Wallarm Finalist at 2017 Red Herring Top 100 North America

LOS ANGELES — 6.06.2017 — Wallarm has been selected as a finalist for Red Herring’s Top 100 North America award, one of the technology industry’s most prestigious prizes. https://vimeo.com/101339129

Finalists for the awards are among the continent’s brightest and most innovative private ventures. Their place among North America’s tech elite has been chosen by Red Herring’s editorial team, during a months-long process that takes into account criteria including disruptive impact, proof of concept, financial performance, market footprint and quality of management.

For over two decades Red Herring’s team has seen through the tech sector’s hype to select brands that have become industry benchmarks. Previous Top 100 finalists have included Alibaba, Facebook, Google, Skype, SuperCell, Spotify, Twitter, and YouTube.

The Top 100 North America has become not only a springboard for some of tech’s biggest names, but a valued and trusted tool for venture capitalists, experts and analysts predicting trends at the industry’s sharpest edge.

“Selecting finalists for this year’s Top 100 has proved more difficult than ever,” said Alex Vieux, publisher and chairman of Red Herring. “North America has been tech’s beating heart for years–but never have I seen such an exciting, disruptive and innovative generation as we have in 2017.

“Wallarm fully deserves its place among our finalists, and I’ve every confidence it will make a significant impact in the tech world,” added Vieux.

Join Ivan Novikov’s presentation on June 13th at the Red Herring Top 100 North America conference in Los Angeles. The Top 100 winners will be announced at a special awards ceremony on the evening of June 14 at the event.

Tags: Awards

Recent Posts

The CISO’s Dilemma: How To Scale AI Securely

Your board wants AI. Your developers are building with it. Your budget committee is asking…

5 days ago

Agent-to-Agent Attacks Are Coming: What API Security Teaches Us About Securing AI Systems

AI systems are no longer just isolated models responding to human prompts.  In modern production…

6 days ago

Everyone Knows About Broken Authorization – So Why Does It Still Work for Attackers?

Broken authorization is one of the most widely known API vulnerabilities.  It features in the…

2 weeks ago

From Shadow APIs to Shadow AI: How the API Threat Model Is Expanding Faster Than Most Defenses

The shadow technology problem is getting worse.  Over the past few years, organizations have scaled…

4 weeks ago

Inside Modern API Attacks: What We Learn from the 2026 API ThreatStats Report

API security has been a growing concern for years. However, while it was always seen…

4 weeks ago

CISO Spotlight: Craig Riddell on Curiosity, Translation, and Why API Security is the New Business Imperative

It’s an unusually cold winter morning in Houston, and Craig Riddell is settling into his…

1 month ago