Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

AuthLite

AuthLite

United States flag

Security Operations

AuthLite secures your Windows enterprise network authentication. Unlike all competing multi-factor authentication solutions, the unique AuthLite technology teaches your Active Directory how to native

3.8(1)
BCN Group

BCN Group

United Kingdom flag

Backup as a Service

BCN Group is an agile IT solutions provider. We are experts in delivering and managing business-critical technology solutions. Our Managed IT support services provide a fully managed solution for all

3.8(1)
Beta Systems Software

Beta Systems Software

Germany flag

Governance Risk and Compliance Platforms

Beta Systems automate IT-based business processes, control access rights across all platforms securely and reliably, monitor processes, secure the network and optimize the infrastructure management of

3.8(1)
DLA Piper

DLA Piper

United Kingdom flag

Security Operations

DLA Piper is a global law firm with more than 4,200 lawyers located throughout the Americas, Asia Pacific, Europe and the Middle East. Practice areas include Cybersecurity. In today's interconnected

3.8(1)
BioCatch

BioCatch

Israel flag

Security Operations

BioCatch uses behavioral biometrics for fraud prevention and detection. Continuous authentication for web and mobile applications to prevent new account fraud. Founded in 2011 by experts in neural sc

3.8(1)
BI.ZONE

BI.ZONE

Russia flag

Brand Protection

3.8(1)
S2S Group

S2S Group

United Kingdom flag

Security Operations

S2S Group specialise in the destruction and management of IT assets at the end of the lifecycle. We provide a complete package of in-house’ specialised asset security services, assiting clients in al

3.8(1)
Coana

Coana

Denmark flag

Security Operations

Coana helps software teams tackle the flood of alerts from traditional SCA tools. Using advanced reachability analysis, Coana cuts false alerts by over 80%, freeing up significant engineering time wit

3.8(1)
DeNexus

DeNexus

United States flag

Industrial Control System Security

DeNexus is the leading provider of cyber risk modeling for industrial networks. Our Mission is to build the Global Standard for Industrial Cyber Risk Quantification. Powered by probabilistic inferenc

3.8(1)
Continuum

Continuum

United Kingdom flag

Backup as a Service

Continuum is the IT management platform company that allows Managed IT Services Providers (MSPs) to maintain and back up on-premise and cloud-based servers, desktops, mobile devices and other endpoint

3.8(1)
BlackOwlCybers

BlackOwlCybers

United States flag

Compliance Consulting

BlackOwlCybers is a dedicated cybersecurity firm providing comprehensive solutions to protect businesses from evolving digital threats. With our experienced team and cutting-edge technologies, we prio

3.8(1)
Alchemy Security Consulting

Alchemy Security Consulting

Australia flag

Compliance Consulting

Alchemy Security Consulting specialise in offensive and defensive cyber security. We find the weak link in your security so you can patch it up fast and avoid being hacked.

3.8(1)
Dale Peterson

Dale Peterson

United States flag

Compliance Consulting

Dale Peterson, a leading ICS security and control system IT information expert, provides consulting services to assess and improve the security of SCADA and DCS that runs an organization’s critical in

3.8(1)
ACME Communications

ACME Communications

HK flag

Managed Security Service Providers

3.8(1)
Cybersecurity Dubai

Cybersecurity Dubai

United Arab Emirates flag

Compliance Consulting

Welcome to our cybersecurity company in Dubai! We are a leading provider of top-notch cybersecurity consultant solutions to businesses of all sizes. Our team of experienced professionals is dedicated

3.8(1)
Tracer

Tracer

United States flag

Brand Protection

Tracer (formerly Appdetex) is a next-generation brand protection solution. It constantly finds, analyzes, and stops brand abuse across Web2 and Web3 digital channels. Tracer’s Human-in-the-Loop AI br

3.8(1)
Cienaga Systems

Cienaga Systems

United States flag

Threat Intelligence Platforms

Cienaga Systems is a leader in autonomous cyber threat hunting technology. Cienaga Systems' DejaVu is the easiest way for organizations to deploy world-class threat hunting and security monitoring an

3.8(1)
ZILLIONe

ZILLIONe

LK flag

Compliance Consulting

ZILLIONe is one of Sri Lanka´s top enterprise technology solutions providers with exceptional global partnerships, renowned technology providers and excellent in-house development skills. We offer va

3.8(1)
Jetico

Jetico

Finland flag

Data Loss Prevention

Jetico provides pure & simple data protection software for all sensitive information throughout the lifecycle. Powerful yet easy to use, BCWipe and BestCrypt are engineered for a wide range of users:

3.8(1)
CRI Group

CRI Group

United Kingdom flag

Governance Risk and Compliance Platforms

CRI Group excels at deterring, detecting and investigating crimes against businesses. We achieve success using a global network of professionals specially trained in Anti-Corruption, Risk Management a

3.8(1)
Showing 2561 to 2580 of 4175 products