Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Baker Donelson

Baker Donelson

United States flag

Security Operations

Baker Donelson is a law firm with a team of more than 700 attorneys and advisors representing more than 30 practice areas including Data Protection, Privacy and Cybersecurity. Baker Donelson's Data P

3.8(1)
AdEPT Technology Group

AdEPT Technology Group

United Kingdom flag

Threat Intelligence Platforms

AdEPT are a managed services and telecommunications provider offering award-winning, proven and uncomplicated technical solutions for over 12,000 organisations across the UK. We specialise in convergi

3.8(1)
NordStellar

NordStellar

Netherlands flag

Security Operations

NordStellar is a threat exposure management platform that enables you to detect and respond to cyber threats targeting your company, before they escalate. Give your security teams visibility into how

3.8(1)
Antigen Security

Antigen Security

United States flag

Compliance Consulting

Antigen Security is a Digital Forensics, Incident Response and Recovery Engineering firm helping businesses and service providers prepare for, respond to, and recover from cyber threats. Antigen Secu

3.8(1)
Aurec

Aurec

Australia flag

Security Operations

Aurec provides specialist recruitment and contracting services, including ICT professionals. Aurec have created a specialist professional services divisions that focus on IT & Technology, Banking & F

3.8(1)
AirMDR

AirMDR

United States flag

Security Operations

Designed by experts, AirMDR solutions cater to the unique demands of security operations centers. AirMDR delivers the first Managed Detection and Response (MDR) service primarily operated by AI-power

3.8(1)
AdvIntel

AdvIntel

United States flag

Threat Intelligence Platforms

AdvIntel is a next-generation threat prevention and loss prevention company launched by a team of certified investigators, reverse engineers, and security experts. We offer state-of-the-art solutions

3.8(1)
CIO Dive

CIO Dive

United States flag

Security Operations

CIO Dive provides news and analysis for IT executives in areas including IT strategy, cloud computing, cyber security, big data, AI, software, infrastructure, dev ops and more. Our mission is to prov

3.8(1)
Aujas Cybersecurity

Aujas Cybersecurity

India flag

Compliance Consulting

Aujas Cybersecurity, an NSEIT Company, is an enterprise security service provider for organizations across North America, Asia Pacific, and EMEA regions. Aujas has deep expertise and capabilities in

3.8(1)
European Society of Criminology (ESC)

European Society of

Switzerland flag

Security Operations

The ESC Working Group on Cybercrime is geared to the various aspects of cybercrime, including but not limited to: different forms that cybercrime can take (e.g., hacking, fraud, malicious software inf

3.8(1)
Buchanan Technologies

Buchanan Technologies

United States flag

Backup as a Service

Buchanan Technologies is a leading IT consulting and outsourcing services firm. Our methodology transforms everyday technology investments into streamlined, secure and scalable solutions that support

3.8(1)
ThetaRay

ThetaRay

Israel flag

Industrial Control System Security

ThetaRay’s solution for Industrial cyber security protects against unknown zero-day malware, targeted APT attacks, and sophisticated Stuxnet-like state sponsored cyber-attacks that target critical inf

3.8(1)
Antivirus Tales

Antivirus Tales

United States flag

Threat Intelligence Platforms

Antivirus Tales offers a platform to resolve all types of antivirus-related issues. The platform also provide various blog articles and informative guides to fix antivirus software errors.

3.8(1)
CrashPlan

CrashPlan

United States flag

Backup as a Service

CrashPlan delivers secure, continuous endpoint backup and recovery for businesses of all sizes. Our solution ensures data resilience by protecting critical files from ransomware, accidental deletion,

3.8(1)
Kingsley Napley

Kingsley Napley

United Kingdom flag

Security Operations

Cyber crime is an area of growing legal complexity. Our team of cyber crime lawyers have vast experience of the law in this area and defending those accused of cyber crime, as well as those affected b

3.8(1)
WTW

WTW

United Kingdom flag

Security Operations

WTW (formerly Willis Towers Watson) provide data-driven, insight-led solutions in the areas of people, risk and capital that make your organization more resilient, motivate your workforce, and maximiz

3.8(1)
DevOcean

DevOcean

Israel flag

Security Operations

DevOcean, the leader in Cybersecurity Exposure Remediation, helps organizations cut through the chaos by automatically consolidating, prioritizing, and streamlining fixes faster across all teams and a

3.8(1)
KDM Analytics

KDM Analytics

Canada flag

Governance Risk and Compliance Platforms

KDM Analytics software products automate the NIST risk management framework (RMF) assessment for operational technology (OT) systems. Our products quantify a system’s exposure to cyber-attacks and he

3.8(1)
Woz U

Woz U

United States flag

Security Awareness Training

Woz U provides best-in-class technology training for Learners, Higher-Ed Institutions and Corporations. We focus on the most in-demand occupations such as Software Development, Data Science and Cyber

3.8(1)
Arkose Labs

Arkose Labs

United States flag

Security Operations

Arkose Labs' Fraud and Abuse Platform combines Telemetry and adaptive Enforcement Challenges to break down the ROI of fraudsters and protect digital businesses. Monetary gain is what fuels today’s cy

3.8(1)
Showing 2801 to 2820 of 4175 products