Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

TrustNXT

Security Operations
TrustNXT provides innovative software solutions to safeguard digital photos and videos from manipulation. We are dedicated to being the catalyst for digital truth, empowering organizations and indivi

Irregular

Security Operations
Irregular (formerly Pattern Labs) is the first frontier security lab, building defenses that uncover vulnerabilities and secure advanced AI before release. We build next-generation defenses through h

WitnessAI

Security Operations
WitnessAI is the confidence layer for enterprise AI, providing the unified platform enterprises trust to observe, control, and protect all AI activity.

Graphus

Threat Intelligence Platforms
Graphus provides a simple, powerful, automated solution that eliminates 99% of social engineering and spear phishing attacks against G Suite business Gmail users with no intervention necessary from IT

Gravwell Security Data
Threat Hunting
Gravwell Security Data Platform on SecurityListing: Security data platform for log analysis, metrics, and threat hunting

VU Security

Security Operations

Harness AI for
Security Orchestration Automation and Response
Harness AI for DevOps on SecurityListing: AI-powered DevOps platform for CI/CD, testing, security, and cost mgmt.

Haystax Technology

Threat Intelligence Platforms
Haystax security analytics platform applies artificial intelligence techniques to reason like a team of analysts and prioritizes risks in real time at scale for more efficient protection of critical a

StrangeBee Cortex
Security Orchestration Automation and Response
StrangeBee Cortex on SecurityListing: Open-source observable analysis engine and companion tool for TheHive platform

DFIR CTF: Precision
Cyber Range Training
DFIR CTF: Precision Widgets of North Dakota Intrusion on SecurityListing: A cybersecurity challenge where you play the role of an incident response consultant investigating an intrusion at Precision Widgets of North Dakota.

Heights Consulting Group

Compliance Consulting
Heights Consulting Group is a cybersecurity consulting firm specializing in strategic guidance, risk governance, and regulatory readiness. Heights Consulting Group exists to empower executive leaders

Covert Red Team
Offensive Security
Covert Red Team Attack Infrastructure on SecurityListing: Back-end component for red team operations with crucial design considerations.

How to Write
Offensive Security
How to Write Malleable C2 Profiles for Cobalt Strike on SecurityListing: Learn how to create new Malleable C2 profiles for Cobalt Strike to avoid detection and signatured toolset

CrowdStrike Falcon Onum
Security Information and Event Management
CrowdStrike Falcon Onum on SecurityListing: Data pipeline mgmt for SOC transformation with real-time data processing

Hummingbird International

Security Operations
Hummingbird International, LLC offers top quality e-waste management solutions to businesses, corporate groups, commercial entities and the residential sector. With over a decade of experience in the

Hunters Pathfinder AI
Threat Hunting
Hunters Pathfinder AI on SecurityListing: AI-driven SOC platform with autonomous threat detection, investigation & response

LUCY Security

Security Awareness Training
LUCY is the answer when you want to increase your IT security, maintain your cyber security awareness, or test your IT defenses.

Anxinsec

Services
Anxinsec is a company that provides information security services, specializing in advanced threat protection, memory detection and protection, security operations center, and mobile device management

Future Data Me

Data Protection
Future Data Me appears to be a cybersecurity-focused company offering data security and cyber security expertise, with services spanning security and digital marketing as part of its offerings. The ho

Engage Black

Data Loss Prevention
Engage Black is the Security Business Unit of Engage Communication Inc. and focuses on providing advanced cryptographic products. In particular, solutions that secure and protect cryptographic keys, d