Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

F5 Aspen Mesh
Container Security
F5 Aspen Mesh on SecurityListing: Istio-based service mesh for 5G microservices & cloud-native deployments

Empire Communication Profiles
Offensive Security
Empire Communication Profiles on SecurityListing: Customize Empire's GET request URIs, user agent, and headers for evading detection and masquerading as other applications.

Log Parser Lizard
Security Information and Event Management
Log Parser Lizard on SecurityListing: A dynamic GUI for advanced log analysis, allowing users to execute SQL queries on structured log data.

Yomi
Threat Intelligence Platforms
Yomi on SecurityListing: Threat intelligence platform providing real-time threat data and insights.

FutureFeed
Compliance Management
FutureFeed on SecurityListing: A tool for achieving and proving compliance with NIST 800-171 and CMMC cybersecurity requirements

Gravwell
Security Information and Event Management
Gravwell on SecurityListing: Data analytics platform for security operations with search and automation

CyberMaxx MaxxMDR
Endpoint Detection and Response
CyberMaxx MaxxMDR on SecurityListing: MDR solution combining threat detection, response, and offensive security

Morphisec Breach Prevention
Endpoint Protection Platform
Morphisec Breach Prevention Platform on SecurityListing: Endpoint security platform using Moving Target Defense to prevent cyber attacks and provide adaptive exposure management and threat prevention.

Nightfall Nyx
Data Loss Prevention
Nightfall Nyx on SecurityListing: AI-powered DLP analyst that investigates incidents and reduces data exposure risk

Endor Labs Application
Software Composition Analysis
Endor Labs Application Security on SecurityListing: AI-powered AppSec platform for code, dependencies, and container security

Crypsis

Digital Forensics and Incident Response

Aves Netsec

Threat Intelligence Platforms
Our solution adds a new layer of security into your network, which robs the attacker from the ability to function - we will take the reliability of the information the attacker collects.

US Department of

Security Operations
The Bureau of Cyberspace and Digital Policy leads and coordinates the Department’s work on cyberspace and digital diplomacy to encourage responsible state behavior in cyberspace and advance policies t

AVEVA

Industrial Control System Security
AVEVA has a long history in providing Supervisory Control and Data Acquisition software and offers a winning strategy for meeting complex and evolving automation requirements while protecting engineer

Atlant Security

Cloud Security
Atlant Security is a cyber and IT security company offering consulting and implementation services. Our mission is to provide SMBs with clear visibility of what is happening in their digital assets.

GetReal Security

Security Operations
GetReal Security is the world’s leading authority on malicious digital content and deepfake protection. GetReal was incubated by Ballistic Ventures, the venture capital firm dedicated exclusively to

NST Cyber

Security Operations
NST Cyber provides comprehensive Threat Exposure Management to Global banks and Forbes 2000 companies. NST Cyber was established with the vision of empowering organisations with the necessary tools a

Alan Turing Institute

Security Operations
Alan Turing Institute is the UK national institute for data science. A major focus is Big Data analysis with applications including cyber security. The institute will work with universities across th

Forever Group

Cloud Security
Forever Group is a Managed Services Provider specialising in Telecommunications, IT Support, and Cyber Security. Even if you have an existing IT provider, that does not mean that your organisation is

BlueHalo

Compliance Consulting
BlueHalo is purpose-built to provide industry capabilities in the domains of Space Superiority and Directed Energy, Missile Defense and C4ISR, and Cyber and Intelligence. BlueHalo focuses on inspired