Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Dbapp Security Unified Security Management Platform (DAS-USM)

Dbapp Security Unified

language

Password Management

Dbapp Security Unified Security Management Platform (DAS-USM) on SecurityListing: Centralized privileged account mgmt platform with access control & auditing

3.8(1)
Secureframe Comply

Secureframe Comply

language

Third-Party Risk Management

Secureframe Comply on SecurityListing: Compliance automation platform with AI-powered capabilities and monitoring

3.8(1)
Jit

Jit

language

Container Security

Jit on SecurityListing: An integrated application security platform that combines multiple security scanning tools with developer-focused workflows for automated code and infrastructure security testing.

3.8(1)
dc3dd

dc3dd

language

Digital Forensics and Incident Response

dc3dd on SecurityListing: dc3dd is a patch to the GNU dd program, tailored for forensic acquisition with features like hashing and file verification.

3.8(1)
pac-resolver

pac-resolver

language

Software Composition Analysis

pac-resolver on SecurityListing: Pac-resolver, a popular NPM package with 3 million weekly downloads, has a severe remote code execution flaw.

3.8(1)
FireCompass AI-powered Pen Testing

FireCompass AI-powered Pen

language

Penetration Testing

FireCompass AI-powered Pen Testing on SecurityListing: AI-powered automated pen testing & continuous red teaming platform

3.8(1)
Detectify Platform

Detectify Platform

language

API Security

Detectify Platform on SecurityListing: Platform for external attack surface management and application security testing

3.8(1)
Permiso

Permiso

language

Threat Intelligence Platforms

Permiso on SecurityListing: Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

3.8(1)
The Pyramid of Pain

The Pyramid of

language

Threat Intelligence Platforms

The Pyramid of Pain on SecurityListing: A cybersecurity concept categorizing indicators of compromise based on their level of difficulty for threat actors to change.

3.8(1)
Bastille-Linux

Bastille-Linux

language

Offensive Security

Bastille-Linux on SecurityListing: Bastille-Linux is a system hardening program that proactively configures the system for increased security and educates users about security settings.

3.8(1)
odix TrueCDR™ Kiosk

odix TrueCDR™ Kiosk

language

Endpoint Protection Platform

odix TrueCDR™ Kiosk on SecurityListing: Secure kiosk for sanitizing USB & uploaded files using CDR technology

3.8(1)
Cynosure Solutions

Cynosure Solutions

United Arab Emirates flag

Network Security

Cynosure Solutions Fzc is an ISO 9001:2015 certified enterprise IT solutions provider headquartered in Sharjah, UAE, serving customers across the Middle East and North Africa. The company offers a bro

3.8(1)
Clutch Universal Non-Human Identity Security Platform

Clutch Universal Non-Human

language

Identity Threat Detection and Response

Clutch Universal Non-Human Identity Security Platform on SecurityListing: Platform for securing non-human identities across cloud, SaaS, and on-prem

3.8(1)
Flying Cloud CrowsNest

Flying Cloud CrowsNest

language

Data Classification

Flying Cloud CrowsNest on SecurityListing: Real-time data surveillance platform for data discovery, monitoring, and threat detection

3.8(1)
Intrinsic-ID

Intrinsic-ID

United States flag

Industrial Control System Security

Intrinsic-ID is the world’s leading digital authentication company and the inventor of SRAM Physical Unclonable Function or SRAM PUF. Intrinsic-ID leverages inherent manufacturing variations in chips

3.8(1)
OpenBSD Manual Page Server

OpenBSD Manual Page

language

Guides

OpenBSD Manual Page Server on SecurityListing: Search OpenBSD manual pages by keyword, section, or manual page name

3.8(1)
ActiveNav

ActiveNav

United States flag

Governance Risk and Compliance Platforms

ActiveNav provide dark data discovery solutions for compliance and information governance. Our cloud platform deploys fast and builds a comprehensive data inventory, presented in dashboards that are

3.8(1)
13 Layers threatINTELLIGENCE

13 Layers threatINTELLIGENCE

language

Threat Intelligence Platforms

13 Layers threatINTELLIGENCE on SecurityListing: NDR solution that blocks malicious traffic before alerts are generated

3.8(1)
A10 Networks

A10 Networks

United States flag

Security Operations

A10 Networks is a leader in application networking, helping organizations of all sizes to accelerate, optimize and secure their applications. Our vision is to protect our customers with best-in-class

3.8(1)
2|SEC Consulting (2-SEC)

2|SEC Consulting (2-SEC)

United Kingdom flag

Cloud Security

At 2|SEC Consulting, we deliver an end-to-end service of cyber and information security solutions which are tailored to each client’s exact security needs. We help organisations to increase their cyb

3.8(1)
Showing 2381 to 2400 of 4175 products