search
Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Nameshield Group

Nameshield Group

France flag

Brand Protection

4.8(3)
Latham & Watkins LLP

Latham & Watkins

United States flag

Security Operations

Latham & Watkins is an international law firm with leading transactional, litigation and regulatory practices. Practice areas include Data Privacy, Security and Cybercrime. Our highly ranked, interdi

4.8(3)
Monkey-Spider

Monkey-Spider

language

Security Operations

Monkey-Spider on SecurityListing: A crawler-based low-interaction client honeypot for exposing website threats.

4.8(3)
TES

TES

Singapore flag

Security Operations

TES is a provider of IT Lifecycle Services, offering bespoke solutions that help customers manage the commissioning, deployment and retirement of Information Technology assets. We understand the comm

4.8(3)
Invicti Security

Invicti Security

United States flag

Security Operations

Invicti Security is an AppSec leader transforming the way web applications are secured. Dramatically reduce your risk of attacks. Get accurate, automated application security testing that scales like

4.8(3)
Crypto Quantique

Crypto Quantique

United Kingdom flag

Industrial Control System Security

Crypto Quantique are building the most secure end-to-end IoT security platform. Our quantum driven cybersecurity solution enables vertically integrated, highly secure IoT deployments based on unforgea

4.8(3)
Canary Technology Solutions (Canary IT)

Canary Technology Solutions

Australia flag

Cloud Security

A Cloud, Cyber Security, Retail Solutions and Managed IT Services provider for over 25 years, we safeguard and revolutionise business through technology and foresight. Tech is purely an enabler, that’

4.8(3)
Securosys

Securosys

Switzerland flag

Data Loss Prevention

Securosys SA is a technology company dedicated to securing data and communications. We develop, produce, and distribute hardware, software and services that protect and verify data and their transmiss

4.8(3)
CyberSec Hub - The Kosciuszko Institute

CyberSec Hub -

Poland flag

Security Operations

4.8(3)
Private Machines

Private Machines

United States flag

Security Operations

Private Machines develops unique patent-pending technology protects cloud and data center workloads. ENFORCER SRX1 is the world’s first general-purpose secure server designed to NIST FIPS 140-2 Level

4.8(3)
Bulwark Technologies

Bulwark Technologies

United Arab Emirates flag

Data Protection

Bulwark Technologies is a cybersecurity distributor focused on the Middle East, with headquarters in Dubai and regional offices in Saudi Arabia and India. The company acts as a value-added distributor

4.8(3)
Energia Ventures

Energia Ventures

Canada flag

Security Operations

Energia Ventures is a three-month intensive accelerator for entrepreneurs with an innovative business in the energy, smart grid, cleantech, and cybersecurity sectors. We provide funding, mentoring, an

4.8(3)
Detectify

Detectify

Sweden flag

Penetration Testing

Detectify is a web security service that simulates automated hacker attacks on your website, detecting critical security issues before real hackers do. Starting from an idea of a group of security-in

4.8(3)
Baffle

Baffle

United States flag

Data Loss Prevention

Baffle was founded to battle the increasing threats to enterprise assets in public and private clouds. Our team has strong backgrounds in encryption, security, cryptography, storage and enterprise inf

4.8(3)
Bluink

Bluink

Canada flag

Security Operations

Bluink specializes in identity and access management and customer identity verification, using your smartphone as a strong authenticator and secure identity store. Our mission is to empower people an

4.8(3)
BeyondTrust

BeyondTrust

United States flag

Security Operations

BeyondTrust is a worldwide leader in Privileged Access Management, offering the most seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised re

4.8(3)
Coalition for Secure AI (CoSAI)

Coalition for Secure

United States flag

Security Operations

The Coalition for Secure AI (CoSAI) is an open ecosystem of AI and security experts from industry leading organizations dedicated to sharing best practices for secure AI deployment and collaborating o

4.8(3)
Elpha Secure

Elpha Secure

United States flag

Security Operations

Elpha Secure provides a comprehensive cybersecurity solution, combining technology and insurance to protect against cyber threats. Cyber Assessment - We automatically analyze a client's security post

4.8(3)
Cyphershield

Cyphershield

UN flag

Security Operations

Cypershield is a Security and Smart Contract audit company providing professional smart contract auditing services for varied Crypto projects. We collaborate with crypto projects and startups, big an

4.8(3)
CSIR Information & Cybersecurity Research Centre

CSIR Information &

South Africa flag

Security Operations

The CSIR Information & Cybersecurity Research Centre focuses on research, development, and innovation of cyber and information security solutions and approaches to securely protect people and systems

4.8(3)
Showing 41 to 60 of 2246 products