16 Innovative Cybersecurity Technologies Of 201616 Innovative Cybersecurity Technologies Of 2016
This year's SINET 16 Innovators were chosen from 82 applicants representing nine countries.
October 3, 2016
The Security Innovation Network (SINET) has shared the results of its annual SINET 16 competition created to discover the most innovative cybersecurity companies.
Each year, the organization's steering committee evaluates products from early-stage security companies from around the world and awards those it finds most compelling. The committee consists of 100 cybersecurity professionals who come from large businesses, government, VC firms, and academia.
Entrants must have a cybersecurity product, not only a service, in order to apply for SINET 16. Companies must also be completely autonomous and have annual revenues of $15M or less. They cannot have been previously selected as a SINET 16 Innovator more than once.
Companies named SINET 16 Innovators are invited to present their value proposition in front of 300 to 400 investors, buyers, researchers, and solutions providers. They are also given a booth to show their solutions at the SINET showcase in Washington DC, and receive free coaching to improve their messaging.
SINET lists five key criteria used to judge these emerging companies:
Marketplace urgency for the product/solution
How innovative/unique the product is
How well the technology solves real, critical security problems
The advantages of the product over others
The company's ability to succeed based on the state of its product, leadership, and capital
This year's winners were chosen from a pool of 82 applicants representing nine countries and a variety of technologies built to address security threats and vulnerabilities.
Which companies made the final cut? Here, we take a closer look at the winners and technologies included in this year's SINET 16 Innovators lineup.
About the Author(s)
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
Everything You Need to Know About DNS Attacks
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment