UK IT industry across the board.

There is no judging criteria, please submit an 800 word free text entry.



Security Vendor of the Year - Large Organisations

Large firms have very specific and specialised security environments, with a massive attack surface and the budget to defend it. However, their digital landscape can be complex and difficult to navigate. Judges will look for security vendors who are uniquely suited to protecting the world’s largest companies. This is not a product award – we want to know what makes your company an enterprise specialist, and you’ll need to tell us why and how. This category defines a large organisation as a firm employing 250 or more employees.

Judging Criteria:

  • Proven Results
  • Convincing Proposition
  • Customer Case Studies



Security Vendor of the Year - SME

While large firms struggle with complex environments, SMEs face their own challenges. They are often forced to make do with ageing infrastructure and legacy systems, and may be unable or unwilling to protect against new threats. This prize will go to the company who can best aid SMEs in their constant battle to avoid becoming the ‘low-hanging fruit’ of cybersecurity. This category defines a large organisation as a firm employing fewer than 250 employees.

Judging Criteria:

  • Proven Results
  • Convincing Proposition
  • Customer Case Studies



Security Automation Award

Awarded to the most compelling security solution using artificial intelligence, machine learning or other types of automation. This can be aimed at consumers or businesses. Judges will be looking for innovation and proof of effectiveness - customer case studies will be highly valued.

Judging Criteria:

  • Innovation
  • Ease of use
  • Manual labour reduction



DevSecOps Award

Bringing together development and operations is becoming common in business; but security can be forgotten in the fast pace. This award will go to the team or business that most competently integrates security into their DevOps methodology.

Judging Criteria:

  • Proof of use
  • Integration with existing methods



Machine Learning Project of the Year

Machine learning represents a new way to analyse the ever-increasing volumes of data being collected, and to better understand data utilisation and security. The winning project must have accomplished something radically different, which a manual approach would struggle or be unable to accomplish.

Judging Criteria:

  • Functionality
  • Innovation
  • Outcomes



Most Innovative AI/ML Security Solution

This award will go the AI/ML solution that most impresses the judges with its ability to bring something genuinely new to its users. It could be the result of a major breakthrough or advance in technology, or simply a new way of looking at an old problem. Details of the innovation itself, how it was created and how it differs from its rivals should be included, along with customer references if possible.

Judging Criteria:

  • Competitive differentiation
  • Functionality Adoption



Hybrid Cloud Security Solution of the Year

The hybrid cloud is no longer a simple stepping stone to digital; it is a valid business strategy that companies may purposefully choose to follow. We are looking for the solution that is best able to deal with the challenge of using multiple environments while handling app & data sprawl, regulatory compliance and each portal's own unique processes. Customer stories are essential.

Judging Criteria:

  • Competitive differentiation
  • Functionality
  • Adoption



Hybrid Cloud Security Project of the Year

Whether just starting on their cloud journey or having chosen the approach on purpose, use of the hybrid cloud is rising across the world of business - but protection of such diverse environments isn't easy. The winning project will present a customer's real-world challenge stemming from the hybrid cloud, with details on how it was solved and any quantitative benefits (such as money saved) stemming from the project.

Judging Criteria:

  • Functionality
  • Innovation
  • Outcomes



DPO of the Year


The EU's General Data Protection Regulation requires many firms to employ a Data Protection Officer (DPO). The winner, who may have other roles, must have a deep understand of many aspects of the law and how it applies to their business, including how information privacy is protected, and the availability of intelligence on the data being collected and processed. Above all, they must ensure compliance with the GDPR, no matter the barriers in their way.

There is no judging criteria, please submit an 800 word free text entry.



Security Educator of the Year

Keeping employees engaged and involved in security practices is a challenging task. Rather than forcing them to sit through PowerPoint presentations, the winning educator will have pioneered new ways to turn business staff into security stakeholders.

There is no judging criteria, please submit an 800 word free text entry.