Update: This post was updated on June 8, 2017, to reflect the results of the 2017 SC Magazine Europe Awards.

We were delighted to attend the SC Europe 2017 Awards dinner where we were short-listed for a record 9 awards!

We are pleased to announce that we brought home the trophy for ‘Best Managed Security Service’ provider, which is fantastic recognition for IBM’s service capability, supported by the depth and breath of technologies.

We were also very proud to receive two ‘Highly Commended Awards’:
1. Best Security Company
2. Best Mobile Security Solution

IBM has differentiated itself from other managed security services providers by making significant investments in people, facilities, tools and cutting-edge cognitive technologies. All of which provide our clients with a service built on industry-leading security intelligence and proven security methods, delivered by security experts located throughout our eight global X-Force Command Centers.

Find out more about IBM Security’s award-winning solutions

Original article published April 19, 2017.

This year, IBM Security has nine entries short-listed for 2017 SC Europe Awards. Over the past few years, we’ve seen the number of IBM entries short-listed at the SC Awards steadily grow, from two entries in 2015 and six entries in 2016 to nine this year. Why is this?

Surging Success for IBM

As we review the awards categories each year, we must determine where to focus our efforts. That is because the depth and breadth of our portfolio grows and client references increase as we innovate and find new ways to help clients with the challenges they face.

In 2016, IBM acquired Resilient Systems, a sparkling addition to its portfolio that allowed it to lead the way in incident response. Now named IBM Resilient, this product has received one of the nine short-listings for the SC 2017 Europe Awards and also won the V3 Security Innovation of the Year Award in November 2016.

The launch of QRadar Advisor with Watson as a commercial offering in February this year is a fantastic example of bringing new, innovative offerings to market. We’re delighted to see Watson for Cyber Security short-listed in the Emerging Technology category, a reflection of just how much excitement there is around this game-changing offering and the results it’s already delivering.

Having more entries short-listed than any other vendor is fantastic since external recognition really matters to us and our clients. The security marketplace is often seen as a fragmented one, so the fact that IBM Security is a leader in multiple sectors puts it in a strong position to offer industry-leading solutions across the full security spectrum. With the sector flooded with vendors and solutions, security leaders need to know who this prestigious judging panel rates as top-notch.

IBM’s Nominations at the SC Europe Awards

IBM Security has been short-listed for the following entries at the 2017 SC Europe Awards:

  • Best Security Company
  • Best Identity Management Solution for IBM Cloud Identity Service
  • Best Identity Management Solution for IBM Identity Governance and Intelligence
  • Best Managed Security Service for IBM Managed Security Services
  • Best Mobile Security Solution for IBM MaaS360 UEM
  • Best SIEM Solution for IBM QRadar
  • Best Fraud Prevention Solution for IBM Trusteer
  • Best Risk Management/Regulatory Compliance Solution for IBM Resilient IRP Privacy module
  • Best Emerging Technology for IBM Watson for Cyber Security

Last Year’s Accolades

At the 2016 SC Europe Awards, IBM Security was short-listed six times. I was delighted to attend the award ceremony; we won in two categories and were highly commended in two others. The following were the IBM accolades at the 2016 SC Europe Awards.

  • Winner: Best Security Company
  • Winner: Best Mobile Security Solution for IBM MaaS360 Enterprise Mobility Management
  • Highly Commended: Best SIEM Solution for IBM QRadar

  • Highly Commended: Best Identity Management Solution for IBM Identity Governance and Intelligence
  • Short-listed: Best Computer Forensics Solution for IBM QRadar Incident Forensics

We look forward to the awards night, which is scheduled for June 6, 2017. In the meantime, IBM will continue to invest in innovation in security, encouraged by the recognition it received.

More from

Data Privacy: How the Growing Field of Regulations Impacts Businesses

The proposed rules over artificial intelligence (AI) in the European Union (EU) are a harbinger of things to come. Data privacy laws are becoming more complex and growing in number and relevance. So, businesses that seek to become — and stay — compliant must find a solution that can do more than just respond to current challenges. Take a look at upcoming trends when it comes to data privacy regulations and how to follow them. Today's AI Solutions On April…

Why Zero Trust Works When Everything Else Doesn’t

The zero trust security model is proving to be one of the most effective cybersecurity approaches ever conceived. Zero trust — also called zero trust architecture (ZTA), zero trust network architecture (ZTNA) and perimeter-less security — takes a "default deny" security posture. All people and devices must prove explicit permission to use each network resource each time they use that resource. Using microsegmentation and least privileged access principles, zero trust not only prevents breaches but also stymies lateral movement should a breach…

5 Golden Rules of Threat Hunting

When a breach is uncovered, the operational cadence includes threat detection, quarantine and termination. While all stages can occur within the first hour of discovery, in some cases, that's already too late.Security operations center (SOC) teams monitor and hunt new threats continuously. To ward off the most advanced threats, security teams proactively hunt for ones that evade the dashboards of their security solutions.However, advanced threat actors have learned to blend in with their target's environment, remaining unnoticed for prolonged periods. Based…

Third-Party App Stores Could Be a Red Flag for iOS Security

Even Apple can’t escape change forever. The famously restrictive company will allow third-party app stores for iOS devices, along with allowing users to “sideload” software directly. Spurring the move is the European Union’s (EU) Digital Markets Act (DMA), which looks to ensure open markets by reducing the ability of digital “gatekeepers” to restrict content on devices. While this is good news for app creators and end-users, there is a potential red flag: security. Here’s what the compliance-driven change means for…