Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

AuthLite

Security Operations
AuthLite secures your Windows enterprise network authentication. Unlike all competing multi-factor authentication solutions, the unique AuthLite technology teaches your Active Directory how to native

BCN Group

Backup as a Service
BCN Group is an agile IT solutions provider. We are experts in delivering and managing business-critical technology solutions. Our Managed IT support services provide a fully managed solution for all

Beta Systems Software

Governance Risk and Compliance Platforms
Beta Systems automate IT-based business processes, control access rights across all platforms securely and reliably, monitor processes, secure the network and optimize the infrastructure management of

DLA Piper

Security Operations
DLA Piper is a global law firm with more than 4,200 lawyers located throughout the Americas, Asia Pacific, Europe and the Middle East. Practice areas include Cybersecurity. In today's interconnected

BioCatch

Security Operations
BioCatch uses behavioral biometrics for fraud prevention and detection. Continuous authentication for web and mobile applications to prevent new account fraud. Founded in 2011 by experts in neural sc

BI.ZONE

Brand Protection

S2S Group

Security Operations
S2S Group specialise in the destruction and management of IT assets at the end of the lifecycle. We provide a complete package of in-house’ specialised asset security services, assiting clients in al

Coana

Security Operations
Coana helps software teams tackle the flood of alerts from traditional SCA tools. Using advanced reachability analysis, Coana cuts false alerts by over 80%, freeing up significant engineering time wit

DeNexus

Industrial Control System Security
DeNexus is the leading provider of cyber risk modeling for industrial networks. Our Mission is to build the Global Standard for Industrial Cyber Risk Quantification. Powered by probabilistic inferenc

Continuum

Backup as a Service
Continuum is the IT management platform company that allows Managed IT Services Providers (MSPs) to maintain and back up on-premise and cloud-based servers, desktops, mobile devices and other endpoint

BlackOwlCybers

Compliance Consulting
BlackOwlCybers is a dedicated cybersecurity firm providing comprehensive solutions to protect businesses from evolving digital threats. With our experienced team and cutting-edge technologies, we prio

Alchemy Security Consulting

Compliance Consulting
Alchemy Security Consulting specialise in offensive and defensive cyber security. We find the weak link in your security so you can patch it up fast and avoid being hacked.

Dale Peterson

Compliance Consulting
Dale Peterson, a leading ICS security and control system IT information expert, provides consulting services to assess and improve the security of SCADA and DCS that runs an organization’s critical in

ACME Communications

Managed Security Service Providers

Cybersecurity Dubai

Compliance Consulting
Welcome to our cybersecurity company in Dubai! We are a leading provider of top-notch cybersecurity consultant solutions to businesses of all sizes. Our team of experienced professionals is dedicated

Tracer

Brand Protection
Tracer (formerly Appdetex) is a next-generation brand protection solution. It constantly finds, analyzes, and stops brand abuse across Web2 and Web3 digital channels. Tracer’s Human-in-the-Loop AI br

Cienaga Systems

Threat Intelligence Platforms
Cienaga Systems is a leader in autonomous cyber threat hunting technology. Cienaga Systems' DejaVu is the easiest way for organizations to deploy world-class threat hunting and security monitoring an

ZILLIONe

Compliance Consulting
ZILLIONe is one of Sri Lanka´s top enterprise technology solutions providers with exceptional global partnerships, renowned technology providers and excellent in-house development skills. We offer va

Jetico

Data Loss Prevention
Jetico provides pure & simple data protection software for all sensitive information throughout the lifecycle. Powerful yet easy to use, BCWipe and BestCrypt are engineered for a wide range of users:

CRI Group

Governance Risk and Compliance Platforms
CRI Group excels at deterring, detecting and investigating crimes against businesses. We achieve success using a global network of professionals specially trained in Anti-Corruption, Risk Management a