The CSO50 Awards recognize 50 organizations for security projects or initiatives that demonstrates outstanding business value and thought leadership. Here, we recognize the technology vendors who provide the tools with which our winners create their peerless projects. Credit: IDG The CSO50 Award is a recognized mark of risk and security excellence. The award is given to organizations/companies rather than individuals, making it an honor in which everyone on the security team can take pride.Underpinning each winning project is a diverse suite of products, solutions, and platforms, sourced from an array of vendors large and small. Here for the first time we recognise the technologies behind our CSO 50-winning projects, each by itself a provider of excellence in security and IT. These vendors partnered with our winning organizations. They provided technology utilised by the most successful and innovative CSOs as tools and platforms by which to create greatness.“Through the CSO 50 we are proud to showcase the companies and executives leading the charge in strategic security leadership, making customers and organisations safe, secure and private,” said Matt Egan, Editorial Director, CSO. “It is important also to shine a light on the tools and platforms chosen by those technology leaders and their organizations, on which to build their most innovative projects.” This is the 2022 US CSO 50 Solutions Partners. The 2022 winnersPlease join us in congratulating the Solutions Partners of the 2022 US CSO 50 award winners.Aiden TechnologiesAirlockAlgoSecAmazon Web ServicesAndroidAnsibleAtlassianAzure Active DirectoryBeyoind IdentityBitSightCheckpointCiscoCode42 IncydrCofenseCrowdStrikeCyglassDeepfenceDjangoFlutterFortinetGrafanaIslandKnowBe4KrakenKubernetesManageEngineMcAfee MvisionMicrosoftMimecast.NET CoreNetskopeNozomiOktaOrdrOT-ISACPalo Alto NetworksPingIDProcessUnityProtegrityPythonQualysRSA ArcherSafebreachSailPoint Identity IQSentinel IPSServiceNowSlackSmart Logic SemaphoreSonrai SecuritySplunkStrata Identity MavericsSUSE LinuxSymantecTableauVectraVisual StudioZoomZscaler Related content news analysis SEC rule for finance firms boosts disclosure requirements Amendments to Regulation S-P requires broker-dealers, investment companies, registered investment advisers, and transfer agents to disclose incidents to customers. By Evan Schuman May 17, 2024 5 mins Data Breach Financial Services Industry Data Privacy feature DDoS attacks: Definition, examples, and techniques Distributed denial of service (DDoS) attacks have been part of the criminal toolbox for over twenty years, and they’re only growing more prevalent and stronger. By Josh Fruhlinger May 17, 2024 10 mins DDoS Cyberattacks news FCC proposes BGP security measures Protecting the Border Gateway Protocol is as important as protecting the border. By Gyana Swain May 17, 2024 1 min Regulation Network Security news US AI experts targeted in cyberespionage campaign using SugarGh0st RAT Threat actors use phishing techniques to obtain non-public information about generative artificial intelligence. By Lucian Constantin May 16, 2024 4 mins Phishing Data and Information Security PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe