Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Cyan Securiy Group

Cyan Securiy Group

Germany flag

Security Operations

Cyan provide best-in-class cyber security solutions for mobile Internet and mobile devices that are extremely effective and highly intuitive in their use. Specialized in IT security and data analysis

3.8(1)
BELAC

BELAC

Belgium flag

Security Operations

BELAC is the national accreditation body for Belgium. BELAC is legally responsible for the accreditation of conformity assessment bodies (laboratories, inspection and certification bodies). This cov

3.8(1)
Circle Security

Circle Security

United States flag

Data Loss Prevention

Circle’s breakthrough security API unifies the solutions for identity and data security into one architecture and empowers organizations to secure their identity, data and privacy in their application

3.8(1)
World Cyber Security Summit

World Cyber Security

India flag

Security Operations

World Cyber Security Summit, organised by Trescon, is a thought-leadership driven, business-focused initiative that provides a platform for CISOs who are looking to explore new-age threats and the tec

3.8(1)
CardinalOps

CardinalOps

United States flag

Security Operations

Using automation and MITRE ATT&CK, the CardinalOps platform continuously assesses your detection posture and eliminates coverage gaps in your existing detection stack  so you can easily implement a th

3.8(1)
Cyberr

Cyberr

LU flag

Security Operations

We’re transforming cybersecurity recruitment with Cyberr Intelligence – the AI-driven platform that connects top cybersecurity talent, both freelance and permanent, with leading employers worldwide.

3.8(1)
Zeron

Zeron

India flag

Governance Risk and Compliance Platforms

Zeron build bridges between security teams and top management. Our platform unifies your cyber risk posture seamlessly, encompassing threat insights and quantifiable risk scenarios. Zeron serves as t

3.8(1)
Zen360Consult

Zen360Consult

BH flag

Compliance Consulting

Zen360Consult provides Advisory and Training services in the field of Cyber Resilience, which includes Cyber Security /ISMS and Business Continuity. We advise organizations to safeguard their most imp

3.8(1)
Anagram

Anagram

United States flag

Security Awareness Training

Anagram is the world’s first human-driven security awareness training platform that delivers real results. We go beyond traditional methods—like outdated videos and quizzes—by offering phishing simul

3.8(1)
Jetico

Jetico

Finland flag

Data Loss Prevention

Jetico provides pure & simple data protection software for all sensitive information throughout the lifecycle. Powerful yet easy to use, BCWipe and BestCrypt are engineered for a wide range of users:

3.8(1)
DANAK

DANAK

Denmark flag

Security Operations

DANAK  is the national accreditation body for Denmark, responsible for assessing the competence and capability of organisations that provide certification, testing, inspection and calibration services

3.8(1)
Casepoint

Casepoint

United States flag

Security Operations

Casepoint is the legal technology platform of choice for corporations, government agencies, and law firms to meet their complex eDiscovery, investigations, and compliance needs. Powered by cutting-ed

3.8(1)
Pangea

Pangea

United States flag

Security Operations

Pangea's AI Security Platform empowers security teams to secure AI from cloud to code. With Pangea, organizations can enable secure workforce AI use and innovation and ship secure AI applications fas

3.8(1)
Aurascape AI

Aurascape AI

United States flag

Security Operations

Aurascape is working on advanced cybersecurity solutions powered by grounds-up generative AI architecture. We have assembled one of the world’s best teams combining Security, Generative AI, and SaaS

3.8(1)
Atlantica Digital

Atlantica Digital

Italy flag

Compliance Consulting

Since 1987, Atlantica we have been developing reliable, scalable, and secure IT infrastructures and solutions with passion and dedication. We transform your IT “costs” into formidable business tools.

3.8(1)
CertiKit

CertiKit

United Kingdom flag

Security Operations

CertiKit produce toolkit products that accelerate the adoption of ISO/IEC standards, including ISO 27001, helping organizations all over the world to realize the benefits as soon as possible. We use

3.8(1)
Duane Morris LLP

Duane Morris LLP

United States flag

Security Operations

Duane Morris is a global law firm with more than 750 attorneys and offices in the USA, UK and Asia. Practice areas include Cybersecurity. Cybersecurity is one of the big issues of our times and conti

3.8(1)
Freshfields Bruckhaus Deringer

Freshfields Bruckhaus Deringer

United Kingdom flag

Security Operations

Freshfields Bruckhaus Deringer is a global law firm with a long-standing track record of successfully supporting the world's leading national and multinational corporations, financial institutions and

3.8(1)
GFI Software

GFI Software

United States flag

Security Operations

GFI Software works with System Administrators, IT Professionals and IT Executives to ensure that their IT infrastructures are monitored, managed, secured and compliant. GFI Security - Monitor, manage

3.8(1)
Academia the Technology Group

Academia the Technology

United Kingdom flag

Compliance Consulting

Academia specialise in the supply of software, IT hardware, training and service solutions to the public sectors, business and pro media markets. We combine next generation technology with cost effec

3.8(1)
Showing 1921 to 1940 of 2606 products