The SC Awards 2019 are open for submissions. This is your chance to put your best work forward and to be honored for the achievements of your company or your people striving to safeguard businesses, your customers and critical data in North America.
There is also no greater excitement than receiving an SC Award. As always, the identities of the winners will be withheld until our spectacular event on March 5, 2019, in San Francisco.
Enter today and join us in honoring excellence in information security.
The SC Awards 2019 is open to all information security vendors, service providers and professionals. Vendors and service providers that offer a product and/or service for commercial, government, educational, nonprofit or other industries can enter the Trust and Excellence categories, which relate to products, services and/or information security companies. Entrants should be executing work in North America.
For category details please click here to download the entry kit.
2. Be sure that your product or service is a fit for the categories in which you are nominating, as SC media reserves the right to eliminate a product or service from consideration if our editorial team and/or jurors find that the offering is inappropriate for that category.
3. If you are entering multiple categories, you should offer unique answers for each. That is, avoid copying and pasting the same answers for each category you enter as this may yield a negative response from our judging panels.
4. Every entry must be accompanied by an image. The image should be a visual representation of the entry. If you are a finalist, SC Media will use this image both digitally and in print to support your entry. Logos alone are not acceptable images. The image should be at least 300dpi, jpeg/eps format and at least 16.5 x 23.4 inches in size.
5. All entries must be submitted and paid for online by either Visa, MasterCard or American Express.
6. Once you have prepared your entries submit online by clicking here.
Deadline for entries: October 3, 2018. Entries submitted after October 3, 2018 will incur a late fee. No exceptions.Late entries: Late entries will be received until October 10, 2018 however, all entries received after October 3 will incur a penalty of $180 per entry. No exceptions.
All entries are reviewed and scored by two panels of jurors comprised of a range of cybersecurity industry luminaries - from current and former CISOs to vendor-neutral consultants or analysts to educators from academic institutions - all members of SC's audience. After averages for each category are tallied, finalists and winners are decided. Results are completely independent.
Financial/advertising considerations play no part in the results. That is, no one can "buy" a win by advertising, partnering or working with SC and its various team members.
To be considered as a juror for the SC Awards 2019, please click here and complete the application form by September 19, 2018. After this date, applications will be reviewed and jurors chosen by the editorial team to participate on the Trust Awards panel. If some applicants seem more appropriate for the second judging panel, which is responsible for deciding Excellence and Professional categories, they will be considered for inclusion by the VP of editorial.
Please understand that judging for the SC Awards is a serious commitment, requiring all panelists to devote some time to judge submissions fairly and objectively so that IT security solutions/services providers, industry leaders and their teams can be recognized and honored for their exemplary work and contributions to the wider field. We do expect a healthy interest from our SC audience to participate, but submitting an application does not guarantee a spot as a juror.
Date: Tuesday, March 5, 2019Venue: InterContinental San Francisco
Time: 6:30 pm - 10:00 pm
Dress Code: Black tie preferred
Tickets: Information coming soon!
Our 2018 partners are listed below. If you are interested in sponsoring the 2019 awards please contact David Steifman. Email: firstname.lastname@example.org. Phone:646-638-6008.
AlienVault® has simplified the way organizations detect and respond to today’s ever evolving threat landscape. Our unique and award winning approach combines our all-in-one platform, AlienVault Unified Security Management®, with the power of AlienVault’s Open Threat Exchange®, making effective and affordable threat detection attainable for resource constrained IT teams.
Arctic Wolf answers the question, “Am I Safe?”, with our turnkey SOC-as-a-service. AWN’s Concierge Security Engineers improve threat detection by up to 10X, leveraging our hybrid AI, custom rules engine and security optimized data architecture. These innovations provide a superior threat detection and response platform for proactively hunting threats, performing remote forensics analysis of incidents, and delivering actionable remediation recommendations.
Barracuda Networks, Inc. offers industry-leading solutions designed to solve mainstream IT problems – efficiently and cost effectively – while maintaining a level of customer support and satisfaction second to none. Our products span three distinct markets, including: 1) content security, 2) networking and application delivery and 3) data storage, protection and disaster recovery.
While we maintain a strong heritage in email and web security appliances, our award-winning portfolio includes more than a dozen purpose-built solutions that support literally every aspect of the network – providing organizations of all sizes with true end-to-end protection that can be deployed in hardware, virtual, cloud and mixed form factors.
Digital Defense, Inc., an industry recognized security risk assessment solutions provider, helps organizations defend data and protect brands. The company’s Frontline. Cloud suite of vulnerability and web application security solutions are underpinned by innovative, patented technology and complemented with unparalleled service and support.
Thousands of organizations rely on Splunk Inc. (NASDAQ: SPLK) as their security nerve center to turn machine data into answers. Splunk’s suite of security solutions, including Splunk® Enterprise Security and Splunk® User Behavior Analytics, sits at the heart of the Security Operations Centers (SOC), to provide security analysts with insight into machine data generated from security technologies such as network, endpoint, access, malware, vulnerability and identity information. This analytics-driven approach to security helps analysts drive better, faster security decisions, enabling improved threat detection, improved time to resolution and reduced security costs. For more information on Splunk’s SIEM platform, visit the Splunk website.