Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

US Insider Risk Management Center of Excellence (US-InRM)

US Insider Risk

United States flag

Security Operations

We offer Best Practices/Guidance, Training, Research/Thought Leadership, and Information Sharing & Events.

3.8(1)
CORDIS

CORDIS

LU flag

Security Operations

CORDIS is the European Commission's primary public repository and portal to disseminate information on all EU-funded research projects and their results in the broadest sense. This includes a large nu

3.8(1)
International Data Sanitization Consortium (IDSC)

International Data Sanitization

UN flag

Security Operations

International Data Sanitization Consortium is a group composed of individuals and companies dedicated to standardizing terminology and practices across the data sanitization industry. Our purposes is

3.8(1)
D-Fence

D-Fence

Finland flag

Threat Intelligence Platforms

D-Fence high availability security service protects corporate email communication, the company and it's employee's against cyber threats. D-Fence is the leading email security provider in Finland. Gr

3.8(1)
CredShields

CredShields

Singapore flag

Security Operations

CredShields secure smart contracts, protocols, and enterprise applications with AI-powered audits and global compliance standards. At CredShields, we don’t just react to hacks, we predict and prevent

3.8(1)
DestructData

DestructData

United States flag

Security Operations

DestructData is a leading independent provider of End of Life data destruction/security solutions. As a pioneer in this challenging  field, we have worked with the industry’s leading vendors, data re

3.8(1)
Fluency Security

Fluency Security

United States flag

Security Operations

Fluency is the only Security Analytics & Orchestration (SAO) solution that automates correlation, detection, validation and ongoing tracking.

3.8(1)
Liquis Inc.

Liquis Inc.

United States flag

Security Operations

Data Destruction ServicesLiquis provides data destruction services that businesses can count on to keep their data handling practices compliant with Sarbanes-Oxley, HIPAA, and other industry-specific

3.8(1)
Profian

Profian

United States flag

Data Loss Prevention

Profian’s hardware-based solutions maintain your data's confidentiality and integrity in use, providing true confidential computing to meet regulatory and audit requirements. Deploy applications with

3.8(1)
Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

Cybersecurity Center for

United States flag

Industrial Control System Security

The goal of the Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS) is to conduct research and develop innovative cybersecurity technologies, tools, and methodologies that advanc

3.8(1)
Nitrokey

Nitrokey

Germany flag

Data Loss Prevention

Nitrokey is the world-leading company in open source security hardware. Nitrokey develops IT security hardware for data encryption, key management and user authentication. All Nitrokeys are produced

3.8(1)
Cyacomb

Cyacomb

United Kingdom flag

Digital Forensics and Incident Response

Cyacomb (formerly Cyan Forensics)  helps police forces catch criminals by finding digital evidence fast. Cyacomb provides digital forensics software to help police forces find evidence on computers m

3.8(1)
Get Indemnity

Get Indemnity

United Kingdom flag

Security Operations

Get Indemnity are specialist insurance brokers with experience working on a wide range of innovative business insurance products that combine risk management, indemnity and incident response services.

3.8(1)
XY Cyber

XY Cyber

XK flag

Governance Risk and Compliance Platforms

XY Cyber enable Generative AI for Cyber Operations. We simplify the complex world of cyber threats into actionable strategies, empowering your defense with AI-powered solutions. Security AssessmentLe

3.8(1)
972VC

972VC

Israel flag

Security Operations

972VC was created to help entrepreneurs find potential funding for their startups. Your guide to the Israeli startup funding ecosystem. 972VC is a place for entrepreneurs and startups in Israel to se

3.8(1)
GroupSense Ransomware Readiness

GroupSense Ransomware Readiness

language

Digital Risk Protection

GroupSense Ransomware Readiness on SecurityListing: Ransomware preparedness & response service with playbooks and negotiation

3.8(1)
Barbara IoT

Barbara IoT

Spain flag

Industrial Control System Security

Barbara is the IoT device platform for professional IoT deployments. It offers the required security, support, maintenance and tools to manage a scalable IoT implementation. Barbara is an industrial

3.8(1)
HPE Aruba Networking

HPE Aruba Networking

United States flag

Security Operations

HPE Aruba Networking, a Hewlett Packard Enterprise company, is a leading provider of next-generation network access solutions for the mobile enterprise, Infrastructure services are offered as softwar

3.8(1)
Aurva

Aurva

United States flag

Data Loss Prevention

Aurva are a team of engineers, product thinkers, and security minds who believe that data security should be simple, powerful, and built for speed. Securing data in modern cloud environments is no lo

3.8(1)
Boecore

Boecore

United States flag

Compliance Consulting

Boecore is an aerospace and defense engineering company that specializes in software solutions, systems engineering, cybersecurity, enterprise networks, and mission operations. Cybersecurity Operatio

3.8(1)
Showing 2641 to 2660 of 4175 products