Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

HoneyDrive
Security Operations
HoneyDrive on SecurityListing: HoneyDrive is the premier honeypot Linux distro with over 10 pre-installed honeypot software packages and numerous analysis tools.

MaskTech

Security Operations
Masktech is an independent supplier for highest security embedded chipsets, operating systems and related middleware for electronic identification cards, travel documents and authentication solutions.

Capy

Security Operations
Capy's SaaS-based security solutions will protect your website from bots, spam, humans and more. Our security lineup includes: Puzzle & Avatar CAPTCHA, Realtime IP Blacklist, & Riskbase Authentication

Averon

Security Operations
Averon is on a mission to restore sanity in online identity. Our conversion-increasing innovations instantly authenticate mobile users, creating a world where we can all move safely and efficiently ar

Aeries Technology

Compliance Consulting
Aeries is a technology services organization offering capabilities in Technology Services, Digital Transformation, and Business Process Management. Our specialized offshore outsourcing capabilities w

Fabric Platform by
Security Information and Event Management
Fabric Platform by BlackStork on SecurityListing: Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.

AEI Cybersecurity

Security Operations
The Spanish Cybersecurity Innovation Cluster (AEI Ciberseguridad y Tecnologías Avanzadas) brings together companies, Research Centres, Universities, public and other private organizations interested

HUB Security

Security Operations

Aembit

Security Operations
Aembit is the Identity Platform that lets DevOps and Security manage, enforce, and audit access between federated workloads. Aembit provides seamless and secure access from your workloads to the serv

Attic MDR
Threat Hunting
Attic MDR on SecurityListing: 24/7 managed detection and response service for Microsoft 365 environments

Available Infrastructure

Industrial Control System Security
As the digital and physical worlds merge, decision-making without AI support puts you at a disadvantage, whether against a nation-state adversary, criminal threat, or competitor. And AI without robust

RecordPoint

Governance Risk and Compliance Platforms
RecordPoint is a unified data and AI governance platform. Understand your data. Simplify data management. Reduce data risk. RecordPoint brings calm to the chaotic world of data, letting organizations

Automation & Cyber

Industrial Control System Security
Automation & Cyber Solutions (ACS) delivers a range of Industrial Automation and Cyber solutions & services to sectors including Oil & Gas, Chemicals & Petrochemicals, Water Treatment, Power and other

Logpoint Director
Security Information and Event Management
Logpoint Director on SecurityListing: A centralized management console for efficiently operating and monitoring large-scale, multitenant Logpoint SIEM deployments across customers, geographies, and organizational divisions.

Aegis Security

Penetration Testing
Based in Singapore, Aegis Security is a digital security company that works with the local government and private companies. Our mission is to support our clients, and secure their systems against po

Incident Response with
Threat Hunting
Incident Response with Threat Intelligence on SecurityListing: A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.

ThreatConnect Polarity
Threat Hunting
ThreatConnect Polarity on SecurityListing: Overlay tool providing real-time threat intel & context across security tools

Reversing and Exploiting
Offensive Security
Reversing and Exploiting ARM Binaries: rwthCTF Trafman on SecurityListing: A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.

Inveo Group

Governance Risk and Compliance Platforms
Inveo group is the Italian leader for the management of privacy and data protection issues. Through one to one assessments we provide customized solutions that fit the compliance and security needs of

Aunalytics

Managed Security Service Providers
Aunalytics is a data platform company that delivers insights as a service to answer your most important IT and business questions. Turn data into answers with the secure, reliable, and scalable data p