As the world continues the disruptive digitalization of processes, industries and organizations, as everything and everyone is interconnected and communicating, security is becoming the most essential element to instill trust and confidence of users into the digital world. Emerging technologies such as artificial intelligence, the Internet of Things, robotics and blockchain are becoming crucial elements in how we do business, communicate and live, cybersecurity professionals, experts and innovators will have to up their game so that we can continue to make the most of these emerging technologies. Individuals and organizations want the certainty that their data is protected, their communication is safe and that their processes are secure.

On June 11, the ten Security Finalist Innovations of the Blue Tulip Awards 2020 will give their final pitch to convince the jury why they should be crowned winner. From a deep fake detection technology to a supply chain security assurance platform, these Security Finalists will shape our futures.

Anticipating criminal behaviour by discovering the narrative in data by Pandora Intelligence

Human history is based on narratives. Pandora Intelligence has invented a way to translate disparate data into narrative scenarios. Moreover, the company applies the latest data science techniques to combine historic datasets, with real-time information, into operational future scenarios. These future scenarios help (non)governmental organizations and commercial companies to mitigate threats and enhance opportunities.

Beyond DLP by Its Mine

ITsMine’s Beyond DLP™ - Data Loss Prevention solution enables organizations to proactively protect against internal and external threats, automatically. The product alerts and gives critical forensic information even after data exfiltration beyond companies' boundaries. ITsMine is easy to implement, meets regulatory requirements, is transparent to employees and IT teams and requires no endpoint agents.

BrainMatter by BrainCreators

BrainMatter facilitates digital intelligence at scale. The platform accelerates data enrichment and enables data governance for all your AI projects. BrainMatter has received funding from the Horizon 2020 Framework Programme of the European Union.


With the presence of deep fakes on social media, the question of what is real and what is fake arises. The lines will be blurred as to what the public can perceive as fake and real, which can incite the propagation of fake news by those with malicious intentions or malign someone's video\image. Our explainable AI powered solution help governments, organizations and individuals to automatically spot deep fake videos\images.

Dot by Awen Collective

Dot by Awen Collective is for critical national infrastructure providers, advanced manufacturers and owners of building automation & control systems who want to reduce their risk of cyber-attacks. Their innovative solution uses safety-critical and security-by-design techniques to safely & securely perform asset and vulnerability discovery on Operational Technology (OT).

Evergreen Hash (EgHash™) by Trust Stamp

EgHash address the need to create an identity for every human being in order to achieve universal, financial, and societal inclusion. They do so by utilizing one or multiple (fused) biometric modalities and generate a unique hashed-tokenized identity that can only identify the subject using our probabilistic AI. Their technology works on and offline and can be overlaid on any existing identity authentication methodology.

Oddity real-time violence detection

Oddity has developed a machine and deep learning algorithm that is capable to detect violence real-time on live video feeds. They are integrated in widely used Video Management Systems (VMS) and send alerts to the operator when an anomaly is detected.

Sovrin Network

The Sovrin Network is an open source project operated by independent Stewards and uses the power of a distributed ledger to give every person, organization, and thing the ability to own and control their own permanent digital identity. The network was built to exchange verifiable credentials and restore the control, privacy, and safety of digital identity. Since the launch of the network, there are dozens of entities with SSI solutions and cases based on the Sovrin Network.

Supply chain security assurance platform by Risk Ledger

Research shows that over 60% of security breaches happen because of a third-party. Organizations must ensure that suppliers who work with their data, networks and systems are complying with their security policies. Our platform is an easy to use, secure social network that enables organizations of all sizes to conduct security assurance across their entire supply chain in a highly efficient way, allowing clients to monitor and encourage security compliance beyond 3rd parties to 4th and 5th parties.

TLF Cyber. Cyber Defense Center infrastructure

Cyber Threat centric software platform for cyber security service providers to pro-actively prevent cyber incidents at their SMB clients. Combined with a centralized remote management platform managing 1-to-many SMB clients.



Each of these Security Finalist innovations are undeniably shaping new boundaries, but only one can be crowned winner. Join us, digitally, on June 11 to find out which to find out who will become the Blue Tulip Awards 2020 winner.

Share this article:


View all frequently asked questions about the Innovation Awards Program


For questions regarding the Innovation Awards please contact us