Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Astran

Astran

France flag

Data Loss Prevention

At Astran, we revolutionize data security by introducing a groundbreaking solution for data confidentiality headaches. Say goodbye to the struggle of safeguarding data with traditional encryption keys

4.5(1)
Assystem

Assystem

France flag

Industrial Control System Security

Assystem is a French engineering company specialised in managing complex projects. Assystem operates in the sectors of nuclear, conventional energy, transportation, life sciences, health and industry.

4.5(1)
1Kosmos

1Kosmos

United States flag

Security Operations

1Kosmos provide Digital Identity and Passwordless Authentication for workforce and customers. Powered by advanced biometrics and blockchain technology. 1Kosmos is the world’s only cybersecurity solut

4.5(1)
FEX Imager™

FEX Imager™

language

Digital Forensics and Incident Response

FEX Imager™ on SecurityListing: Forensic imaging program with full hash authentication and various acquisition options.

4.5(1)
Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32

Abusing the COM

language

Offensive Security

Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32 on SecurityListing: Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32

4.5(1)
Guide to Ethical Hacking

Guide to Ethical

language

Offensive Security

Guide to Ethical Hacking on SecurityListing: A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.

4.5(1)
Cybertekpro

Cybertekpro

United Kingdom flag

Security Operations

Cybertekpro is a specialist insurance broker providing Cyber Liability insurance and cyber risk assessment services. Our aim is to help our clients understand the risks they face from cyber-crime and

4.5(1)
GoPlus Security

GoPlus Security

Singapore flag

Security Operations

GoPlus is working as the "security infrastructure" for web3, by providing open, permissionless, user-driven Security Services. GoPlus security engine covers Multi-chain with Multidimensional risk dete

4.5(1)
ICS Cyber Security Conference

ICS Cyber Security

United States flag

Industrial Control System Security

SecurityWeek’s Industrial Control Systems (ICS) Cyber Security Conference is the largest and longest-running event series focused on industrial cybersecurity. Our events address the myriad cyber thre

4.5(1)
Abu Dhabi Gov Digital

Abu Dhabi Gov

United Arab Emirates flag

Security Operations

Gov Digital (formerly Abu Dhabi Digital Authority - ADDA) enable, support and deliver a digital government that is proactive, personalised, collaborative and secure. We enable government-wide digital

4.5(1)
Enterprise Detection & Response: A Simple Hunting Maturity Model

Enterprise Detection &

language

Threat Hunting

Enterprise Detection & Response: A Simple Hunting Maturity Model on SecurityListing: A simple maturity model for enterprise detection and response

4.5(1)
Advens

Advens

France flag

Compliance Consulting

Advens is a company specializing in information security management. We provide Consultancy, Security Audits and Technology Solutions. For more than ten years, we have been helping organizations, pub

4.5(1)
Verve Industrial

Verve Industrial

United States flag

Industrial Control System Security

Verve specialize in providing software and services to help protect and secure critical industrial control systems.

4.5(1)
Assac Networks

Assac Networks

Israel flag

Security Operations

Assac Networks ShieldIT is an app that completely protects any BYOD smartphone from both tapping and hacking. ShieldiT is a complete anti-hacking anti-tapping solution which encapsulates various tact

4.5(1)
InfoSight

InfoSight

United States flag

Compliance Consulting

InfoSight offers proven Cyber Security, Regulatory Compliance, Risk Management and Infrastructure Solutions to protect your business and your customers from cyber crime and fraud. We are a Cyber Secu

4.5(1)
Asoftnet

Asoftnet

Germany flag

Compliance Consulting

Asoftnet are specialists in IT security, IT forensics, IT service, websites, applications and mobile solutions. From consulting to concept development to procurement and installation as well as the s

4.5(1)
Advantus360

Advantus360

Canada flag

Cloud Security

Advantus360 is an IT Security solutions organization focused on safeguarding our client’s enterprise and virtual presence. We advise, design and deploy best of breed IT Security technology and profess

4.5(1)
Detecting Lateral Movement through Tracking Event Logs (Version 2)

Detecting Lateral Movement

language

Digital Forensics and Incident Response

Detecting Lateral Movement through Tracking Event Logs (Version 2) on SecurityListing: A report on detecting lateral movement through tracking event logs, updated to include analysis of various tools and commands used by attackers.

4.5(1)
ImmuneBytes

ImmuneBytes

India flag

Security Operations

ImmuneBytes is a cutting-edge security startup that aims to provide a secure blockchain environment for a dependable and open Web3 ecosystem. Starting our voyage in the middle of the 2020s, we aim to

4.5(1)
Asimily

Asimily

United States flag

Industrial Control System Security

Asimily’s IoMT risk remediation platform holistically secures the mission-critical healthcare devices that deliver safe and reliable care. Risk assessment – and threats – aren’t a static target. But

4.5(1)
Showing 621 to 640 of 2606 products