Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

TrustNXT

TrustNXT

Germany flag

Security Operations

TrustNXT provides innovative software solutions to safeguard digital photos and videos from manipulation. We are dedicated to being the catalyst for digital truth, empowering organizations and indivi

4.5(1)
Irregular

Irregular

UN flag

Security Operations

Irregular (formerly Pattern Labs) is the first frontier security lab, building defenses that uncover vulnerabilities and secure advanced AI before release. We build next-generation defenses through h

4.5(1)
WitnessAI

WitnessAI

United States flag

Security Operations

WitnessAI is the confidence layer for enterprise AI, providing the unified platform enterprises trust to observe, control, and protect all AI activity.

4.5(1)
Graphus

Graphus

United States flag

Threat Intelligence Platforms

Graphus provides a simple, powerful, automated solution that eliminates 99% of social engineering and spear phishing attacks against G Suite business Gmail users with no intervention necessary from IT

4.5(1)
Gravwell Security Data Platform

Gravwell Security Data

language

Threat Hunting

Gravwell Security Data Platform on SecurityListing: Security data platform for log analysis, metrics, and threat hunting

4.5(1)
VU Security

VU Security

Argentina flag

Security Operations

4.5(1)
Harness AI for DevOps

Harness AI for

language

Security Orchestration Automation and Response

Harness AI for DevOps on SecurityListing: AI-powered DevOps platform for CI/CD, testing, security, and cost mgmt.

4.5(1)
Haystax Technology

Haystax Technology

United States flag

Threat Intelligence Platforms

Haystax security analytics platform applies artificial intelligence techniques to reason like a team of analysts and prioritizes risks in real time at scale for more efficient protection of critical a

4.5(1)
StrangeBee Cortex

StrangeBee Cortex

language

Security Orchestration Automation and Response

StrangeBee Cortex on SecurityListing: Open-source observable analysis engine and companion tool for TheHive platform

4.5(1)
DFIR CTF: Precision Widgets of North Dakota Intrusion

DFIR CTF: Precision

language

Cyber Range Training

DFIR CTF: Precision Widgets of North Dakota Intrusion on SecurityListing: A cybersecurity challenge where you play the role of an incident response consultant investigating an intrusion at Precision Widgets of North Dakota.

4.5(1)
Heights Consulting Group

Heights Consulting Group

United States flag

Compliance Consulting

Heights Consulting Group is a cybersecurity consulting firm specializing in strategic guidance, risk governance, and regulatory readiness. Heights Consulting Group exists to empower executive leaders

4.5(1)
Covert Red Team Attack Infrastructure

Covert Red Team

language

Offensive Security

Covert Red Team Attack Infrastructure on SecurityListing: Back-end component for red team operations with crucial design considerations.

4.5(1)
How to Write Malleable C2 Profiles for Cobalt Strike

How to Write

language

Offensive Security

How to Write Malleable C2 Profiles for Cobalt Strike on SecurityListing: Learn how to create new Malleable C2 profiles for Cobalt Strike to avoid detection and signatured toolset

4.5(1)
CrowdStrike Falcon Onum

CrowdStrike Falcon Onum

language

Security Information and Event Management

CrowdStrike Falcon Onum on SecurityListing: Data pipeline mgmt for SOC transformation with real-time data processing

4.5(1)
Hummingbird International

Hummingbird International

United States flag

Security Operations

Hummingbird International, LLC offers top quality e-waste management solutions to businesses, corporate groups, commercial entities and the residential sector. With over a decade of experience in the

4.5(1)
Hunters Pathfinder AI

Hunters Pathfinder AI

language

Threat Hunting

Hunters Pathfinder AI on SecurityListing: AI-driven SOC platform with autonomous threat detection, investigation & response

4.5(1)
LUCY Security

LUCY Security

Switzerland flag

Security Awareness Training

LUCY is the answer when you want to increase your IT security, maintain your cyber security awareness, or test your IT defenses.

4.5(1)
Anxinsec

Anxinsec

United Arab Emirates flag

Services

Anxinsec is a company that provides information security services, specializing in advanced threat protection, memory detection and protection, security operations center, and mobile device management

4.5(1)
Future Data Me

Future Data Me

United Arab Emirates flag

Data Protection

Future Data Me appears to be a cybersecurity-focused company offering data security and cyber security expertise, with services spanning security and digital marketing as part of its offerings. The ho

4.5(1)
Engage Black

Engage Black

United States flag

Data Loss Prevention

Engage Black is the Security Business Unit of Engage Communication Inc. and focuses on providing advanced cryptographic products. In particular, solutions that secure and protect cryptographic keys, d

4.5(1)
Showing 1321 to 1340 of 2606 products