Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

BSI Group

Compliance Consulting
BSI is the business standards company that equips businesses with the necessary solutions to turn standards of best practice into habits of excellence. BSI facilitates business improvement across the

Zerto

Backup as a Service
Zerto provides enterprise-class disaster recovery and business continuity software specifically for virtualized data centers and cloud environments. Purpose-built for virtualized and cloud environmen

Inter-American Cooperation Portal

Security Operations
The Inter-American Cooperation Portal on Cyber-Crime was created primarily to facilitate and streamline cooperation and information exchange among government experts from OAS member states with respo

C3.ai Digital Transformation

Security Operations
The C3.ai Digital Transformation Institute is a research consortium dedicated to accelerating the benefits of artificial intelligence for business, government, and society. The Institute engages the w

cabextract
Digital Forensics and Incident Response
cabextract on SecurityListing: Free software for extracting Microsoft cabinet files, supporting all features and formats of Microsoft cabinet files and Windows CE installation files.

British Security Industry

Security Operations
The Cyber Security Product Assurance Group (CySPAG) is a special interest group within the British Security Industry Association (BSIA). The group is focused on reducing the risk of product related cy

CalypsoAI

Security Operations
CalypsoAI build software products that solve complex AI risks for national security and highly-regulated industries. As AI expands into mission critical systems, there remain capability gaps in the a

Cambridge Cybercrime Centre

Security Operations
The Cambridge Cybercrime Centre is a multi-disciplinary initiative combining expertise from the University of Cambridge's Department of Computer Science and Technology, Institute of Criminology and Fa

Proton Data Security

Security Operations
Proton Data Security is a certified small business specializing in the design, manufacturing and sales of data security products for permanent erasure of hard drives, tapes and optical media. Our prod

Black Cell

Cloud Security
Black Cell is a cybersecurity firm focused on protecting critical infrastructures in the Middle East, offering offensive security, cloud security, compliance, and integrated security services. The com

Canopius Group

Security Operations
Canopius is a global specialty lines insurance and reinsurance company and one of the top 10 insurers in the Lloyd’s insurance market. We insure businesses across the spectrum, in respect of their cy

Ophcrack
Offensive Security
Ophcrack on SecurityListing: Ophcrack is a free Windows password cracker based on rainbow tables with various features for password recovery.

CANVAS Consortium

Security Operations
The CANVAS Consortium – Constructing an Alliance for Value-driven Cybersecurity – aims to unify technology developers with legal and ethical scholar and social scientists to approach the challenge how

Carson McDowell

Security Operations
Carson McDowell are one of Northern Ireland's leading law firms. We are the law firm of choice for many of Northern Ireland's Top 100 companies as well as international companies doing business here.

Caveonix

Cloud Security
Caveonix’s RiskForesight TM solution is an automated, proactive risk and compliance platform designed for hybrid and multi-cloud. It implements CSPM capabilities in addition to including built-in inte

Brightsolid

Cloud Security
Brightsolid are experts in Hybrid Cloud. Our consultancy services help customers make the right decisions at every stage of their cloud journey. We design, build and manage secure, scalable cloud envi

Bluerydge

Cloud Security
Bluerydge specialises in cyber security and technology, focusing on the delivery of innovative sovereign solutions through trusted, cleared and experienced professionals. We exist to disrupt the curre

Celare

Threat Intelligence Platforms
Celare delivers DPI based network perimeter monitoring solutions with integrated Big Data security analytics and threat detection, helping security professionals to better visibility of their networks

Celebrus

Security Operations
D4t4 Solutions is focused on helping companies get the best possible value from all their data assets. We intend to lead digital disruption by powering artificial intelligence, machine learning, advan

Capy

Security Operations
Capy's SaaS-based security solutions will protect your website from bots, spam, humans and more. Our security lineup includes: Puzzle & Avatar CAPTCHA, Realtime IP Blacklist, & Riskbase Authentication