Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Astran

Data Loss Prevention
At Astran, we revolutionize data security by introducing a groundbreaking solution for data confidentiality headaches. Say goodbye to the struggle of safeguarding data with traditional encryption keys

Assystem

Industrial Control System Security
Assystem is a French engineering company specialised in managing complex projects. Assystem operates in the sectors of nuclear, conventional energy, transportation, life sciences, health and industry.

1Kosmos

Security Operations
1Kosmos provide Digital Identity and Passwordless Authentication for workforce and customers. Powered by advanced biometrics and blockchain technology. 1Kosmos is the world’s only cybersecurity solut

FEX Imager™
Digital Forensics and Incident Response
FEX Imager™ on SecurityListing: Forensic imaging program with full hash authentication and various acquisition options.

Abusing the COM
Offensive Security
Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32 on SecurityListing: Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32

Guide to Ethical
Offensive Security
Guide to Ethical Hacking on SecurityListing: A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.

Cybertekpro

Security Operations
Cybertekpro is a specialist insurance broker providing Cyber Liability insurance and cyber risk assessment services. Our aim is to help our clients understand the risks they face from cyber-crime and

GoPlus Security

Security Operations
GoPlus is working as the "security infrastructure" for web3, by providing open, permissionless, user-driven Security Services. GoPlus security engine covers Multi-chain with Multidimensional risk dete

ICS Cyber Security

Industrial Control System Security
SecurityWeek’s Industrial Control Systems (ICS) Cyber Security Conference is the largest and longest-running event series focused on industrial cybersecurity. Our events address the myriad cyber thre

Abu Dhabi Gov

Security Operations
Gov Digital (formerly Abu Dhabi Digital Authority - ADDA) enable, support and deliver a digital government that is proactive, personalised, collaborative and secure. We enable government-wide digital

Enterprise Detection &
Threat Hunting
Enterprise Detection & Response: A Simple Hunting Maturity Model on SecurityListing: A simple maturity model for enterprise detection and response

Advens

Compliance Consulting
Advens is a company specializing in information security management. We provide Consultancy, Security Audits and Technology Solutions. For more than ten years, we have been helping organizations, pub

Verve Industrial

Industrial Control System Security
Verve specialize in providing software and services to help protect and secure critical industrial control systems.

Assac Networks

Security Operations
Assac Networks ShieldIT is an app that completely protects any BYOD smartphone from both tapping and hacking. ShieldiT is a complete anti-hacking anti-tapping solution which encapsulates various tact

InfoSight

Compliance Consulting
InfoSight offers proven Cyber Security, Regulatory Compliance, Risk Management and Infrastructure Solutions to protect your business and your customers from cyber crime and fraud. We are a Cyber Secu

Asoftnet

Compliance Consulting
Asoftnet are specialists in IT security, IT forensics, IT service, websites, applications and mobile solutions. From consulting to concept development to procurement and installation as well as the s

Advantus360

Cloud Security
Advantus360 is an IT Security solutions organization focused on safeguarding our client’s enterprise and virtual presence. We advise, design and deploy best of breed IT Security technology and profess
Detecting Lateral Movement
Digital Forensics and Incident Response
Detecting Lateral Movement through Tracking Event Logs (Version 2) on SecurityListing: A report on detecting lateral movement through tracking event logs, updated to include analysis of various tools and commands used by attackers.

ImmuneBytes

Security Operations
ImmuneBytes is a cutting-edge security startup that aims to provide a secure blockchain environment for a dependable and open Web3 ecosystem. Starting our voyage in the middle of the 2020s, we aim to

Asimily

Industrial Control System Security
Asimily’s IoMT risk remediation platform holistically secures the mission-critical healthcare devices that deliver safe and reliable care. Risk assessment – and threats – aren’t a static target. But