Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Covenant Technologies

Security Operations
Make Covenant Technologies the only choice for your IT and cybersecurity recruitment needs. We have the experts, the accountability, and the commitment to deliver quality candidates at the forefront o

Cork

Security Operations
Cork is a purpose-built cyber warranty company for managed service providers (MSPs) serving small businesses (SMBs) and the software solutions they manage. Cork was founded on the idea cyber insuranc

Hexnode MDM

Security Operations
Hexnode MDM is an award winning Enterprise Mobility Management vendor which helps businesses to secure and manage BYOD, COPE, apps and content. We deliver a simple, easy-to-configure Unified End Poin

Control System Cyber

Industrial Control System Security
Control System Cyber Security Association International (CS)²AI, pronounced “See-say”, is the premier global not for profit workforce development organization supporting professionals of all levels ch

Conatix

Security Operations
Conatix was formed to apply recent advances in AI and other fields of technology to insider fraud, one of the most intractable problems in cybersecurity. The Conatix CYberSecurity ANAlytics (CYSANSA)

Common Good Cyber

Security Operations
Common Good Cyber is a global initiative with the goal of identifying and implementing innovative models for sustaining groups, organizations, and individuals involved in critical cybersecurity functi

Com Laude

Brand Protection
Com Laude is a domain name management company that provides strategic consulting to help companies strengthen digital brand, safeguard customers & protect brand IP. Safeguarding your brand is our bus

Code42

Backup as a Service
Code42 is best known for CrashPlan, an enterprise SaaS solution that backs up all distributed end-user data on a single, secure platform. Through continuous, automatic collection via a lightweight ag

DeepKeep

Security Operations
DeepKeep's AI security safeguards machine learning pipelines, promoting secure, unbiased, error-free, explainable and trustworthy AI solutions. This includes vision data models, LLM and tabular model

ClearedJobs.Net

Security Operations
ClearedJobs.Net is a career site and job fair company for professionals seeking careers in the defense, intelligence and cyber security communities. We offer valuable resources for both cleared job se

Cigniti Technologies

Penetration Testing
Cigniti Technologies provides Independent Software Testing (IST) Services including software security testing. Cigniti is the world’s first IST Services Company to be appraised at CMMI-SVC v1.3, Matu

Darkscope

Security Operations
Darkscope is an award-winning personalised cyber intelligence service provider. We are a joint human and AI business dedicated to developing, training and using artificial intelligence to make our hum

CEPS

Security Operations
CEPS is a leading think tank and forum for debate on EU affairs, ranking among the top think tanks in Europe. With an exceptionally strong in-house research capacity and an extensive network of partn

Censys Threat Hunting
Threat Hunting
Censys Threat Hunting on SecurityListing: Proactive threat hunting platform for detecting adversary infrastructure

Censys Internet Intelligence
Threat Hunting
Censys Internet Intelligence Platform on SecurityListing: Internet intelligence platform for asset discovery and threat analysis

Celcom

Brand Protection
Celcom is the oldest mobile telecommunications provider in Malaysia, providing solutions and services to consumers and businesses. Celcom's business solutions include Cyber Guard Device protection an

Compumatica

Industrial Control System Security
Compumatica secure networks is a leading European ICT security manufacturer for cybersecurity and encryption products. Solutions include network security, SCADA/ICS security, Mobile/BYOD and email enc

Caulis

Security Operations
Caulis FraudAlert is a cyber security solution. It can detect fraud and identity theft based on users’ online behaviour. When our system detects unusual behaviour from individual users, it notifies t

Canadian Security Intelligence

Security Operations
CSIS collects and analyzes threat-related information concerning the security of Canada in areas including terrorism, espionage, WMD, cybersecurity and critical infrastructure protection. CSIS works

Cambray Solutions

Security Operations
Cambray Solutions specializes in locating and securing technical professionals, managers, and executives. Cambray Solutions technology specialty division is a national IT staffing organization, opera