Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

MMA Infosec

Network Security
MMA Infosec is a cybersecurity firm with over two decades of experience in network and cyber security. The company focuses on transforming customers from reactive to resilient, aiming to move beyond m

Logpoint SIEM
Security Information and Event Management
Logpoint SIEM on SecurityListing: A security information and event management solution that collects, normalizes, and analyzes log data from across an organization's infrastructure to enhance threat detection and compliance reporting.

Reveald ManagedDetection and
Threat Hunting
Reveald ManagedDetection and Response on SecurityListing: MDR service for CrowdStrike, Microsoft, and Trellix endpoints with 24/7 monitoring

RedTeam Hacker Academy

Services
RedTeam Hacker Academy is a cybersecurity education provider offering hands-on ethical hacking and cybersecurity training across India and GCC. The academy provides a range of certified courses and pr

Kennedys

Security Operations
Kennedys is a global law firm with expertise in litigation/dispute resolution and advisory services, particularly in the insurance/reinsurance and liability sectors, including cyber risk. Our global

ValueMentor

AI Security
ValueMentor provides cybersecurity and payment security services, offering digital trust assurance, security testing, and managed security to help organizations manage risks, meet compliance standards

EG-CERT

Services
EG-CERT is charged with providing computer and information security incident response, support, defense and analysis against cyber attacks and collaboration with governmental, financial entities and a

Enterprise Incubator Foundation

Security Operations

01 Communique Laboratory

Data Loss Prevention
01 Communique Laboratory is an innovation leader in the new realm of Post-Quantum Cyber Security. Our patent-pending Quantum-Safe Cryptographic system can be applied to secure virtually everything in

ITSEC

Application Security
ITSEC is a cybersecurity solutions provider focused on protecting businesses and individuals from digital threats. Based in Dubai with operations extending globally, it offers managed security service

WinHex
Digital Forensics and Incident Response
WinHex on SecurityListing: Universal hexadecimal editor for computer forensics, data recovery, and IT security.

tcpreplay
Offensive Security
tcpreplay on SecurityListing: Tcpreplay is a suite of Open Source utilities for editing and replaying captured network traffic.

Ranges – Cyber
Cyber Range Training
Ranges – Cyber Warfare Range LLC on SecurityListing: A network of physical and online cyber warfare ranges for training and testing

RTIR
Digital Forensics and Incident Response
RTIR on SecurityListing: Request Tracker for Incident Response (RTIR) is a tool for incident response teams to manage incident reports, correlate data, and facilitate communication.

XSS'OR
Offensive Security
XSS'OR on SecurityListing: Hack with JavaScript XSS'OR tool for encoding/decoding and various XSS related functionalities.

Help AG

Cloud Security
Help AG is a leading cybersecurity firm and the cybersecurity arm of e& enterprise, delivering managed security, consulting, and end-to-end cybersecurity services across the Middle East, including the

X-Ways Forensics
Digital Forensics and Incident Response
X-Ways Forensics on SecurityListing: Advanced computer forensics software with efficient features.

tfkr

Application Security
tfkr is an Emirati-based cybersecurity firm specializing in application security testing and offensive security training. The company focuses on identifying and mitigating vulnerabilities in software

Penetration Testing Middle

GRC
Penetration Testing Middle East is a Dubai-based cybersecurity consultancy specializing in technical security assessments and penetration testing. The company offers services across the UAE, including

ALPHA DS

AI Security
ALPHA DS is a focused cybersecurity service provider offering strategic consultancy and tailored information security solutions across networks, applications, data, endpoints, and OT/ICS/IOT environme