Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.
Intertek Group

Industrial Control System Security
Intertek Group provides Assurance, Testing, Inspection and Certification services. Activities include cyber security testing and certification. We work to protect and secure sensitive data and the sa
Acceptto

Security Operations
Acceptto offers the first unified and continuous authentication identity access platform with No-Password. Our passwordless authentication solution protects enterprise customers, workforce, and partn
Amadeus Capital Partners

Security Operations
Amadeus Capital Partners offers over 20 years’ experience in technology investment. We support innovation and entrepreneurship through accelerators, industry associations, government expert groups, m
The CyberWire

Security Operations
The CyberWire gets people up to speed on cyber quickly and keeps them a step ahead in a continually changing industry. Situational awareness, continuing education, and professional development are th
PrivacySavvy

Security Operations
PrivacySavvy's mission is to provide you with all the information that you need to ensure that your internet privacy is intact, your devices are secure, and that any time you step online, you’re safe.
Alset Technologies

Governance Risk and Compliance Platforms
Alset Technologies provides a comprehensive solution to DISA STIG (Security Technical Implementation Guide) compliance - DASH.
Airbus Cybersecurity

Compliance Consulting
We provide a global cyber defence approach that dynamically aims to protect, detect and respond to cyber threats with a portfolio including managed security services, industrial control system offerin
Tulpa AI

Penetration Testing
Tulpa develops safe AI assistants (co-pilots) to support and enhance human performance in high-stakes, mission-critical decision-making environments. We enable high-performance, high-value, scalable w
ISS Systems

Data Protection
ISS Systems appears to be a company associated with information security given the domain and the redirected WEAREISS page, but the landing content shown is a generic safety check screen with a Contin
Applicure Technologies

Security Operations
Applicure Technologies develops the leading multi-platform web application security software products to protect web sites and web applications from external and internal attacks.
Alpha Echo

Compliance Consulting
Specialising in security advice and enterprise-wide Cyberworthiness, Alpha Echo helps Australia deliver on cyber outcomes at a military grade level. We deliver realistic, comprehensive, tailored, thr
Airia

Security Operations
Airia is a leading Enterprise AI Orchestration Platform, empowering organizations to securely build, deploy, and manage AI solutions at scale. Our platform seamlessly integrates with existing systems
NetBlocks

Security Operations
NetBlocks is a global internet monitor working at the intersection of digital rights, cyber-security and internet governance. Independent and non-partisan, NetBlocks strives for an open and inclusive
ArmorX AI

Data Loss Prevention
ArmorX AI (formerly Kapalya) operates an encryption management platform designed to encrypt all data in transit and at rest on mobile end-points, corporate servers, and cloud servers. The company's e
Cipher xMDR
Threat Hunting
Cipher xMDR on SecurityListing: AI-driven MDR service providing unified threat detection across IT, OT, cloud
Brute Ratel C4
Offensive Security
Brute Ratel C4 on SecurityListing: Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.
Exeon Analytics

Threat Intelligence Platforms
Exeon Analytics is a Swiss cyber security company that is specialized in detecting hidden data breaches and advanced cyber attacks. Our flagship product ExeonTrace uses machine learning and clusterin
xargs
Offensive Security
xargs on SecurityListing: A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.
Bulwark Distribution

Data Protection
Bulwark Distribution is a value-added distributor of IT and cybersecurity solutions serving the Middle East with headquarters in Dubai and regional offices in Saudi Arabia and India. The company partn
Honeyd Tools
Security Operations
Honeyd Tools on SecurityListing: A collection of tools that can be used with Honeyd for data analysis or other purposes