The Globee® Awards, organizer of the world’s premier business awards programs and business ranking lists, has named Deepfence a five-time winner in the 18th Annual 2022 Cyber Security Global Excellence Awards! 🎉 🏆🙌
We are delighted to have won awards in these categories:
The coveted Globee Awards honor achievements in the cyber and digital security industry worldwide, and we’re incredibly proud to have been recognized alongside the other 2022 winners.
In the security software and technologies categories, we were chosen as a winner for Deepfence ThreatMapper, the open source security observability platform that hunts for vulnerabilities at runtime across clouds, containers, serverless, and more, and then ranks them based on their risk of exploit. Having a prioritized list of your most exploitable vulnerabilities at runtime enables you to target the issues that present the greatest risk to the security of your applications.
We believe this recognition from the Globee Awards further validates our strategy to build a fully open source platform to help developers, DevOps, DevSecOps, and security teams identify and prioritize threats quickly and easily, and focus their efforts on the vulnerabilities that need to be fixed first. Thank you to the esteemed judging panel of more than 55 executives and professionals, as well as everyone in the broader Deepfence community, who helped us achieve this tremendous milestone.
It’s certainly been an exciting start to the year so far here at Deepfence! We released ThreatMapper 1.2 with even more features to love, we won the 2022 DEVIES Award for Best Innovation in Security and Networking, and now we’re a five-time Globee Awards winner!
Stay tuned for even more awesomeness to come as we continue on our mission to protect the entire cloud native continuum. And if you haven’t already tried out the award-winning ThreatMapper, you can find everything you need to get up and running on GitHub.
Deepfence is dedicated to helping organizations secure their infrastructure and applications across the cloud native continuum. ThreatMapper open source scans, maps, and ranks vulnerabilities in running containers, images, hosts, and repositories. ThreatStryker elevates these capabilities by providing runtime attack analysis, threat assessment, and targeted protection.
Interested in learning more? Schedule a consultation with one of our security experts today.