Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Cybersecurity Credentials Collaborative (C3)

Cybersecurity Credentials Collaborative

UN flag

Security Operations

C3 provides a forum for collaboration among vendor-neutral information security and privacy and related IT disciplines certification bodies. Mission - To provide awareness of and advocacy for vendor-

4.7(2)
PEview

PEview

language

Digital Forensics and Incident Response

PEview on SecurityListing: A PE/COFF file viewer that displays header, section, directory, import table, export table, and resource information within various file types.

4.7(2)
Bulwark Distribution

Bulwark Distribution

United Arab Emirates flag

Data Protection

Bulwark Distribution is a value-added distributor of IT and cybersecurity solutions serving the Middle East with headquarters in Dubai and regional offices in Saudi Arabia and India. The company partn

4.7(2)
Ampliphae

Ampliphae

United Kingdom flag

Cloud Security

4.7(2)
RPC

RPC

United Kingdom flag

Security Operations

RPC is a business law firm. Practice areas include technology and cyber risk. As a leading technology and cyber risk practice, we're acknowledged experts in defending technology companies. We specia

4.7(2)
BluBracket

BluBracket

United States flag

Security Operations

BluBracket is the first comprehensive security solution that makes code safe—so developers can innovate and collaborate, and security teams can sleep at night. BluBracket is the first enterprise secu

4.7(2)
Cybercory

Cybercory

United Arab Emirates flag

Data Protection

Cybercory is a cybersecurity magazine and media outlet that publishes news, analysis, and features on cybersecurity topics worldwide. It operates as a digital publication with regional coverage includ

4.7(2)
HaystackID

HaystackID

United States flag

Digital Forensics and Incident Response

HaystackID provides industry-leading computer forensics, eDiscovery, and attorney document review experts to help corporations and law firms find, understand and learn from data when facing complex, d

4.7(2)
COcyber

COcyber

Belgium flag

Security Operations

The Coordination between the Cybersecurity Civilian and Defense Spheres (COcyber) project is an ambitious two-year initiative designed to enhance the exchange, coordination, and collaboration between

4.7(2)
Cipher xMDR

Cipher xMDR

language

Threat Hunting

Cipher xMDR on SecurityListing: AI-driven MDR service providing unified threat detection across IT, OT, cloud

4.7(2)
Arsenal Insurance Company

Arsenal Insurance Company

Russia flag

Security Operations

Arsenal is an insurance provider based in Moscow, Russia. Services offered include Cyber Risk insurance. Arsenal offers a wide range of unique insurance programs covering cyber risks, taking into acc

4.7(2)
CloudScale365

CloudScale365

United States flag

Backup as a Service

CloudScale365 offers state-of-the-art managed IT services and cloud, hosting, security, and business continuity solutions. As an extension of your IT team, we work hand-in-hand to plan, migrate, depl

4.7(2)
WeVerify

WeVerify

UN flag

Security Operations

WeVerify’s aim is to address the advanced content verification challenges through a participatory verification approach, open source algorithms, low-overhead human-in-the-loop machine learning and int

4.7(2)
BUI

BUI

South Africa flag

Cloud Security

BUI is a global technology consultancy and Cloud Solution Provider specialising in cloud, security, and networking solutions for mid-market and enterprise-level business organisations across the world

4.7(2)
Critical Infrastructures for Information and Cybersecurity (ICIC)

Critical Infrastructures for

Argentina flag

Security Operations

The Critical Infrastructures for Information and Cybersecurity ((ICIC) program is aimed at addressing the demand for cybersecurity to the National Public Sector, interjurisdictional organizations and

4.7(2)
Validia

Validia

United States flag

Security Operations

Validia is a deepfake cybersecurity service that provides proactive and reactive defense to the deepfake threat enterprises increasingly face with the rapid growth of generative artificial intelligenc

4.7(2)
CLUSIL

CLUSIL

LU flag

Security Operations

CLUSIL is an association for the information security industry in Luxembourg providing awareness, training, professional development and a forum for the exchange of information in information security

4.7(2)
Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite

Cobalt Strike HTTP

language

Offensive Security

Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite on SecurityListing: Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.

4.7(2)
Code Dx

Code Dx

United States flag

Security Operations

Code Dx is a software application vulnerability correlation and management system that consolidates and normalizes software vulnerabilities detected by multiple static application security testing (SA

4.7(2)
Fortress Group

Fortress Group

Netherlands flag

Security Operations

Fortress is specialized in confidential and discrete recruitment solutions and temporary staffing in the field of security and risk management. 1. IT Security: IT Security Managers, Ethical Hackers,

4.7(2)
Showing 241 to 260 of 2606 products