Computer Weekly European User Awards: Security
The Computer Weekly European User Awards for Security aim to recognise innovation in information security and IT risk management.
For instance, entries could demonstrate innovation in areas such as reduction in cyber crime and overall losses, corporate security, physical security, risk management, data security, or a clear description of how IT has been utilised to improve business or service security.
Applicants could also enter if their business has shown security innovation surrounding IT applications, such as new software or intranet protection strategies. Entries are also encouraged to give examples of any security sector standards or security codes of practice that have been implemented to create a safer/more effective working environment.
Other examples of entries include data protection strategies, business continuity, cloud security, Endpoint and NAC protection.
Judges will be using the following criteria to assess entries:
- Innovation in technology or business processes
- Improving IT management capabilities
- Improving business efficiency or reducing costs
- Demonstrating best practice
- Delivering measurable business benefits
Any questions about the Computer Weekly European User Awards for Security please contact us at CWUserAwards@techtarget.com.
THE SECURITY AWARDS HAVE NOW CLOSED
Winners of the Computer Weekly European User Awards for Security will be announced shortly with winning case studies on Computer Weekly.
Public Sector Winner:
Solihull Met Borough Council (Entered by Good Technology)
Following an increase in staff requests Solihull Council in the Midlands decided to roll out a secure bring your own device (BYOD) policy. Managers wanted to achieve two things: Cost reductions from returned laptops and blackberries; and increased personal efficiencies through saved hours and a more productive workforce.
With the help of Good Technology’s solution, Good For Enterprise, Solihull Council developed the Your Own Device at Home Policy (YODAH). Good for Enterprise gave employees secure access to email, calendar, contacts and browsing on all of the required devices.
Best Technology Winner and also Best of Show Winner: Bromium
Bromium is a relatively new startup, founded by the creators of the open source Xen hypervisor which powers the Amazon cloud. The company applied its virtualisation expertise to create vSentry endpoint security software, which isolates and secures every single untrusted network task within its own tiny virtual machine (microVM).
Bromium’s vSentry acknowledges the inescapable realities of vulnerable software and targeted persistent attacks that trick users into executing malware that is impossible to detect using traditional tools.
Supplier of the Year Winner: Symantec (Case study mentioned: The Royal Liverpool and Broadgreen University Hospitals NHS Trust)
The Royal Liverpool and Broadgreen University Hospitals NHS Trust is one of the largest and busiest hospital trusts in the North of England with an annual budget of more than $640 million.
The Trust has worked with Symantec as its supplier for a number of years to meet its ever-evolving security needs. In the past year, the Trust and Symantec closely collaborated on the implementation of two new projects: Symantec 25, focused on reducing IT security costs by 25%; and the adoption of its mobile data management (MDM) strategy.
Private Sector Winner: IASME
IASME's (Information Assurance for SMEs) information security initiative helps small and medium-sized enterprises (SMEs) and the supply chain combat criminal activity online and improves online trust between partners.
The IASME website also offers non-technical advice to help businesses develop online security and safety. IASME is developing links with small business associations (including UKITA) to provide a regular feed of advice and comment on security matters.
Cloud Innovation Winner: Scrambls
The Scrambls service protects data in motion and shared in the cloud by establishing persistent controls over each individual post and file published. The user sets access rules for content ranging from simple restrictions to elaborate criteria. These rules can even be updated over time, modifying access based on changing business needs and evolving regulatory requirements.
Instead of relying solely on the site hosting their data to protect and control access to content, businesses can use Scrambls to establish and maintain rules determining how the data can be accessed, according to their own corporate guidelines.
Andrew Rose, Principal Analyst, Security & Risk, Forrester Research
Andrew Rose's is Principal Analyst at Forrester Research where his research contributes to the company's offerings for the Security & Risk Professional. He is a proven security leader, capable of transforming security teams into highly effective groups and driving efficiencies to deliver results with limited resource. Andrew is a leading expert in information security and risk management, ISO27001 frameworks, supplier review, and business engagement; information security policy development; information security strategy; and governance, risk, and compliance (GRC) initiatives.
Bob Tarzey, Service Director, Quocirca
Joining Quocirca in 2002 Tarzey’s main area of coverage is route to market for ITC vendors, but he also has an additional focus on IT security, network computing, systems management and managed services. Bob has extensive knowledge of the IT industry. Prior to joining Quocirca in he spent 16 years working for US technology vendors including DEC (now HP), Sybase, Gupta, Merant (now Serena), eGain and webMethods (now Software AG).
Spencer Izard, IDC Research Manager
Over the past 15 years Spencer has worked at several large international organisations. He worked at Marks & Spencer, where he introduced enterprise architecture, IT harmonisation, and cloud strategies. Prior to that, he worked at Microsoft providing strategic end-user consultancy on enterprise architecture, IT operations, mobility, and cloud computing. Before Microsoft, he spent over six years at BP as a global architecture manager among other roles.