Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Assurestor

Backup as a Service
Assurestor's singular focus is delivering leading cloud-based backup and disaster recovery designed to increase levels of IT resilience. Total protection and data recovery is our goal, every single t

InfoSecurity Magazine

Security Operations
Infosecurity Magazine has over ten years of experience providing knowledge and insight into the information security industry. Its multiple award winning editorial content provides compelling features

CFC Underwriting

Security Operations
With a track record of disrupting inefficient insurance markets, we use proprietary technology to deliver high-quality products to market faster than the competition while making it easier for brokers

S2T

Threat Intelligence Platforms
S2T builds cyber intelligence solutions based on deep expertise in diverse domains such as intelligence, machine learning and AI, big data processing, statistics, linguistics, and web application deve

Belkasoft

Digital Forensics and Incident Response
Belkasoft is a software vendor providing public agencies, corporate security teams, and private investigators with digital forensic solutions. Its chief product is Belkasoft Evidence Center with allow

Clover Security

Security Operations
Clover Security delivers design-led product security, using AI agents to embed security into the earliest stages of software development, replicating the thinking of experienced security architects to

FileWave

Security Operations
FileWave offers a single solution for managing apps, devices, and more for Mac, Windows, and mobile devices. FileWave offers complete client management capabilities for both macOS and Windows compute

ACI Learning

Security Awareness Training
ACI Learning - Training tomorrow’s industry leaders with formats for all types of learners in Audit, Cybersecurity, and IT. At ACI Learning, we train leaders in Cybersecurity, Audit, and Information

Certihash

Security Operations
Certihash have developed the world’s first blockchain empowered suite of information security tools based on the NIST cybersecurity framework. The capabilities of blockchain, such as transparency, im

PhishProtection

Security Operations
We created Phish Protection to prevent all types of phishing including spear phishing protection and office 365 email protection for your small business. Protect your business from phishing, imperson

Uptime Institute

Security Operations
Uptime Institute is an unbiased advisory organization focused on improving the performance, efficiency, and reliability of business critical infrastructure through innovation, collaboration, and indep

DoSarrest Internet Security

Security Operations
DOSarrest is a fully managed security firm specializing in cloud based DDoS protection services to a worldwide client base. DOSarrest is the result of ten years of research, experimentation and mitig

K2 Cyber Security

Threat Intelligence Platforms
K2 Cyber Security delivers the Next Generation Application Workload Protection Platform to secure web applications and container workloads against sophisticated attacks including OWASP Top 10 and memo

Bangladesh Computer Council

Security Operations
Bangladesh Computer Council (BCC) is a government body providing support for ICT related activities, formulating national ICT strategy and policy, creating standards and specifications of ICT tools fo

Cybraics

Threat Intelligence Platforms
Cybraics nLighten platform implements a unique and sophisticated artificial intelligence engine that rapidly learns your environment and alerts security teams to threats and vulnerabilities across the

Lakera

Security Operations
Lakera was founded to empower developers and organizations to build and operate AI systems that are secure and safe. We are leading and accelerating secure AI adoption. Secure LLMs in minutesAdd one

Appsec Phoenix

Security Operations
Appsec Phoenix is an end to end vulnerability management platform that focuses on workflows, threat feed, and real time data. AppSec Phoenix platform integrates with security vulnerability scanners t

Council of European

Security Operations
The Council of European Professional Informatics Societies (CEPIS) is the representative body of national informatics associations throughout greater Europe. Established in 1989 by 9 European informat

XpertDPO

Governance Risk and Compliance Platforms
XpertDPO provides data security, governance, risk and compliance, GDPR and ISO consultancy to public and private sector organisations. We help change our clients relationship with the data they proce

DEKRA

Penetration Testing
DEKRA’s promise is to ensure the safety of human interaction with technology and the environment. Protecting people, assets and communities is at the core of what we do helping a variety of clients in