Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Zeneth Technology Partners

Zeneth Technology Partners

United States flag

Compliance Consulting

Zeneth is a consulting firm providing information technology and cybersecurity services to federal and commercial clients.

4.5(1)
CyPhyCon

CyPhyCon

Canada flag

Industrial Control System Security

CyPhyCon (Cyber-Physical Systems Security Conference) is an annual event exploring threats and solutions to cyber-kinetic attacks – cyber attacks on cyber-physical systems such as industrial control s

4.5(1)
Cohesity

Cohesity

United States flag

Backup as a Service

Cohesity redefines data management to solve mass data fragmentation. Cohesity lowers TCO and radically simplifies the way businesses back up, manage, protect, and extract value from their data—in the

4.5(1)
Authomize

Authomize

Israel flag

Security Operations

Authomize aggregates identities and authorization mechanisms from any applications around your hybrid environment into one unified platform so you can easily and rapidly manage and secure all users, s

4.5(1)
Collins Aerospace

Collins Aerospace

United States flag

Managed Security Service Providers

Collins Aerospace has the unique ability to leverage technologies across different industries. Our exploration and ingenuity stretches beyond the boundaries of aerospace and defense to provide solutio

4.5(1)
Inception Cyber

Inception Cyber

United States flag

Threat Intelligence Platforms

Inception Cyber, the inventors of intent-based security, is leading the next generation of threat prevention for an increasingly AI-driven world. Our patent-pending Neural Analysis and Correlation En

4.5(1)
Aspiron Search

Aspiron Search

United States flag

Security Operations

Aspiron Search is a niche-focused Cybersecurity search firm that works exclusively with venture-backed Cybersecurity firms. Using our robust search methodology and established network, we work to attr

4.5(1)
Boxcryptor

Boxcryptor

Germany flag

Data Loss Prevention

Boxcryptor encrypts your sensitive files before uploading them to cloud storage services. Boxcryptor encrypts your data on your device before it is synchronized to the cloud. Thereby, the highest pos

4.5(1)
Catalogic Software

Catalogic Software

United States flag

Backup as a Service

Catalogic DPX, The Smart Choice in Data ProtectionReliable, rapid, and low-cost backup and recovery. Protect and recover your data from human errors, disasters, and ransomware attacks. Fast recovery-i

4.5(1)
Interpres Security

Interpres Security

United States flag

Security Operations

Interpres Security operationalizes TTP-based threat intelligence and automates continuous exposure monitoring to help CISOs and security practitioners reduce threat exposure. The Interpres Threat Exp

4.5(1)
Trail of Bits

Trail of Bits

United States flag

Security Operations

Trail of Bits combine high-end security research with a real-world attacker mentality to reduce risk and fortify code. We don’t just fix bugs, we fix software. When our research into the depths of cod

4.5(1)
Noetic Cyber

Noetic Cyber

United States flag

Governance Risk and Compliance Platforms

Noetic provides a proactive approach to cyber asset and controls management, empowering security teams to see, understand, and optimize their cybersecurity posture. Noetic breaks the cycle of dispara

4.5(1)
Atlantic Security Conference (AtlSecCon)

Atlantic Security Conference

Canada flag

Security Operations

The Atlantic Security Conference (AtlSecCon) is a non-profit, annual, information security conference located in Halifax, Nova Scotia, Canada. Established in 2011, our goal is to provide quality infor

4.5(1)
Huntsman Security

Huntsman Security

Australia flag

Governance Risk and Compliance Platforms

Huntsman Security is the operating name of Tier-3 Pty Ltd, a privately owned Australian cyber security developer. We have offices in Sydney, Canberra and London with operations in Tokyo and the Philip

4.5(1)
Blake, Cassels & Graydon (Blakes)

Blake, Cassels &

Canada flag

Security Operations

Blakes is one of Canada’s top business law firms serving national and international clients in specialist areas including cyber security. The Blakes Cybersecurity group is a multidisciplinary team of

4.5(1)
SHASAI

SHASAI

Belgium flag

Security Operations

SHASAI is an EU funded project focused on improving the security, resilience, and trustworthiness of AI-based and high-risk systems across hardware and software. It addresses vulnerabilities across t

4.5(1)
EasyDMARC

EasyDMARC

United States flag

Security Operations

EasyDMARC is building the world's largest DMARC ecosystem. We are committed to ensuring businesses' security in cyberspace. Our solution prevents companies from data leakage, protects them from financ

4.5(1)
Federal Bureau of Investigation (FBI) - USA

Federal Bureau of

United States flag

Security Operations

The mission of the FBI is to protect and defend against intelligence threats, uphold and enforce criminal laws, and provide criminal justice services. Our priority is to help protect you, your childr

4.5(1)
BaaSid

BaaSid

Singapore flag

Data Loss Prevention

BaaSid is next generation security technology for data security & security authentication based on De-centralized & Blockchain. BaaSid’s technology splits all kinds of data and stores only fragments

4.5(1)
Databarracks

Databarracks

United Kingdom flag

Backup as a Service

Databarracks deliver award winning IT resilience and continuity services. We help organisations get the most out of the cloud and protect their data, wherever it lives. Databarracks keeps you operati

4.5(1)
Showing 821 to 840 of 2606 products