In the last few years, businesses expanded their use of cloud computing from select applications to entire IT infrastructures. With that transition comes new security requirements to ensure the protection, availability and integrity of data, and compliance with privacy regulations.
Technologies recognized in this category support both the policy and protection requirements that emerge with a cloud environment, helping to prevent a compromise of data or applications, or malicious access.
FINALIST | BEST CLOUD COMPUTING SECURITY SOLUTION
CROWDSTRIKE FALCON PLATFORM
Company: Crowdstrike
Noteworthy: Built on two unique components — a single lightweight agent and a distributed cloud — the Falcon platform ingests and analyzes 4 trillion endpoint-related events per week in real-time from across the globe.
FINALIST | BEST CLOUD COMPUTING SECURITY SOLUTION
F5 SHAPE ENTERPRISE DEFENSE (SED)
Company: F5
Noteworthy: Through a patented two-stage AI system that detects and mitigates attacks against customers, SED detects and blocks up to 2 billion fraudulent or unwanted transactions daily while keeping 200 million legitimate human users safe.
FINALIST | BEST CLOUD COMPUTING SECURITY SOLUTION
NETSKOPE SECURITY CLOUD PLATFORM
Company: Netskope
Noteworthy: Uniquely provides data context for data and threat protection for thousands of apps and cloud services using universal and custom app connectors to decode JSON API communications.
FINALIST | BEST CLOUD COMPUTING SECURITY SOLUTION
SINGULARITY CLOUD (CONTAINER AND CLOUD NATIVE XDR SOLUTION)
Company: SentinelOne
Noteworthy: In addition to being the only cloud security solution that offers secure remote shell into a container, SentinelOne has zero reliance on humans, services or even cloud connectivity to deploy and operate.
FINALIST | BEST CLOUD COMPUTING SECURITY SOLUTION
ZSCALER ZERO TRUST EXCHANGE (ZTE)
Company: Zscaler
Noteworthy: Processing more than 150 billion transactions and preventing more than 7 billion security incidents and policy violations per day, ZTE creates fast, secure connections between users and applications, regardless of device, location, or network, to enable large scale digital transformation.