Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

ID North Identity
Identity Governance and Administration
ID North Identity Governance and Administration (IGA) on SecurityListing: IGA solution for managing digital identities and access permissions

ThreatBook Intelligence-First Detection
Brand Protection
ThreatBook Intelligence-First Detection & Response on SecurityListing: Intelligence-driven threat detection & response platform with APAC focus

syslog-ng Store Box
Security Information and Event Management
syslog-ng Store Box on SecurityListing: Enterprise log management appliance for collecting, indexing, and searching logs

Supply Wisdom Real-time
Risk Assessment
Supply Wisdom Real-time Alerts on SecurityListing: Real-time alert system for monitoring third-party vendor risks and events

InfoSec4TC Cyber Security
Penetration Testing
InfoSec4TC Cyber Security Courses on SecurityListing: Online cybersecurity training platform with 150+ courses and hands-on labs

Sucuri Website Security
Next-Generation Firewalls
Sucuri Website Security on SecurityListing: Cloud-based website security platform with WAF, malware removal, and CDN

StrikeOne Attack Surface
Risk Assessment
StrikeOne Attack Surface Management on SecurityListing: External attack surface management platform with AI-powered risk analysis

YourWebsite WordPress Plugin
Security Scanning
YourWebsite WordPress Plugin Table of Contents Plus on SecurityListing: Scanner for WordPress Table of Contents Plus plugin path disclosure vuln

Stealth-ISS Cybersecurity Risk
Risk Assessment
Stealth-ISS Cybersecurity Risk Assessment on SecurityListing: Cybersecurity risk assessment service for breach prevention & insurance reqs

Censinet One™
Risk Assessment
Censinet One™ on SecurityListing: On-demand cyber risk mgmt platform for healthcare third-party & enterprise risk

Galia IT Dedicated
Threat Intelligence Platforms
Galia IT Dedicated SOC on SecurityListing: Managed SOC service with dedicated security teams for IT and OT environments

ZAMA
Data Masking
ZAMA on SecurityListing: Zama's fhEVM Coprocessor is an open-source tool for developing applications using Fully Homomorphic Encryption, enabling privacy-preserving computations in various domains.

Standss EmailMerge COM
Data Classification
Standss EmailMerge COM Add-in on SecurityListing: Outlook add-in for sending personalized bulk emails via mail merge

Standss SendGuard for
Data Loss Prevention
Standss SendGuard for Outlook on SecurityListing: Outlook add-in for email DLP, compliance, and accidental send prevention

SpyCloud Identity Threat
Identity Threat Detection and Response
SpyCloud Identity Threat Protection on SecurityListing: Monitors dark web for exposed credentials and PII to prevent account takeover

Comodo Website Security
Next-Generation Firewalls
Comodo Website Security on SecurityListing: Website security platform with WAF, CDN, malware scanning, and backup

Soveren DSPM for
Data Classification
Soveren DSPM for Application Environments on SecurityListing: DSPM solution for Kubernetes & AWS environments with real-time data discovery

Sophos Firewall
Threat Intelligence Platforms
Sophos Firewall on SecurityListing: Next-gen firewall with SD-WAN, ZTNA, and automated threat response capabilities

Sonrai WALLy
Privileged Access Management
Sonrai WALLy on SecurityListing: AI agent for cloud PAM that identifies privilege risks and automates fixes

Identity Digital

Brand Protection
Identity Digital simplifies and connects a fragmented online world with domain names and related technologies that allow people and businesses to build, market and own their digital identities. We’re