Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

CHERI Alliance

Security Operations
CHERI Alliance is an industry initiative spearheading the global adoption of the Capability Hardware Enhanced RISC Instructions (CHERI) security technology across the computing industry. CHERI signif

Cyntegra

Backup as a Service
Cyntegra enables fast, local and complete recovery from ransomware and other cyber attacks. Restore business operations and staff productivity in hours and minutes instead of days, weeks, or months wi

Cyberscope

Security Operations
Cyberscope is a Web3 security firm specializing in smart contract audits, crypto security audits, and blockchain vulnerability assessments. Our team of cyber security engineers and compliance experts

Cybersprint

Brand Protection
Cybersprint's Digital Risk Protection platform continuously maps and monitors your digital footprint so you can make informed decisions on exposure to online threats, identify vulnerabilities and take

MailChannels

Security Operations
MailChannels protects companies against malicious email threats. Used by 750+ hosting providers around the world. MailChannels builds email security products for hosting providers to give users a mor

Allurity

Compliance Consulting
Allurity is a group of tech-enabled cybersecurity service providers, comprised of best-in-class experts with a common mission to enable a safe digital world. Through our group of companies, we offer

Marvel IT

Backup as a Service
Marvel I.T. is a trusted local provider of IT support on Sydney's Northern Beaches, delivering fast, reliable, and security-focused solutions for small to medium-sized businesses. We specialise in ma

DefCamp

Security Operations
DefCamp is the most important annual conference on Hacking & Information Security in Central Eastern Europe. Every year brings together the world’s leading cyber security doers to share latest researc

Material Security

Security Operations
Material is solving one of the most fundamental problems in security: protecting the data sitting in mailboxes. Extend Zero Trust Security to Email. Email is an essential repository of sensitive cont

Block Harbor Cybersecurity

Industrial Control System Security
Block Harbor has worked closely with automakers, suppliers, and regulators since 2014 on vehicle cybersecurity. Now, we’re applying nearly a decade of service by building the Vehicle Security Engineer

Cofense

Threat Intelligence Platforms
Cofense (formerly PhishMe) is a leading provider of human-driven phishing defense solutions. We deliver a collaborative approach to cybersecurity by enabling organization-wide engagement to active ema

ZDL Group

Compliance Consulting
At ZDL (fromerly ZeroDayLab) we believe that effective risk management requires a holistic 360° approach. We take a comprehensive view of our clients cyber security risks and provide quality services

Chartered Institute of

Security Awareness Training
The Chartered Institute of Information Security (CIISec) is the only pure play information and cyber security institution to have been granted Royal Charter status and is dedicated to raising the stan

Backup Systems

Backup as a Service
At Backup Systems we have become the leading backup and disaster recovery systems providers across the UK, and pride ourselves on the efficiency and quality of our services. Always keep your business

C2A Security

Industrial Control System Security
C2A Security offers a comprehensive suite of cyber security solutions for the automotive industry, providing in-vehicle end-to-end protection. With our new multi-layer cyber approach for vehicles, we

EOL IT Services

Security Operations
EOL IT Services is the UK’s most accredited provider of IT Asset Disposal (ITAD), Lifecycle Services and Data Destruction. Since day one we’ve been helping clients big and small with a knowledge and i

CryptoSec.info

Security Operations
CryptoSec.info is a web resource focused on educating the beginners in the cryptocurrency space on how to properly secure their online assets from hackers and scammers. Due to the steady and increasi

Garner Products

Security Operations
Garner design, manufacture, and sell equipment that delivers complete, permanent, and verifiable data elimination. Our products ensure your data is unrecoverable. Our global technical support team an

Amazon Detective
Digital Forensics and Incident Response
Amazon Detective on SecurityListing: A service that analyzes and visualizes security data to investigate potential security issues.

Authentic8

Security Operations
Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.