Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Netarx

Security Operations
Netarx provide real-time deepfake detection for enterprise voice, video and email. Current security solutions are not effective against social engineering attacks. Our product, known as the “Flurp” i

ALTR

Data Loss Prevention
ALTR provide software-embedded solutions for data security and privacy. ALTR's programmable data security and governance embeds directly into application code, neutralizing privacy and breach risks f

MirrorTab

Security Operations
MirrorTab is a cyber security company providing advanced web security solutions that defend web applications against cyber threats like hacking and malware. By eliminating the client-side browser att

Cysmo Cyber Risk

Security Operations
Cysmo is an innovative cyber risk assessment platform specifically designed for the needs of the German insurance industry. Cysmo is establishing itself as the standard in German-speaking countries a

Bechtel

Industrial Control System Security
Bechtel’s Industrial Control Systems Cyber Security Laboratory focuses on protecting large-scale industrial and infrastructure systems that support critical infrastructure such as equipment that contr

Coralogix

Security Operations
Coralogix are rebuilding the path to observability using a real-time streaming analytics pipeline that provides monitoring, visualization, and alerting capabilities without the burden of indexing. By

Cleafy

Security Operations
Cleafy are a team of fraud hunters, cybersecurity experts, data scientists, and software engineers. Every day, we work side by side with our customers to help them safely navigate digital opportuniti

Earlybird Venture Capital

Security Operations
Founded in 1997, Earlybird invests in all development and growth phases of technology companies. Earlybird offers its portfolio companies not only financial resources, but also strategic and operation

AT&T Cybersecurity

Compliance Consulting
AT&T Cybersecurity’s Edge-to-Edge technologies provide threat intelligence, collaborative defense, security without the seams, and solutions that fit your business. Cybersecurity Consulting ServicesM

Zymbit

Industrial Control System Security
Zymbit provides hardware security modules (HSM) for IoT devices, including Raspberry Pi and other single board computers. At Zymbit we’re passionate about securing the edge of innovation, where cyber

Human Security

Threat Intelligence Platforms
Human Bot Mitigation Platform enables complete protection from sophisticated bot attacks across advertising, marketing and cybersecurity.

Reality Defender

Security Operations
Reality Defender stops deepfakes before they become a problem. With comprehensive and proactive scanning, actionable results, and detailed reporting, our proprietary deepfake and generative content fi

Fox-IT

Compliance Consulting
Fox-IT prevents, solves and mitigates the most serious cyber threats with smart solutions for governmental bodies, defense, law enforcement, critical infrastructure, banking and large enterprises worl

APrivacy

Data Loss Prevention
APrivacy provides information and communication security products for the financial services industry. Any Device or Platform - Any mobile device (IPhone, Android) and any operating platform (Windows

CYB3R

Compliance Consulting
CYB3R Group, is a leading provider of comprehensive Cyber Security, IT and Communications Solutions. We specialise in safeguarding digital assets and optimising business technology. Our commitment to

Blockchain Slovakia

Security Operations
Blockchain Slovakia is a non-profit organization that brings together researchers, developers, entrepreneurs, regulators, investors and the public to support blockchain technology in Slovakia. Our am

Upfort

Security Operations
Upfort (formerly Paladin Cyber) unifies award-winning security and robust cyber insurance to deliver comprehensive cyber risk solutions. We’re a customer-obsessed team of security, insurance, softwar

Foremost
Digital Forensics and Incident Response
Foremost on SecurityListing: A console program for file recovery through data carving.

Futurex

Data Loss Prevention
Futurex is a globally recognized provider of enterprise-class data encryption solutions. More than 15,000 customers worldwide have trusted Futurex's innovative technology to provide market-leading so

Wiz

Cloud Security
Wiz - the first cloud visibility solution for enterprise security: A 360° view of security risks across clouds, containers and workloads. No agents. No sidecars. Wiz is a cloud native solution that u