Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

ArmorText

ArmorText

United States flag

Data Loss Prevention

ArmorText is a Secure Enterprise Messenger & Crisis Management Platform Built to Solve Real–World Problems. End–to–end encryption that still supports your retention & review, governance, and informati

WISeKey

WISeKey

Switzerland flag

Industrial Control System Security

WISeKey is a leading cybersecurity company currently deploying large scale digital identity ecosystems for people and objects using Blockchain, AI and IoT respecting the Human as the Fulcrum of the In

SecureData

SecureData

United States flag

Data Loss Prevention

SecureData provide professional data recovery services, digital forensics, data recovery software and FIPS 140-2 Level 3 Validated hardware encrypted drives. Our SecureDrive product line of military-

CyberUK

CyberUK

United Kingdom flag

Security Operations

CYBERUK is the UK government’s flagship cyber security event and the authoritative event for the UK’s cyber security community. It demonstrates what we can do together as teams, as departments and as

Fuel Recruitment

Fuel Recruitment

United Kingdom flag

Security Operations

Fuel Recruitment is a specialist recruitment company for the IT, Telecoms, Engineering, Consulting and Marketing industries. Fuel Recruitment is a privately owned technical recruitment consultancy. W

Binary Security AS

Binary Security AS

Norway flag

Penetration Testing

Binary Security is a Norwegian information security consultancy company. We are specialists at application security, penetration testing and secure code reviews. We specialize in finding bugs and imp

IoT Now

IoT Now

United Kingdom flag

Industrial Control System Security

In the first global magazine of its kind, IoT Now explores the evolving opportunities and challenges facing CSPs, and we pass on some lessons learned from those who have taken the first steps in next

Cyberint

Cyberint

Israel flag

Managed Security Service Providers

Powered by a unique combination of a SaaS platform and a world-class expert team, Cyberint, the Impactful Intelligence company, fuses open-deep-and darkweb Threat Intelligence with Attack Surface Mana

Zilla Security

Zilla Security

United States flag

Governance Risk and Compliance Platforms

Zilla combines identity governance with cloud security to deliver comprehensive access visibility, reviews, lifecycle management, and policy-based security remediation. Zilla is a SaaS platform for a

Varen Technologies

Varen Technologies

United States flag

Compliance Consulting

Varen Technologies is an innovative consulting partner that is trusted by its clients and employees to deliver intelligent insights and respond quickly to the ever-evolving needs with highly respected

Binary Gecko

Binary Gecko

Germany flag

Penetration Testing

Binary Gecko GmbH provides tailor made cybersecurity solutions and services. Ourinternational team is made up of world class, highly technical professionals with a proven track record in the field. We

AI-vidence

AI-vidence

France flag

Security Operations

The mission of AI-vidence is to make AI more explainable. Our conviction is that it is necessary to introduce a component of logical AI (reasoning based on rules) to enable the model to be robust and

CybernetIQ

CybernetIQ

Canada flag

Security Operations

CLAW by CybernetIQ is the industry's most advanced SOAR platform helping unify all cybersecurity tools under one  umbrella and providing organizations faster, better and more accurate cybersecurity.

Match Systems

Match Systems

Singapore flag

Governance Risk and Compliance Platforms

Match Systems is a provider of technology-driven solutions for financial crime detection, compliance and risk management. Match Systems is the Data provider of information about cryptocurrency addres

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling &

United States flag

Security Operations

The vision of Sadoff E-Recycling & Data Destruction is to be the preferred choice in electronics recycling and data destruction. Our mission to accomplish this is to incorporate customer focus, attain

Council of Europe Convention on Cybercrime

Council of Europe

France flag

Security Operations

The Council of Europe helps to protect societies worldwide from the threat of cybercrime through the Convention on Cybercrime and its Protocol on Xenophobia and Racism, the Cybercrime Convention Commi

Feitian Technologies

Feitian Technologies

China flag

Security Operations

Feitian Technologies provides authentication and transaction security products for financial institutions, telecoms, government and leading business enterprises. Its full product portfolios and solut

ReFirm Labs

ReFirm Labs

United States flag

Industrial Control System Security

ReFirm Labs provides the tools you need for firmware security, vetting, analysis and continuous IoT security monitoring. We are an elite team of former US Government cyber professionals with decades

Whitaker Brothers

Whitaker Brothers

United States flag

Security Operations

Whitaker Brothers prides itself in being industry leaders with over 75 years of experience. Our data destruction equipment can be found in 115 countries and every single continent in the world, from

astarios

astarios

Switzerland flag

Security Operations

astarios is a Swiss-based organization with development offices in Ukraine. We have over 20 years of experience in providing near-shore software development services and tech talent to companies all o

Showing 2041 to 2060 of 2606 products