Red Sift shortlisted for two Cloud Awards, including Security Innovation of the Year (Enterprise)

To end the year on a high note, we’re delighted to announce that Red Sift has been shortlisted in the 2022-23 Cloud Awards in two categories: ‘Security Innovation of the Year (Enterprise)’ and ‘Most Innovative Use of Data in the Cloud!’ We were selected for our ability to help organizations solve for the greatest vulnerabilities across the complete attack surface, including email, domains, brand, and the network perimeter.

The Cloud Awards program celebrates the brightest and the best organizations in Cloud Computing globally. The ‘Security Innovation of the Year (Enterprise)’ category recognizes a genuinely innovative approach to cloud security. Companies shortlisted for ‘Most Innovative Use of Data in the Cloud’ include a solution or approach that solves structured or unstructured data problems using cloud-based technologies.

“Indeed, the shortlisted applicants released today have surpassed a fiercely competitive initial round. They exemplify truly inventive thinking, whether they are newly-funded disruptors or well-known businesses.”

James Williams, Cloud Awards Head of Operations

Winners of the Cloud Awards will be notified in February 2023. The Cloud Awards has assembled judges from around the globe representing a mix of technical, business, academic, and marketing expertise to assess nominees, determine finalists, and ultimately, select the final winners. It’s an honor to be recognized by such a talented and well-respected judging panel, and we are delighted to be shortlisted in two categories in this year’s awards! This is a testament to the hard work of our entire Red Sift team and the company’s dedication to continuous innovation focused on helping our customers.

View the complete 2022-23 Cloud Awards shortlist here.

Keen to learn more about the Red Sift Digital Resilience Platform?

The Red Sift Digital Resilience Platform is the first highly scalable cloud platform built from the ground up for cybersecurity. It helps organizations like BP, Telefonica, Heineken, and Domino’s to protect their infrastructure and brand enabling them to see a threat, solve it, and secure their digital infrastructure, meaning their greatest attack surface vulnerabilities are fully protected.

Red Sift find out more

PUBLISHED BY

Sabrina Evans

21 Dec. 2022

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
DMARC

Mail Check is Changing: What UK public sector organisations must know about…

Jack Lilley

The National Cyber Security Centre (NCSC) has suggested a change to Mail Check services starting on 24 March 2025. This change mainly involves ending DMARC aggregate reporting. This change comes as a measure to expand the services provided by Mail Check to any UK based organisation, while also limiting the cost and complexity of…

Read more
DMARC

Beyond DMARC: How Red Sift OnDMARC supports comprehensive DNS hygiene

Red Sift

Registrable domains and DNS play a crucial role in establishing online identity and trust, but their importance is often taken for granted. During new service setups, record updates are often overlooked, accumulating outdated entries. As infrastructure teams become increasingly overstretched,  services may be incorrectly shut down without proper cleanup, leaving behind a sprawl of…

Read more
DKIM

First look at DKIM2: The next generation of DKIM

Red Sift

In 2011, the original DomainKeys Identified Mail (DKIM1) standard was published. It outlined a method allowing a domain to sign emails, enabling recipients to verify that the email originated from an entity holding a private key that matches the public key published in the domain’s DNS records. Now in 2024, DKIM is ready for…

Read more
Security

Securing our world: For a safer internet

Jack Lilley

October is Cybersecurity Awareness Month, a time for industries to unite in promoting digital security within today’s complex landscape. Bad actors are leveraging increasingly sophisticated methods—such as email phishing and Business Email Compromise (BEC)—to exploit vulnerabilities, impersonate legitimate contacts, and access sensitive information. CISA Director Jen Easterly advises us to “always think before you…

Read more