Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Billington CyberSecurity

Billington CyberSecurity

United States flag

Security Awareness Training

Billington CyberSecurity is a leading, independent education company with an exclusive focus on cybersecurity. The company's flagship event is the Annual Billington CyberSecurity Summit. Since 2010,

3.8(1)
Evoke Security

Evoke Security

United States flag

Security Operations

Evoke Security helps organizations secure agentic AI. Control Your Agentic Security Risks. Discover, monitor, and defend your AI systems and Agents. Current tooling makes it impossible to know your A

3.8(1)
aFFirmFirst

aFFirmFirst

United Kingdom flag

Brand Protection

aFFirmFirst is a unique software solution offering a simple yet effective way for on-line businesses to protect and control their online images and logo. aFFirmFirst can prevent a company having its

3.8(1)
CircleCI

CircleCI

United States flag

Security Operations

CircleCI’s platform allows developers to rapidly release code (for web and mobile apps) they trust by automating the build, test, and deploy process. CircleCI enables developers to detect and fix bugs

3.8(1)
Herbert Smith Freehills

Herbert Smith Freehills

United Kingdom flag

Security Operations

Herbert Smith Freehills is a leading professional services business offering legal services in specialist areas including data protection and privacy. Our data protection and privacy practice is comp

3.8(1)
NetMotion Software

NetMotion Software

United States flag

Security Operations

NetMotion Software specializes in mobile performance management solutions to manage, secure and support the mobile enterprise. Our secure mobility solution keeps your sensitive information safe, no m

3.8(1)
GFI Software

GFI Software

United States flag

Security Operations

GFI Software works with System Administrators, IT Professionals and IT Executives to ensure that their IT infrastructures are monitored, managed, secured and compliant. GFI Security - Monitor, manage

3.8(1)
Ergon Informatik

Ergon Informatik

Switzerland flag

Security Operations

Ergon Informatik AG is Switzerland's leading provider of customised software solutions and software products including fraud detection and the Airlock web security suite. Ergon provide a fraud detect

3.8(1)
DeviceAssure

DeviceAssure

Ireland flag

Security Operations

DeviceAssure enables organizations to reliably identify counterfeit and non-standard devices with a real-time check on a device's authenticity. DeviceAssure offers a transparent way to validate the a

3.8(1)
Codean

Codean

Netherlands flag

Security Operations

The Codean Review Environment automates mundane software analysis tasks, so security experts can focus on finding vulnerabilities. Software is getting more complex, the amount of criminal hackers is

3.8(1)
Blockchain Research Institute (BRI)

Blockchain Research Institute

Canada flag

Security Operations

3.8(1)
Awantec

Awantec

MY flag

Compliance Consulting

Awantec is a prominent provider of Information and Communication Technology services in Malaysia. Our mission is to advance and accelerate the adoption of digitalization throughout Malaysia, driving p

3.8(1)
Hacknoid

Hacknoid

UY flag

Security Operations

Hacknoid is an automated vulnerability management platform that allows a couple of clicks to visualize the cybersecurity status of the entire organization. We provide automatic detection of vulnerabi

3.8(1)
Xtel Communications

Xtel Communications

United States flag

Compliance Consulting

Xtel is a specialist in providing innovative voice and data solutions including Unified Communications, Network Security, Cybersecurity, Network Connectivity and Voice services. CybersecurityOur team

3.8(1)
Dataprovider.com

Dataprovider.com

Netherlands flag

Brand Protection

Dataprovider's Brand Protection Suite gives you the principal tools to discover trademark infringement on the Internet, such as websites selling counterfeit products, even when this is not immediately

3.8(1)
Approachable Certification

Approachable Certification

United Kingdom flag

Security Operations

Approachable Certification is a UKAS accredited certification body offering down-to-earth and competitively priced audits against ISO Management Systems standards. We audit and provide certification

3.8(1)
KTrust

KTrust

Israel flag

Security Operations

KTrust provides Continuous Threat Exposure Management for Kubernetes environments. At KTrust, we redefine Kubernetes (K8s) security. By mastering K8s attack flows, the company empowers DevSecOps by u

3.8(1)
Allstate Identity Protection

Allstate Identity Protection

United States flag

Security Operations

Allstate make it easy to provide complete identity protection, so everyone can live more confidently online. Identity & financial monitoringWe provide advanced monitoring, near real-time alerts, and

3.8(1)
EPIC Insurance Brokers & Consultants

EPIC Insurance Brokers

United States flag

Compliance Consulting

EPIC is an insuarnce broker and consultancy firm. Risk management services include risk consultancy and cybersecurity insurance.

3.8(1)
MrLooquer

MrLooquer

Spain flag

Security Operations

MrLooquer provide a solution to automatically discover the assets of organizations on the internet, determine the level of exposure to attacks and help to manage risk accurately. Complete organizatio

3.8(1)
Showing 2601 to 2620 of 4175 products