Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

COcyber

COcyber

Belgium flag

Security Operations

The Coordination between the Cybersecurity Civilian and Defense Spheres (COcyber) project is an ambitious two-year initiative designed to enhance the exchange, coordination, and collaboration between

4.7(2)
Alarum Technologies

Alarum Technologies

Israel flag

Data Loss Prevention

Alarum Technologies (formerly Safe-T) is a  global provider of cyber security and privacy solutions to consumers and enterprises. Alarum's mission is to enable a secure network environment and protec

4.7(2)
Pulsedive

Pulsedive

language

Threat Hunting

Pulsedive on SecurityListing: Pulsedive is a threat intelligence platform that provides frictionless threat intelligence for growing teams, offering features such as indicator enrichment, threat research, and API integration.

4.7(2)
Art of Memory Forensics

Art of Memory

language

Digital Forensics and Incident Response

Art of Memory Forensics on SecurityListing: A comprehensive guide to memory forensics, covering tools, techniques, and procedures for analyzing volatile memory.

4.7(2)
PEview

PEview

language

Digital Forensics and Incident Response

PEview on SecurityListing: A PE/COFF file viewer that displays header, section, directory, import table, export table, and resource information within various file types.

4.7(2)
Code Dx

Code Dx

United States flag

Security Operations

Code Dx is a software application vulnerability correlation and management system that consolidates and normalizes software vulnerabilities detected by multiple static application security testing (SA

4.7(2)
Ciena

Ciena

United States flag

Data Loss Prevention

Ciena is a global leader in optical and routing systems, services, and automation software. We build the world’s most adaptive networks to address ever-increasing digital demands for richer, more conn

4.7(2)
7Safe

7Safe

United Kingdom flag

Security Awareness Training

7Safe has been delivering hands-on digital security training courses since 2001 and we currently have a portfolio of 22 university and industry-accredited courses delivered from our cyber development

4.7(2)
Abusix

Abusix

Germany flag

Threat Intelligence Platforms

Abusix specializes in Internet security, network abuse handling, antispam and fraud prevention. Our mission is to help ISPs & Internet companies solve the rapidly growing problem of outgoing spam and

4.7(2)
Dropzone AI

Dropzone AI

language

Security Orchestration Automation and Response

Dropzone AI on SecurityListing: Dropzone AI is an autonomous AI agent for SOCs that performs end-to-end investigations of security alerts, integrating with existing cybersecurity tools and data sources.

4.7(2)
6cure

6cure

France flag

Threat Intelligence Platforms

6cure is an innovative company specializing in information systems security. Its experts are recognized for their R&D activities in the field of intrusion detection and cyberattack response systems.

4.7(2)
African Cyber Security

African Cyber Security

BW flag

Compliance Consulting

African Cyber Security and it's partners, have the expertise and skills to provide holistic solutions for companies, institutions and government. Our approach goes beyond audit, beyond penetration te

4.7(2)
DorkSearch

DorkSearch

language

Offensive Security

DorkSearch on SecurityListing: An AI-powered Google Dorking tool that helps create effective search queries to uncover sensitive information on the internet.

4.7(2)
EclecticIQ Threat Intelligence Platform

EclecticIQ Threat Intelligence

language

Threat Hunting

EclecticIQ Threat Intelligence Platform on SecurityListing: Threat intelligence platform for aggregating, analyzing, and sharing CTI data

4.7(2)
Bulwark Distribution

Bulwark Distribution

United Arab Emirates flag

Data Protection

Bulwark Distribution is a value-added distributor of IT and cybersecurity solutions serving the Middle East with headquarters in Dubai and regional offices in Saudi Arabia and India. The company partn

4.7(2)
Cipher xMDR

Cipher xMDR

language

Threat Hunting

Cipher xMDR on SecurityListing: AI-driven MDR service providing unified threat detection across IT, OT, cloud

4.7(2)
Cado Security

Cado Security

United Kingdom flag

Digital Forensics and Incident Response

Cado Security is pushing digital forensics, and cyber incident response to the next level. Cado Response PlatformWe have built a software platform for responding to cyber-security incidents and perfo

4.7(2)
CloudScale365

CloudScale365

United States flag

Backup as a Service

CloudScale365 offers state-of-the-art managed IT services and cloud, hosting, security, and business continuity solutions. As an extension of your IT team, we work hand-in-hand to plan, migrate, depl

4.7(2)
Hackuity

Hackuity

France flag

Governance Risk and Compliance Platforms

Vulnerabilities in software development are still at the origin of the majority of security incidents. The volume of vulnerabilities has become so large that it is no longer manageable on a human scal

4.7(2)
Bittnet Training

Bittnet Training

RO flag

Security Awareness Training

Bittnet Training is the leader in the IT Training market in Romania. Bittnet Training experts design dedicated learning programs to develop the IT skills of  IT professionals as well as for those who

4.7(2)
Showing 161 to 180 of 2606 products