Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Adversa AI Continuous AI Red Teaming LLM

Adversa AI Continuous

language

Threat Modeling

Adversa AI Continuous AI Red Teaming LLM on SecurityListing: Continuous red teaming platform for testing LLM security vulnerabilities

4.2(3)
Akto 2025 State of Agentic AI Security Report

Akto 2025 State

language

AI Model Security

Akto 2025 State of Agentic AI Security Report on SecurityListing: AI agent and MCP security platform for discovery, testing, and guardrails

4.2(3)
Adversa AI

Adversa AI

Israel flag

Security Operations

Adversa is a leading company working on applied security measures for AI. Our mission is to build trust in AI and protect AI from cyber threats, privacy issues, and safety incidents. With a team of m

4.2(3)
DNIF HYPERCLOUD

DNIF HYPERCLOUD

language

Threat Hunting

DNIF HYPERCLOUD on SecurityListing: SIEM platform with user analytics and automation for threat detection

4.2(3)
Harmonic Secure AI

Harmonic Secure AI

language

Data Loss Prevention

Harmonic Secure AI on SecurityListing: Security platform for GenAI adoption with data protection and Shadow AI detection

4.2(3)
Forcepoint DLP

Forcepoint DLP

language

Data Loss Prevention

Forcepoint DLP on SecurityListing: Enterprise DLP solution for preventing data loss across cloud, web, email, endpoint

4.2(3)
BlockSec

BlockSec

UN flag

Security Operations

BlockSec is dedicated to building blockchain security infrastructure. The team is founded by top security researchers and experiencedexperts from both academia and industry. Security AuditAutomatic t

4.2(3)
Kingston Technology

Kingston Technology

United States flag

Data Loss Prevention

Kingston is a leading global manufacturer of memory and storage solutions including encrypted storage solutions to protect data inside and outside the firewall.

4.2(3)
AttackIQ

AttackIQ

United States flag

Security Operations

Founded in 2014, AttackIQ pioneered the Breach and Attack Simulation (BAS) category with the industry’s first commercial platform. But as adversaries evolved, so did we. Today, we lead the market in

4.2(3)
Beazley

Beazley

United Kingdom flag

Security Operations

Beazley are a specialist insurer with three decades of experience in providing clients with the highest standards of underwriting and claims service worldwide. All our insurance businesses are rated A

4.2(3)
Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions

United States flag

Security Operations

Extreme Protocol Solutions is an industry leading Data Sanitization Software, Hardware and Onsite Service Provider. We have designed our custom built drive wipe software, XErase, to support whatever

4.2(3)
Chainalysis

Chainalysis

United States flag

Digital Forensics and Incident Response

Chainalysis provides blockchain analysis software to prevent, detect and investigate cryptocurrency money laundering, fraud and compliance violations. Chainalysis uses pattern recognition, machine le

4.2(3)
BlueFiles

BlueFiles

France flag

Data Loss Prevention

BlueFiles enables users to send encrypted files securely while maintaining full control over recipients, access periods, downloads, and printing. Aimed at all types of professionals who need to excha

4.2(3)
Zertificon Solutions

Zertificon Solutions

Germany flag

Data Loss Prevention

Alongside the Z1 SecureMail Gateway solution for server based email encryption & signing, the product range has been extended to include client-side application for foolproof End-to-End email encrypti

4.2(3)
CYDES

CYDES

MY flag

Security Operations

CYDES is the first event in Malaysia to showcase advanced solutions and technologies to address cyber defence and cyber security challenges for the public and private sectors with the objective of pro

4.2(3)
Dux Security

Dux Security

United States flag

Security Operations

Dux is an agentic exposure management platform built for a world where vulnerability exploitation windows are collapsing from weeks to minutes. Use our AI agents to continuously determine what’s actu

4.2(3)
Ceerus

Ceerus

United Kingdom flag

Data Loss Prevention

Ceerus was created to simplify the process of deploying and managing security across all the channels in an organisation. We do that by providing a proven layer of security that can be integrated easi

4.2(3)
Zerodium

Zerodium

United States flag

Security Operations

Zerodium is the leading exploit acquisition platform for premium zero-days and advanced cybersecurity research. We pay big bounties to security researchers to acquire their original and previously un

4.2(3)
Xceptional

Xceptional

Australia flag

Security Operations

Xceptional is a multi-award-winning technology services firm that celebrates the unique strengths of people with autism. Xceptional have pioneered a range of inclusive talent solutions for the austra

4.2(3)
UZCERT

UZCERT

UZ flag

Security Operations

UZCERT is the national Computer Emergency Response Team for Uzbekistan. UZCERT is an information security incident response service. The main objective of the service is to reduce the level of inform

4.2(3)
Showing 2141 to 2160 of 4175 products