Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Dbapp Security Unified
Password Management
Dbapp Security Unified Security Management Platform (DAS-USM) on SecurityListing: Centralized privileged account mgmt platform with access control & auditing

Secureframe Comply
Third-Party Risk Management
Secureframe Comply on SecurityListing: Compliance automation platform with AI-powered capabilities and monitoring

Jit
Container Security
Jit on SecurityListing: An integrated application security platform that combines multiple security scanning tools with developer-focused workflows for automated code and infrastructure security testing.

dc3dd
Digital Forensics and Incident Response
dc3dd on SecurityListing: dc3dd is a patch to the GNU dd program, tailored for forensic acquisition with features like hashing and file verification.

pac-resolver
Software Composition Analysis
pac-resolver on SecurityListing: Pac-resolver, a popular NPM package with 3 million weekly downloads, has a severe remote code execution flaw.

FireCompass AI-powered Pen
Penetration Testing
FireCompass AI-powered Pen Testing on SecurityListing: AI-powered automated pen testing & continuous red teaming platform

Detectify Platform
API Security
Detectify Platform on SecurityListing: Platform for external attack surface management and application security testing

Permiso
Threat Intelligence Platforms
Permiso on SecurityListing: Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

The Pyramid of
Threat Intelligence Platforms
The Pyramid of Pain on SecurityListing: A cybersecurity concept categorizing indicators of compromise based on their level of difficulty for threat actors to change.

Bastille-Linux
Offensive Security
Bastille-Linux on SecurityListing: Bastille-Linux is a system hardening program that proactively configures the system for increased security and educates users about security settings.

odix TrueCDR™ Kiosk
Endpoint Protection Platform
odix TrueCDR™ Kiosk on SecurityListing: Secure kiosk for sanitizing USB & uploaded files using CDR technology

Cynosure Solutions

Network Security
Cynosure Solutions Fzc is an ISO 9001:2015 certified enterprise IT solutions provider headquartered in Sharjah, UAE, serving customers across the Middle East and North Africa. The company offers a bro

Clutch Universal Non-Human
Identity Threat Detection and Response
Clutch Universal Non-Human Identity Security Platform on SecurityListing: Platform for securing non-human identities across cloud, SaaS, and on-prem

Flying Cloud CrowsNest
Data Classification
Flying Cloud CrowsNest on SecurityListing: Real-time data surveillance platform for data discovery, monitoring, and threat detection

Intrinsic-ID

Industrial Control System Security
Intrinsic-ID is the world’s leading digital authentication company and the inventor of SRAM Physical Unclonable Function or SRAM PUF. Intrinsic-ID leverages inherent manufacturing variations in chips

OpenBSD Manual Page
Guides
OpenBSD Manual Page Server on SecurityListing: Search OpenBSD manual pages by keyword, section, or manual page name

ActiveNav

Governance Risk and Compliance Platforms
ActiveNav provide dark data discovery solutions for compliance and information governance. Our cloud platform deploys fast and builds a comprehensive data inventory, presented in dashboards that are

13 Layers threatINTELLIGENCE
Threat Intelligence Platforms
13 Layers threatINTELLIGENCE on SecurityListing: NDR solution that blocks malicious traffic before alerts are generated

A10 Networks

Security Operations
A10 Networks is a leader in application networking, helping organizations of all sizes to accelerate, optimize and secure their applications. Our vision is to protect our customers with best-in-class

2|SEC Consulting (2-SEC)

Cloud Security
At 2|SEC Consulting, we deliver an end-to-end service of cyber and information security solutions which are tailored to each client’s exact security needs. We help organisations to increase their cyb