Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Assurestor

Assurestor

United Kingdom flag

Backup as a Service

Assurestor's singular focus is delivering leading cloud-based backup and disaster recovery designed to increase levels of IT resilience. Total protection and data recovery is our goal, every single t

4.5(1)
InfoSecurity Magazine

InfoSecurity Magazine

United Kingdom flag

Security Operations

Infosecurity Magazine has over ten years of experience providing knowledge and insight into the information security industry. Its multiple award winning editorial content provides compelling features

4.5(1)
CFC Underwriting

CFC Underwriting

United Kingdom flag

Security Operations

With a track record of disrupting inefficient insurance markets, we use proprietary technology to deliver high-quality products to market faster than the competition while making it easier for brokers

4.5(1)
S2T

S2T

United Kingdom flag

Threat Intelligence Platforms

S2T builds cyber intelligence solutions based on deep expertise in diverse domains such as intelligence, machine learning and AI, big data processing, statistics, linguistics, and web application deve

4.5(1)
Belkasoft

Belkasoft

United States flag

Digital Forensics and Incident Response

Belkasoft is a software vendor providing public agencies, corporate security teams, and private investigators with digital forensic solutions. Its chief product is Belkasoft Evidence Center with allow

4.5(1)
Clover Security

Clover Security

Israel flag

Security Operations

Clover Security delivers design-led product security, using AI agents to embed security into the earliest stages of software development, replicating the thinking of experienced security architects to

4.5(1)
FileWave

FileWave

Switzerland flag

Security Operations

FileWave offers a single solution for managing apps, devices, and more for Mac, Windows, and mobile devices. FileWave offers complete client management capabilities for both macOS and Windows compute

4.5(1)
ACI Learning

ACI Learning

United States flag

Security Awareness Training

ACI Learning - Training tomorrow’s industry leaders with formats for all types of learners in Audit, Cybersecurity, and IT. At ACI Learning, we train leaders in Cybersecurity, Audit, and Information

4.5(1)
Certihash

Certihash

United States flag

Security Operations

Certihash have developed the world’s first blockchain empowered suite of information security tools based on the NIST cybersecurity framework. The capabilities of blockchain, such as transparency, im

4.5(1)
PhishProtection

PhishProtection

United States flag

Security Operations

We created Phish Protection to prevent all types of phishing including spear phishing protection and office 365 email protection for your small business. Protect your business from phishing, imperson

4.5(1)
Uptime Institute

Uptime Institute

United States flag

Security Operations

Uptime Institute is an unbiased advisory organization focused on improving the performance, efficiency, and reliability of business critical infrastructure through innovation, collaboration, and indep

4.5(1)
DoSarrest Internet Security Ltd

DoSarrest Internet Security

Canada flag

Security Operations

DOSarrest is a fully managed security firm specializing in cloud based DDoS protection services to a worldwide client base. DOSarrest is the result of ten years of research, experimentation and mitig

4.5(1)
K2 Cyber Security

K2 Cyber Security

United States flag

Threat Intelligence Platforms

K2 Cyber Security delivers the Next Generation Application Workload Protection Platform to secure web applications and container workloads against sophisticated attacks including OWASP Top 10 and memo

4.5(1)
Bangladesh Computer Council (BCC)

Bangladesh Computer Council

BD flag

Security Operations

Bangladesh Computer Council (BCC) is a government body providing support for ICT related activities, formulating national ICT strategy and policy, creating standards and specifications of ICT tools fo

4.5(1)
Cybraics

Cybraics

United States flag

Threat Intelligence Platforms

Cybraics nLighten platform implements a unique and sophisticated artificial intelligence engine that rapidly learns your environment and alerts security teams to threats and vulnerabilities across the

4.5(1)
Lakera

Lakera

Switzerland flag

Security Operations

Lakera was founded to empower developers and organizations to build and operate AI systems that are secure and safe. We are leading and accelerating secure AI adoption. Secure LLMs in minutesAdd one

4.5(1)
Appsec Phoenix

Appsec Phoenix

United Kingdom flag

Security Operations

Appsec Phoenix is an end to end vulnerability management platform that focuses on workflows, threat feed, and real time data. AppSec Phoenix platform integrates with security vulnerability scanners t

4.5(1)
Council of European Professional Informatics Societies (CEPIS)

Council of European

Belgium flag

Security Operations

The Council of European Professional Informatics Societies (CEPIS) is the representative body of national informatics associations throughout greater Europe. Established in 1989 by 9 European informat

4.5(1)
XpertDPO

XpertDPO

Ireland flag

Governance Risk and Compliance Platforms

XpertDPO provides data security, governance, risk and compliance, GDPR and ISO consultancy to public and private sector organisations. We help change our clients relationship with the data they proce

4.5(1)
DEKRA

DEKRA

United Kingdom flag

Penetration Testing

DEKRA’s promise is to ensure the safety of human interaction with technology and the environment. Protecting people, assets and communities is at the core of what we do helping a variety of clients in

4.5(1)
Showing 701 to 720 of 2606 products