search
Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Canary Technology Solutions (Canary IT)

Canary Technology Solutions

Australia flag

Cloud Security

A Cloud, Cyber Security, Retail Solutions and Managed IT Services provider for over 25 years, we safeguard and revolutionise business through technology and foresight. Tech is purely an enabler, that’

4.8(3)
Proofpoint

Proofpoint

United States flag

Brand Protection

Proofpoint provide the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, social media and mobile messaging. Proofpoint prot

4.8(3)
Nameshield Group

Nameshield Group

France flag

Brand Protection

4.8(3)
Cyphershield

Cyphershield

UN flag

Security Operations

Cypershield is a Security and Smart Contract audit company providing professional smart contract auditing services for varied Crypto projects. We collaborate with crypto projects and startups, big an

4.8(3)
Certes

Certes

United States flag

Data Loss Prevention

Certes is a pioneer in delivering cutting-edge security technology solutions, with a specific focus on Data Protection Risk Mitigation (DPRM). With over 20 years of expertise, our technology is deplo

4.8(3)
Netlawgic Legal Services

Netlawgic Legal Services

India flag

Security Operations

4.8(3)
Aura

Aura

United States flag

Threat Intelligence Platforms

Aura is a mission driven technology company dedicated to creating a safer internet for everyone. We believe that people should be able to live with the peace of mind that their identity, online accou

4.8(3)
Crypto Quantique

Crypto Quantique

United Kingdom flag

Industrial Control System Security

Crypto Quantique are building the most secure end-to-end IoT security platform. Our quantum driven cybersecurity solution enables vertically integrated, highly secure IoT deployments based on unforgea

4.8(3)
Coalition for Secure AI (CoSAI)

Coalition for Secure

United States flag

Security Operations

The Coalition for Secure AI (CoSAI) is an open ecosystem of AI and security experts from industry leading organizations dedicated to sharing best practices for secure AI deployment and collaborating o

4.8(3)
Securosys

Securosys

Switzerland flag

Data Loss Prevention

Securosys SA is a technology company dedicated to securing data and communications. We develop, produce, and distribute hardware, software and services that protect and verify data and their transmiss

4.8(3)
Bytes Technology Group

Bytes Technology Group

United Kingdom flag

Compliance Consulting

Bytes is a leading provider of world-class IT solutions. Our growing portfolio of services includes cloud, security, licensing, SAM, storage, virtualisation and managed services. Our highly-skilled t

4.8(3)
Bulwark Technologies

Bulwark Technologies

United Arab Emirates flag

Data Protection

Bulwark Technologies is a cybersecurity distributor focused on the Middle East, with headquarters in Dubai and regional offices in Saudi Arabia and India. The company acts as a value-added distributor

4.8(3)
Elpha Secure

Elpha Secure

United States flag

Security Operations

Elpha Secure provides a comprehensive cybersecurity solution, combining technology and insurance to protect against cyber threats. Cyber Assessment - We automatically analyze a client's security post

4.8(3)
WidePoint

WidePoint

United States flag

Security Operations

WidePoint Corporation is an innovative provider of Trusted Mobility Management (TM2) solutions. Trusted Mobility Management converges at the intersection of WidePoint’s pioneering solutions: WidePoi

4.8(3)
Baffle

Baffle

United States flag

Data Loss Prevention

Baffle was founded to battle the increasing threats to enterprise assets in public and private clouds. Our team has strong backgrounds in encryption, security, cryptography, storage and enterprise inf

4.8(3)
CyberEdBoard

CyberEdBoard

United States flag

Security Operations

CyberEdBoard is a private, peer-to-peer education and networking community focused on cybersecurity, technology, business processes and risk management. Members are focused on information security, in

4.8(3)
AusCERT

AusCERT

Australia flag

Security Operations

AusCERT is the premier Computer Emergency Response Team (CERT) in Australia and a leading CERT in the Asia/Pacific region. AusCERT operates within a worldwide network of information security experts

4.8(3)
Monkey-Spider

Monkey-Spider

language

Security Operations

Monkey-Spider on SecurityListing: A crawler-based low-interaction client honeypot for exposing website threats.

4.8(3)
BeyondTrust

BeyondTrust

United States flag

Security Operations

BeyondTrust is a worldwide leader in Privileged Access Management, offering the most seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised re

4.8(3)
HackCon Norway

HackCon Norway

Norway flag

Security Operations

HackCon is for the people who are interested in technology, psychology, IT and security, and who wants to improve their knowledge within these areas. The purpose of HackCon is to give a clear view of

4.8(3)
Showing 1 to 20 of 2246 products