Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Frontal

Frontal

United Arab Emirates flag

Security Operations

Frontal is a specialized unit in Blockchain and Web3.0 cybersecurity. Securing Digital Assets, Cryptocurrency, DeFi, Blockchain and Web3.0 ecosystem. Helping digital asset trading, crypto exchanges an

3.8(1)
Axoflow

Axoflow

United States flag

Security Operations

Axoflow helps organizations to consolidate their existing solutions for logs, metrics, and traces, and evolve them into a cloud native observability infrastructure to solve challenges in the areas of

3.8(1)
HackControl

HackControl

Poland flag

Brand Protection

HackControl's main focus is delivering cybersecurity services including penetration tests, security audits, block chain audits and brand and anti-phishing protection to our clients. The cyber securit

3.8(1)
Ballistic Ventures

Ballistic Ventures

United States flag

Security Operations

Ballistic Ventures is a new kind of venture capital firm, built by and for cybersecurity entrepreneurs and investors. Today’s cybersecurity entrepreneurs need investors who are in the fight — who und

3.8(1)
AwareGO

AwareGO

IS flag

Security Awareness Training

AwareGO is a global provider of security awareness training content and solutions that help enterprises improve cybersecurity awareness in the workplace and protect their business from modern-day cybe

3.8(1)
Fivecast

Fivecast

Australia flag

Threat Intelligence Platforms

Fivecast is enabling a safer world. We help organizations around the world explore masses of data to uncover actionable insights. Used and trusted by leading defense, national security, law enforceme

3.8(1)
Hypori

Hypori

United States flag

Security Operations

Hypori is a virtual smartphone solution that makes truly secure BYOD a reality for organizations in healthcare, finance, government, and beyond. Hypori is a highly secure virtual smartphone solution

3.8(1)
Avatao

Avatao

HU flag

Security Awareness Training

Avatao is an online training platform for building secure software, offering a rich library of hands-on IT security exercises for software engineers to teach secure programming. ~~Topics cover classic

3.8(1)
Avansic

Avansic

United States flag

Digital Forensics and Incident Response

Avansic is a leading provider of e-discovery and digital forensics services to attorneys, litigation support teams, and business communities. We take a scientific approach to providing e-discovery, di

3.8(1)
Wiz

Wiz

Israel flag

Cloud Security

Wiz - the first cloud visibility solution for enterprise security: A 360° view of security risks across clouds, containers and workloads. No agents. No sidecars. Wiz is a cloud native solution that u

3.8(1)
Avanan

Avanan

United States flag

Cloud Security

Avanan is The Cloud Security Platform. Protect all your SaaS applications using tools from over 60 industry-leading vendors in just one click. We 'cloudify' over 60 best-of-breed security solutions a

3.8(1)
Automotive Information Sharing & Analysis Center (Auto-ISAC)

Automotive Information Sharing

United States flag

Industrial Control System Security

Auto-ISAC is an industry-driven community to share and analyze intelligence about emerging cybersecurity risks to the vehicle, and to collectively enhance vehicle cybersecurity capabilities across the

3.8(1)
MirrorTab

MirrorTab

United States flag

Security Operations

MirrorTab is a cyber security company providing advanced web security solutions that defend web applications against cyber threats like hacking and malware. By eliminating the client-side browser att

3.8(1)
AuthenTrend

AuthenTrend

Taiwan flag

Security Operations

AuthenTrend provide biometric authentication products to achieve high security with extreme ease-of-use for the user.

3.8(1)
Kasm Technologies

Kasm Technologies

United States flag

Threat Intelligence Platforms

Kasm Browser Isolation - Protect your organization from malware, ransomware and phishing by using zero-trust containerized browsers. Deployment - Kasm is equipped with the authentication and security

3.8(1)
LeakIX

LeakIX

language

Offensive Security

LeakIX on SecurityListing: LeakIX is a red-team search engine that indexes mis-configurations and vulnerabilities online.

3.8(1)
Auria

Auria

United States flag

Compliance Consulting

Auria advances complex space, missile, and cyber operations with visionary solutions and software. We assemble leading experts and brilliant teams capable of tackling the most challenging missions in

3.8(1)
Auriga

Auriga

United Kingdom flag

Industrial Control System Security

Auriga create innovative software and have become a benchmark for high quality banking software including cyber security solutions to protect business critical devices. Critical devices provide essen

3.8(1)
Kojoney

Kojoney

language

Security Operations

Kojoney on SecurityListing: A honeypot for the SSH Service

3.8(1)
extundelete

extundelete

language

Digital Forensics and Incident Response

extundelete on SecurityListing: A utility for recovering deleted files from ext3 or ext4 partitions.

3.8(1)
Showing 1601 to 1620 of 2606 products