Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

GulfTalent

GulfTalent

United Arab Emirates flag

Security Operations

GulfTalent is the leading job site for professionals in the Middle East and Gulf region covering all sectors and job categories, including cybersecurity. GulfTalent is the leading online recruitment

4.7(2)
HaystackID

HaystackID

United States flag

Digital Forensics and Incident Response

HaystackID provides industry-leading computer forensics, eDiscovery, and attorney document review experts to help corporations and law firms find, understand and learn from data when facing complex, d

4.7(2)
CyberForce Global

CyberForce Global

United Kingdom flag

Security Operations

CyberForce Global are at the forefront of start-up technology recruitment in areas including cybersecurity, IT infrastructure, software, fintech, blockchain and more. CyberForce global are committed

4.7(2)
Apex

Apex

Israel flag

Security Operations

We are building Apex to empower you to securely drive your organisation towards AI adoption. We aspire to make the AI revolution run faster, securely, for the benefit of all. We are purposely built f

4.7(2)
Calamu

Calamu

United States flag

Data Loss Prevention

Calamu is a software-defined storage security and resiliency platform that keeps your data secure and accessible wherever you choose to store it. Calamu Protect fragments data across multiple separat

4.7(2)
C11 Cyber Security & Digital Innovation Centre

C11 Cyber Security

United Kingdom flag

Security Operations

4.5(3)
Axiomtek

Axiomtek

Taiwan flag

Industrial Control System Security

Axiomtek is a leading design and manufacturing company in the industrial computer and embedded field.

4.5(3)
Analygence

Analygence

United States flag

Compliance Consulting

ANALYGENCE is the trusted partner for mission support, cyber solutions, and management services. Our services include a broad range of analytics, strategy development and implementation, and mission o

4.5(3)
CBIT Digital Forensics Services (CDFS)

CBIT Digital Forensics

Australia flag

Digital Forensics and Incident Response

4.5(3)
ASU Online - Information Technology Program

ASU Online -

United States flag

Security Awareness Training

With ASU Online, the information technology graduate can design and create effective solutions to today’s knowledge-based problems. Graduates have the ability to: create network architectures within a

4.5(3)
CodeLock

CodeLock

United States flag

Security Operations

Codelock is a patent-pending solution that continuously provides software security at the code level, while providing advanced management insights with performance metrics and data analytics. Codeloc

4.5(3)
Across Verticals

Across Verticals

MY flag

Compliance Consulting

Across Verticals is a boutique cyber security consulting firm that specializes in holistic, deeply technical and end to end cyber security advisory services based on industry best practices. Our core

4.5(3)
Axis Capital

Axis Capital

Belgium flag

Security Operations

AXIS Insurance’s Professional Lines Division is a leading underwriter of technology/cyber coverage and other specialty products around the globe. Our AXIS TechPlus policy addresses liability exposure

4.5(3)
Antiy Labs

Antiy Labs

China flag

Threat Intelligence Platforms

Antiy Labs is a vender of antivirus engine and solution, providing the best-in-breed antivirus engine and next generation antivirus services for confronting PC malware and mobile malware.

4.5(3)
BlueID

BlueID

Germany flag

Industrial Control System Security

BlueID is an IDaaS technology product which enables your objects to securely connect and interact with your users’ smart phones and smart watches. We created BlueID because we realise the importance

4.5(3)
SpoofGuard

SpoofGuard

Switzerland flag

Brand Protection

Spoofguard shields organizations from online scams, automating the entire process from domain monitoring to takedown enforcement. Domain monitoring is crucial in protecting brands against threats lik

4.5(3)
Darkstrike / Qeros

Darkstrike / Qeros

United States flag

Data Loss Prevention

Protect against quantum & ransomware threats. Proactive data security with Q™ — the world’s most advanced unconditionally secure data platform to protect and empower your data. Complete your defense

4.5(3)
AMR CyberSecurity

AMR CyberSecurity

United Kingdom flag

Compliance Consulting

AMR CyberSecurity delivers next generation cyber security services to assist organisations across a wide variety of sectors in understanding potential threats and effectively countering them. We also

4.5(3)
3Lines Venture Capital

3Lines Venture Capital

United States flag

Security Operations

3Lines Venture Capital invests in exceptional founders and startups working on broad disruptive themes of Future of Work, AI enabled enterprises, and Industry 4.0. The confluence and exponential growt

4.5(3)
Allure Security

Allure Security

United States flag

Brand Protection

Allure Security online brand protection-as-a-service uses AI to automate the examination of more of the online world - scanning millions of assets daily including domains, social media posts, and mobi

4.5(3)
Showing 261 to 280 of 2606 products