DAY TWO
Best Incident Response Solution

Best Incident Response Solution

Best Authentication Technology

Best Authentication Technology

Best behaviour analytics

Best Behaviour Analytics/Enterprise Threat Detection

Best Data Leakage

Best Data Leakage Prevention (DLP) Solution

Best SIEM Solution

Best SIEM Solution

Best Identity Management Solution

Best Identity Management Solution

Best IOT IIOT Solution

Best IOT/IIOT Security Solution

Best Managed Security Service

Best Managed Security Service

Best Threat Intelligence Technology

Best Threat Intelligence Technology

Best  Security Team

Best Security Team

Best Incident Response Solution

Best Mobile Security Solution

Privileged

Best Privileged Access Management

Best Incident Response Solution

Best Regulatory Compliance Tools and Solutions

Best Authentication Technology

Best Customer Service

Best Incident Response Solution

Best Cloud Computing Security Solution

Best Authentication Technology

Best use of Machine Learning/ AI

Best Incident Response Solution

Best Vulnerability Management Solution

Best Authentication Technology

Best Risk Management

Best Incident Response Solution

Best SME Security Solution

Editor choice

Editor's choice

Best Incident Response Solution

Best Endpoint Security

Best Authentication Technology

Best Email Security Solution

Best Incident Response Solution

Best Enterprise Security Solution

Best Authentication Technology

Best Emerging Technology

Best Incident Response Solution

Diversity Champion

Best Authentication Technology

Cybersecurity Student of the Year

Best Incident Response Solution

Best Professional Training or Certification Programme

Best Authentication Technology

Best Security Company

Best Incident Response Solution

Outstanding Contribution

Best Authentication Technology

CISO/CSO of the year

NEWS IN BRIEF