Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Realsec

Data Loss Prevention
RealSec is an international company and is a developer of encryption and digital signature systems and Blockchain for the Banking and Methods of Payment sectors, Government and Defense and Multisector

Zemana

Threat Intelligence Platforms
Zemana was established in 2007 to provide the world with innovative cyber-security solutions. It's our job to deal with complex malicious software and other cyber threats by producing simple solution

8MAN

Data Loss Prevention
8MAN is a leading Access Rights Management (ARM) solution in Microsoft and virtual server environments protecting companies against unauthorized access to sensitive data. The 8MAN core functions inclu

6point6

Compliance Consulting
6point6 is a technology consultancy with strong expertise in digital transformation, emerging technology and cyber security. At 6point6 we provide a range of cyber services. This includes preventativ

Police CyberAlarm

Security Operations
Police CyberAlarm is a free tool to help members understand and monitor malicious cyber activity. This service is made up of two parts; monitoring and vulnerability scanning. Police CyberAlarm acts a

6clicks

Governance Risk and Compliance Platforms
6clicks is an easy way to implement your risk and compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRAMP and many other standards. Hundreds of businesses trust

4iQ

Governance Risk and Compliance Platforms
4iQ powers Cyber Risk Intelligence Centers for defense departments, law enforcement agencies, physical security service providers, managed security service providers and critical infrastructure compan

First Point Group

Security Operations
First Point Group provide a global technological recruitment service worldwide. Within that we have a specialist team of Cyber Security recruiters. Their expertise and experience in the cyber-security

Threat Con

Security Operations
Threat Con is a one of its kind event in Nepal, a series of annual international security conventions similar to the famous Black Hat and DEF CON conferences. This community event is managed by Threat

360Logica

Security Operations
360Logica is a software testing company offering numerous kinds of testing services to improve the quality and performance of your software and IT systems. - Component & Unit Testing- Core Testing Se

360 Advanced

Governance Risk and Compliance Platforms
360 Advanced is a relationship-focused cybersecurity and compliance firm offering integrated compliance solutions customized to meet your business’ needs. We work with organizations that are seeking t

WYBOT Cybersecurity

Security Operations
WYBOT provides a solution that monitors the security of your network and information systems in real time. The system triggers alerts by SMS, e-mail and notification if any threats are detected. WYBO

Diversified Search Group

Security Operations
Diversified Search Group is an industry leader in recruiting diverse, inclusive and transformational leadership for clients. Deliberately different in our approach, the firm comprises a combination of

OpenOrigins

Security Operations
OpenOrigins was founded with the mission to create a global trust infrastructure for all organizations and individuals that need real, human, and provable content to function. Deepfakes and Fabricate

ORNA Breach Response
Digital Forensics and Incident Response
ORNA Breach Response & Digital Forensics on SecurityListing: 24/7 breach response and digital forensics service for incident handling

North East Business

Governance Risk and Compliance Platforms
The North East Business Resilience Centre (NEBRC) is a non-profit organisation here to support businesses in the North East of England in protecting themselves from cyber crimes and fraud. Establishe

PAGO DeepACT
Threat Hunting
PAGO DeepACT on SecurityListing: MDR platform combining threat detection, hunting, and real-time containment

Paving The Way
Offensive Security
Paving The Way to DA - Complete Post (Pt 1,2 & 3) on SecurityListing: A three-part educational series documenting techniques for achieving domain administrator privileges in Windows environments, covering attack methods, defenses, and remediation strategies.

Purism

Security Operations
We believe you should not be monitored, nor recorded, without your consent. We believe you should not surrender your freedom and your information to corporations for their profit. Here at Purism, we w

ClearDATA

Cloud Security
The ClearDATA Managed Cloud protects sensitive healthcare data using purpose-built DevOps automation, compliance and security safeguards, and healthcare expertise. Why ClearDATA?- The only healthcare