Award: Red Sift wins at UK Business Tech Awards 2022

Red Sift were delighted to be named winners of ‘Best Application of Tech – Security’ at this year’s UK Business Tech Awards.

The Awards celebrate the UK’s finest tech businesses and rewards innovative and exceptional application of technology to transform and grow businesses.

With the world becoming ever more virtual, tech developments are even more important to developing the future, than they have been in shaping the past. The UK Business Tech Awards were looking for tech that has added tangible benefits to customer experience, management systems, marketing and sales information storage and data tracking.

The ‘Best Application of Tech – Security’ category aims to recognise exceptional use of technology in the security sector. Judged by an independent panel of leading technology experts, they were looking for the thinking and approach specific to the needs of the security sector and the client’s or company’s goals.

We thought Red Sift had clear visuals demonstrating interface. They grew their customer base by 22% to include global clients which is impressive. The campaign gave a real sense this is a platform that is making the complex task of security less complex with it’s applications. Well done!

This positive feedback is testimony to the hard work and technical skills of the Red Sift team and we look forward to celebrating more success in the future!

PUBLISHED BY

Harry Stephens

21 Oct. 2022

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
DMARC

Beyond DMARC: How Red Sift OnDMARC supports comprehensive DNS hygiene

Red Sift

Registrable domains and DNS play a crucial role in establishing online identity and trust, but their importance is often taken for granted. During new service setups, record updates are often overlooked, accumulating outdated entries. As infrastructure teams become increasingly overstretched,  services may be incorrectly shut down without proper cleanup, leaving behind a sprawl of…

Read more
DKIM

First look at DKIM2: The next generation of DKIM

Red Sift

In 2011, the original DomainKeys Identified Mail (DKIM1) standard was published. It outlined a method allowing a domain to sign emails, enabling recipients to verify that the email originated from an entity holding a private key that matches the public key published in the domain’s DNS records. Now in 2024, DKIM is ready for…

Read more
Security

Securing our world: For a safer internet

Jack Lilley

October is Cybersecurity Awareness Month, a time for industries to unite in promoting digital security within today’s complex landscape. Bad actors are leveraging increasingly sophisticated methods—such as email phishing and Business Email Compromise (BEC)—to exploit vulnerabilities, impersonate legitimate contacts, and access sensitive information. CISA Director Jen Easterly advises us to “always think before you…

Read more
Cybersecurity

Boosting email security amid recent Coinbase phishing attempts

Jack Lilley

In recent weeks, there have been reports of sophisticated phishing attacks disguised as official communication from the cryptocurrency platform, Coinbase. These phishing emails closely mimic Coinbase’s branding and language to build recipient trust and prompt clicks on malicious links. The subject lines of these emails generally follow a format: the sender’s address starts with…

Read more