Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Cybersec Feeds

Cybersec Feeds

language

Threat Intelligence Platforms

Cybersec Feeds on SecurityListing: A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

3.8(1)
Hyve AI Labs

Hyve AI Labs

United Arab Emirates flag

AI Security

Hyve AI Labs is a Dubai-based software development company that focuses on AI-driven product development and digital transformation for fintechs, healthcare providers, banks, and government agencies.

3.8(1)
Digital Companion

Digital Companion

AD flag

AI Security

Digital Companion is a cybersecurity firm specializing in operational security and Governance, Risk, and Compliance (GRC). They operate in research, investigations, and development, focusing on buildi

3.8(1)
Ejabi InfoSec

Ejabi InfoSec

United Arab Emirates flag

GRC

Ejabi InfoSec is a cybersecurity consulting company that specializes in PCI compliance, IT risk assessment, ISO consultancy, and cybersecurity engineering. It guides and validates clients against PCI

3.8(1)
DBAppSecurity AiLog Big Data Log Management and Analysis Platform

DBAppSecurity AiLog Big

language

Threat Intelligence Platforms

DBAppSecurity AiLog Big Data Log Management and Analysis Platform on SecurityListing: Big data log management platform for collection, parsing, storage & analysis

3.8(1)
Ekasha Incident Management

Ekasha Incident Management

language

Security Orchestration Automation and Response

Ekasha Incident Management on SecurityListing: Incident management platform with automation, workflows, and playbooks

3.8(1)
ERM Protect Digital Forensics

ERM Protect Digital

language

Digital Forensics and Incident Response

ERM Protect Digital Forensics on SecurityListing: Digital forensics services provided by ERM Protect

3.8(1)
Flyingduck Code Security Intelligence

Flyingduck Code Security

language

Software Composition Analysis

Flyingduck Code Security Intelligence on SecurityListing: SAST tool that detects logical flaws and business logic vulnerabilities

3.8(1)
Gradient Cyber Quorum™

Gradient Cyber Quorum™

language

Threat Intelligence Platforms

Gradient Cyber Quorum™ on SecurityListing: Unified threat detection platform for network, endpoint, cloud, and user telemetry

3.8(1)
Granef

Granef

language

Digital Forensics and Incident Response

Granef on SecurityListing: A network forensics toolkit that transforms network traffic data into graph-based representations for interactive analysis and visualization through a web interface.

3.8(1)
Guardpot AI-Powered Cyber Deception

Guardpot AI-Powered Cyber

language

Threat Intelligence Platforms

Guardpot AI-Powered Cyber Deception on SecurityListing: AI-powered deception platform using honeypots to detect & disrupt attacks

3.8(1)
iC Consult IAM Consulting

iC Consult IAM

language

Privileged Access Management

iC Consult IAM Consulting on SecurityListing: IAM consulting services for strategy, assessment, roadmap, and implementation

3.8(1)
Innvikta Cybersecurity

Innvikta Cybersecurity

language

Security Awareness Training

Innvikta Cybersecurity on SecurityListing: Security awareness training provider focused on cybersecurity education

3.8(1)
IronCircle Cybersecurity Training Platform

IronCircle Cybersecurity Training

language

Security Awareness Training

IronCircle Cybersecurity Training Platform on SecurityListing: AI-powered browser-based cybersecurity training platform with labs and certs

3.8(1)
Mesh Gateway

Mesh Gateway

language

Email Security Platforms

Mesh Gateway on SecurityListing: Email security gateway protecting against phishing, BEC, and email-borne threats

3.8(1)
PentesterLab Master Advanced Web Hacking

PentesterLab Master Advanced

language

Penetration Testing

PentesterLab Master Advanced Web Hacking on SecurityListing: Online platform for web app security training via hands-on labs and code review

3.8(1)
Atropos

Atropos

United States flag

Security Operations

AI-powered vulnerability detection and custom fixes for photovoltaic systems. Protect your assets and the grid from evolving cyber threats. The rapid expansion of solar energy has created a dangerous

3.8(1)
Zerobait

Zerobait

UN flag

Brand Protection

Zerobait is a SaaS platform for brand protection. We process millions of data points and use AI/ML to detect phishing and impersonation sites targeting our clients, helping businesses prevent fraud an

3.8(1)
Zen360Consult

Zen360Consult

BH flag

Compliance Consulting

Zen360Consult provides Advisory and Training services in the field of Cyber Resilience, which includes Cyber Security /ISMS and Business Continuity. We advise organizations to safeguard their most imp

3.8(1)
Axiler

Axiler

Singapore flag

Cloud Security

Axiler is a visionary cybersecurity company, where innovation meets resilience. Through the elegance of AI-driven self-healing architecture, we seamlessly detect, patch, and neutralize threats in real

3.8(1)
Showing 2541 to 2560 of 4175 products