Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Alias

Alias

United States flag

Compliance Consulting

Alias (formerly Alias Forensics) provide penetration testing, vulnerability assessments, incident response and security consulting services. By allowing our security team to be your security expert, w

3.8(1)
Chartered Institute of Information Security (CIISec)

Chartered Institute of

United Kingdom flag

Security Awareness Training

The Chartered Institute of Information Security (CIISec) is the only pure play information and cyber security institution to have been granted Royal Charter status and is dedicated to raising the stan

3.8(1)
AISLE

AISLE

United States flag

Threat Intelligence Platforms

AISLE is rewriting the foundations of cybersecurity. We don't just find real vulnerabilities. We fix them - autonomously, end-to-end, and at superhuman speed, scale and precision. AISLE was built by

3.8(1)
Coralogix

Coralogix

United States flag

Security Operations

Coralogix are rebuilding the path to observability using a real-time streaming analytics pipeline that provides monitoring, visualization, and alerting capabilities without the burden of indexing. By

3.8(1)
AirDroid Business

AirDroid Business

Singapore flag

Security Operations

AirDroid Business is an unconventional Mobile Device Management (MDM) software that comes with powerful remote control and device monitoring capabilities like no other. It allows businesses and IT tea

3.8(1)
AimBrain

AimBrain

United Kingdom flag

Security Operations

AimBrain tools detect and prevent fraud, faster and more accurately than ever before. In the digital era, few businesses are immune to the threat of fraud and the losses it incurs. Detect and block b

3.8(1)
CyberSecurityJobsite.com

CyberSecurityJobsite.com

United Kingdom flag

Security Operations

CyberSecurityJobsite.com is a specialist job board designed to attract candidates working within Cyber Security, Information Security or Information Assurance. As a leading jobsite within the Cyber S

3.8(1)
checkra1n

checkra1n

language

Offensive Security

checkra1n on SecurityListing: Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.

3.8(1)
aiComply

aiComply

Italy flag

Governance Risk and Compliance Platforms

NavigateCyber, by aiComply, is the first NIST-Based Risk Management Framework Platform specifically designed to tackle NIST’s Cybersecurity Compliance Frameworks leveraging state-of-the-art technology

3.8(1)
IronNet IronDefense

IronNet IronDefense

language

Threat Hunting

IronNet IronDefense on SecurityListing: Network detection and response platform for threat detection and visibility

3.8(1)
Invariant Labs

Invariant Labs

Switzerland flag

Security Operations

Invariant Labs are a team of technical experts with broad experience ranging from academia to big tech on a mission to unlock the potential of AI systems by making them robust, reliable and secure.

3.8(1)
Google Search Operators: The Complete List (44 Advanced Operators)

Google Search Operators:

language

Threat Hunting

Google Search Operators: The Complete List (44 Advanced Operators) on SecurityListing: A reference guide listing 44 advanced Google search operators for enhanced search filtering and precision in information gathering activities.

3.8(1)
ZEBOX

ZEBOX

France flag

Security Operations

ZEBOX is an international incubator & accelerator of innovative startups founded on the initiative of Rodolphe Saadé, CEO of CMA CGM and led by Matthieu Somekh, an expert on entrepreneurship and innov

3.8(1)
AegisAI

AegisAI

United States flag

Security Operations

AegisAI is an AI-native Email Security platform. Our AI agents think like human analysts—stopping Zero-day Phishing, BEC, and Malware attacks while cutting false positives by up to 90%. Let our AI Ag

3.8(1)
Logpoint NDR

Logpoint NDR

language

Threat Hunting

Logpoint NDR on SecurityListing: A network detection and response solution that uses AI and machine learning to monitor network traffic, identify malicious behavior, and connect related security events to reveal attack patterns without requiring endpoint agents.

3.8(1)
CLUSIF

CLUSIF

France flag

Security Operations

Clusif is the reference association for digital security in France. Its mission is to promote the exchange of ideas and feedback through working groups, conferences and publications. Created in 1992,

3.8(1)
Cyberstarts

Cyberstarts

Israel flag

Security Operations

3.8(1)
Approachable Certification

Approachable Certification

United Kingdom flag

Security Operations

Approachable Certification is a UKAS accredited certification body offering down-to-earth and competitively priced audits against ISO Management Systems standards. We audit and provide certification

3.8(1)
Advisen

Advisen

United States flag

Security Operations

Advisen is the leading provider of data, media, and technology solutions for the commercial property and casualty insurance market. Advisen’s proprietary data sets and applications focus on large, spe

3.8(1)
Cyber Armor

Cyber Armor

United Arab Emirates flag

Application Security

Cyber Armor is a value-added cybersecurity and forensics distributor serving the Middle East, Turkey, Africa, and South Asia regions, including India and Bangladesh. The company focuses on mapping bus

3.8(1)
Showing 1681 to 1700 of 2606 products