Redscan is pleased to announce that it has been selected as a finalist in three categories at the 2019 Cyber Security Awards.
We have been shortlisted for:
- Best Security Company of the Year (less than 150 staff)
- Innovative Product of the Year – Cloud Based – ThreatDetect™
- Innovative Product of the Year – Threat Detection – ThreatDetect™
The Cyber Security Awards were established in 2014, to reward the best individuals, teams and companies within the cyber security industry, with excellence and innovation the core themes across all categories. Winners will be announced at an awards dinner and presentation at the Park Plaza Hotel, Victoria, on the 4th July 2018.
“The competition this year is incredibly tough and diverse. This was the toughest year so far to have made the shortlist. There are so many fantastic individuals, innovative products and companies that are doing great things within cyber security.” – Karla Reffold, Cyber Security Awards Judge
It’s hugely satisfying to receive Cyber Security Awards recognition again, having been selected as a finalist for the first time last year. This announcement comes at an exciting time for the business, having more than doubled the size of our client base over the last 12 months.
ThreatDetect, our Managed Detection and Response service, integrates experienced security experts, cutting-edge technology and up-to the minute intelligence, to help organisations hunt for, detect and respond to threats, 24/7. The service supports public and private cloud monitoring for environments including AWS, Azure, Office 365 and G Suite.
About Redscan
Redscan is a provider of managed security services, specialising in threat detection and integrated response. Possessing a deep knowledge of offensive security, Redscan’s experts are among the most qualified in the industry, working as an extension of clients’ in-house resources to expose and address vulnerabilities plus swiftly identify and shut down breaches. Services offered include MDR, CREST-accredited Penetration Testing and Red Team Operations.
Read more:
Four situations when you should consider a pen test for your business
The importance of file integrity monitoring in cyber threat detection
Preparing for PCI DSS 4.0: what you need to know