Award: Red Sift wins at Computing Security Excellence Awards 2020

Red Sift were honoured to be winners of “Security Vendor of the Year – SME” at this year’s Computing Security Excellence Awards.

SMEs are often forced to make do with ageing infrastructure and legacy systems, and may be unable to defend themselves against new threats. The prize was awarded to the company who can best aid SMEs in their constant battle to avoid becoming the ‘low-hanging fruit’ of cybersecurity.

“Red Sift presented an easy to understand proposition applicable to almost every SME, with a good structured submission and strong case studies that showed clear evidence of success.”

We believe the award is testament to our own company ambitions to democratize technology essential for cybersecurity and look forward to continuing to support other SME’s in the near future.


Harry Stephens

11 Dec. 2020



Recent Posts


Red Sift Recognized on Deloitte’s EMEA Fast 500™ List

Francesca Rünger-Field

We’re thrilled to share that Red Sift has been included in Deloitte’s 2023 EMEA Fast 500 list. This recognition stems from 389% revenue growth over three years, $54 million in Series B funding, acquiring ASM innovator Hardenize, and introducing the Red Sift Pulse Platform. Read the press release here. About the award The Deloitte Technology Fast…

Read more
Brand Protection

The vital role of cybersecurity for Nonprofits: A deep dive 

Sean Costigan

Save the Children, a beacon of hope and change, has been dedicated to improving the lives of children for over a century. Founded in London, it now has a presence in 29 nations, employing 844 staff members in the UK alone and engaging over 3600 formal volunteers. As charities and nonprofits like Save the…

Read more

Red Sift brings DMARC data to the SOC with new Cisco XDR…

Rebecca Warren

Today, we’re thrilled to announce that we’re extending our partnership by joining the Cisco Security Technical Alliance and integrating Red Sift OnDMARC with Cisco XDR. This integration builds on the Domain Protection partnership we announced in November 2023 to bring visibility of business email compromise into the SOC (security operations center). At release, Red…

Read more

Preventing certificate related violations in cybersecurity frameworks:  A guide to certificate monitoring…

Rebecca Warren

TLS is one of the most widely adopted security protocols in the world allowing for unprecedented levels of commerce across the internet.  At the core of the TLS protocol is TLS certificates. Organizations must deploy TLS certificates and corresponding private keys to their systems to provide them with unique identities that can be reliably…

Read more