Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Dedge Security

Security Operations

RiskIQ

Brand Protection
RiskIQ is the leader in digital threat management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence. RiskIQ allow

D3 Smart SOAR
Threat Hunting
D3 Smart SOAR on SecurityListing: SOAR platform with automated threat hunting and investigation capabilities

Adversa AI

Security Operations
Adversa is a leading company working on applied security measures for AI. Our mission is to build trust in AI and protect AI from cyber threats, privacy issues, and safety incidents. With a team of m

Constellation Cyber Consultancy

Services
Constellation Cyber Consultancy provides maritime cybersecurity services, focusing on vulnerability audits, risk assessments, and security program development for the oil, gas, and marine industries.

Crispmind

Security Operations
Crispmind creates innovative solutions to some of today’s most challenging technology problems. Crispmind holds over 50 patents, know-how’s, proprietary software registrations and other forms of inte

Mindgard

Security Operations
The Mindgard Security Copilot platform secures your Artificial Intelligence, GenAI and LLMs. Mindgard is a deep-tech company specializing in cyber security for AI. Our flagship AI security platform M

AI Spera

Threat Intelligence Platforms
AI-Driven Cyber Threat Intelligence Security. AI Spera provides real-time intelligence to empower your security competences in all aspects of the business. AI Spera, a frontrunner in cyber threat int

GrayHats

Brand Protection
GrayHats is a platform-based cybersecurity company devoted to delivering comprehensive, scalable, and proactive protection for businesses in an ever-evolving threat landscape. We implement cybersecur

Afripol

Security Operations
AFRIPOL is a technical institution of the African Union with a mandate to strengthen cooperation between the police agencies of AU member states in the prevention and fight against organized transnati

Penten

Data Loss Prevention
Penten is an Australian-based cyber security company focused on innovation in secure mobility and applied AI (artificial intelligence). Our mission is to deliver new defence and security technologies

OpSec Security

Brand Protection
OpSec protects your entire brand continuum, covering every facet of your product’s life cycle. From conception through consumers, both online and offline, we provide you with valuable insight to prote

Cryptoloc

Data Loss Prevention

Hassans International Law

Security Operations
The largest law firm in Gibraltar, Hassans offers a huge selection of legal services to clients based both locally and around the globe. Able to offer legal advice and expertise to clients across corp

Anect

Compliance Consulting
Anect is a leading provider of ICT security and services for hybrid and cloud solutions. We have been providing our services for 30 years. From a traditional ICT integrator, we have moved to a leadin

Zercurity

Governance Risk and Compliance Platforms
Zercurity is on a mission to build the ultimate cybersecurity operations platform for businesses. To help protect against a growing number of internal and external threats. We provide a cost effectiv

Quside

Data Loss Prevention
Quside, a spin-off from The Institute of Photonic Sciences (ICFO) in Barcelona, designs and manufactures innovative quantum technologies for a wide range of applications including cyber security. Qus

Gray Swan

Security Operations
Gray Swan is the safety and security provider for the AI era, founded by world leading experts in the AI safety and security space. When your AI fails, your reputation, compliance, and bottom line ar

AUTOCRYPT

Industrial Control System Security

Pindrop Security

Security Operations
Pindrop solutions are leading the way to the future of voice by establishing the standard for security, identity, and trust for every voice interaction. In a digital world where human and machine con