Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.
Canary Technology Solutions

Cloud Security
A Cloud, Cyber Security, Retail Solutions and Managed IT Services provider for over 25 years, we safeguard and revolutionise business through technology and foresight. Tech is purely an enabler, that’
Proofpoint

Brand Protection
Proofpoint provide the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, social media and mobile messaging. Proofpoint prot
Nameshield Group

Brand Protection
Cyphershield

Security Operations
Cypershield is a Security and Smart Contract audit company providing professional smart contract auditing services for varied Crypto projects. We collaborate with crypto projects and startups, big an
Certes

Data Loss Prevention
Certes is a pioneer in delivering cutting-edge security technology solutions, with a specific focus on Data Protection Risk Mitigation (DPRM). With over 20 years of expertise, our technology is deplo
Netlawgic Legal Services

Security Operations
Aura

Threat Intelligence Platforms
Aura is a mission driven technology company dedicated to creating a safer internet for everyone. We believe that people should be able to live with the peace of mind that their identity, online accou
Crypto Quantique

Industrial Control System Security
Crypto Quantique are building the most secure end-to-end IoT security platform. Our quantum driven cybersecurity solution enables vertically integrated, highly secure IoT deployments based on unforgea
Coalition for Secure

Security Operations
The Coalition for Secure AI (CoSAI) is an open ecosystem of AI and security experts from industry leading organizations dedicated to sharing best practices for secure AI deployment and collaborating o
Securosys

Data Loss Prevention
Securosys SA is a technology company dedicated to securing data and communications. We develop, produce, and distribute hardware, software and services that protect and verify data and their transmiss
Bytes Technology Group

Compliance Consulting
Bytes is a leading provider of world-class IT solutions. Our growing portfolio of services includes cloud, security, licensing, SAM, storage, virtualisation and managed services. Our highly-skilled t
Bulwark Technologies

Data Protection
Bulwark Technologies is a cybersecurity distributor focused on the Middle East, with headquarters in Dubai and regional offices in Saudi Arabia and India. The company acts as a value-added distributor
Elpha Secure

Security Operations
Elpha Secure provides a comprehensive cybersecurity solution, combining technology and insurance to protect against cyber threats. Cyber Assessment - We automatically analyze a client's security post
WidePoint

Security Operations
WidePoint Corporation is an innovative provider of Trusted Mobility Management (TM2) solutions. Trusted Mobility Management converges at the intersection of WidePoint’s pioneering solutions: WidePoi
Baffle

Data Loss Prevention
Baffle was founded to battle the increasing threats to enterprise assets in public and private clouds. Our team has strong backgrounds in encryption, security, cryptography, storage and enterprise inf
CyberEdBoard

Security Operations
CyberEdBoard is a private, peer-to-peer education and networking community focused on cybersecurity, technology, business processes and risk management. Members are focused on information security, in
AusCERT

Security Operations
AusCERT is the premier Computer Emergency Response Team (CERT) in Australia and a leading CERT in the Asia/Pacific region. AusCERT operates within a worldwide network of information security experts
Monkey-Spider
Security Operations
Monkey-Spider on SecurityListing: A crawler-based low-interaction client honeypot for exposing website threats.
BeyondTrust

Security Operations
BeyondTrust is a worldwide leader in Privileged Access Management, offering the most seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised re
HackCon Norway

Security Operations
HackCon is for the people who are interested in technology, psychology, IT and security, and who wants to improve their knowledge within these areas. The purpose of HackCon is to give a clear view of