Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Frontal

Security Operations
Frontal is a specialized unit in Blockchain and Web3.0 cybersecurity. Securing Digital Assets, Cryptocurrency, DeFi, Blockchain and Web3.0 ecosystem. Helping digital asset trading, crypto exchanges an

Axoflow

Security Operations
Axoflow helps organizations to consolidate their existing solutions for logs, metrics, and traces, and evolve them into a cloud native observability infrastructure to solve challenges in the areas of

HackControl

Brand Protection
HackControl's main focus is delivering cybersecurity services including penetration tests, security audits, block chain audits and brand and anti-phishing protection to our clients. The cyber securit

Ballistic Ventures

Security Operations
Ballistic Ventures is a new kind of venture capital firm, built by and for cybersecurity entrepreneurs and investors. Today’s cybersecurity entrepreneurs need investors who are in the fight — who und

AwareGO

Security Awareness Training
AwareGO is a global provider of security awareness training content and solutions that help enterprises improve cybersecurity awareness in the workplace and protect their business from modern-day cybe

Fivecast

Threat Intelligence Platforms
Fivecast is enabling a safer world. We help organizations around the world explore masses of data to uncover actionable insights. Used and trusted by leading defense, national security, law enforceme

Hypori

Security Operations
Hypori is a virtual smartphone solution that makes truly secure BYOD a reality for organizations in healthcare, finance, government, and beyond. Hypori is a highly secure virtual smartphone solution

Avatao

Security Awareness Training
Avatao is an online training platform for building secure software, offering a rich library of hands-on IT security exercises for software engineers to teach secure programming. ~~Topics cover classic

Avansic

Digital Forensics and Incident Response
Avansic is a leading provider of e-discovery and digital forensics services to attorneys, litigation support teams, and business communities. We take a scientific approach to providing e-discovery, di

Wiz

Cloud Security
Wiz - the first cloud visibility solution for enterprise security: A 360° view of security risks across clouds, containers and workloads. No agents. No sidecars. Wiz is a cloud native solution that u

Avanan

Cloud Security
Avanan is The Cloud Security Platform. Protect all your SaaS applications using tools from over 60 industry-leading vendors in just one click. We 'cloudify' over 60 best-of-breed security solutions a

Automotive Information Sharing

Industrial Control System Security
Auto-ISAC is an industry-driven community to share and analyze intelligence about emerging cybersecurity risks to the vehicle, and to collectively enhance vehicle cybersecurity capabilities across the

MirrorTab

Security Operations
MirrorTab is a cyber security company providing advanced web security solutions that defend web applications against cyber threats like hacking and malware. By eliminating the client-side browser att

AuthenTrend

Security Operations
AuthenTrend provide biometric authentication products to achieve high security with extreme ease-of-use for the user.

Kasm Technologies

Threat Intelligence Platforms
Kasm Browser Isolation - Protect your organization from malware, ransomware and phishing by using zero-trust containerized browsers. Deployment - Kasm is equipped with the authentication and security

LeakIX
Offensive Security
LeakIX on SecurityListing: LeakIX is a red-team search engine that indexes mis-configurations and vulnerabilities online.

Auria

Compliance Consulting
Auria advances complex space, missile, and cyber operations with visionary solutions and software. We assemble leading experts and brilliant teams capable of tackling the most challenging missions in

Auriga

Industrial Control System Security
Auriga create innovative software and have become a benchmark for high quality banking software including cyber security solutions to protect business critical devices. Critical devices provide essen

Kojoney
Security Operations
Kojoney on SecurityListing: A honeypot for the SSH Service

extundelete
Digital Forensics and Incident Response
extundelete on SecurityListing: A utility for recovering deleted files from ext3 or ext4 partitions.