Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Somansa Privacy-i
Data Classification
Somansa Privacy-i on SecurityListing: Enterprise DLP solution for endpoint, network, and print data leakage prevention

READI Access Studio
Identity Governance and Administration
READI Access Studio on SecurityListing: Identity automation platform with access policy, workflow, and connector mgmt

zeroRISC Integrity Management
Endpoint Protection Platform
zeroRISC Integrity Management Platform on SecurityListing: Device trust mgmt platform using OpenTitan secure silicon for IoT/edge/DC

Zeronsec Threat Intelligence
Threat Intelligence Platforms
Zeronsec Threat Intelligence on SecurityListing: Threat intelligence platform for detection, hunting, and remediation

READI Connector Studio
Identity Governance and Administration
READI Connector Studio on SecurityListing: Low-code platform for building custom identity connectors for IGA systems

READI Smart Connectors
Identity Governance and Administration
READI Smart Connectors on SecurityListing: Low-code connector platform for extending IGA to disconnected applications

Reverse Engineering HID
Offensive Security
Reverse Engineering HID iClass Master Keys on SecurityListing: Exploiting a vulnerability in HID iClass system to retrieve master authentication key for cloning cards and changing reader settings.

Risk Cognizance GRC
Risk Assessment
Risk Cognizance GRC Software Platform on SecurityListing: GRC platform for risk management, compliance tracking, and governance processes

RoboShadow Vulnerability Scanner
Vulnerability Assessment
RoboShadow Vulnerability Scanner on SecurityListing: Vulnerability scanner for internal & external network security assessment

SecurityVulnerability.io
Vulnerability Assessment
SecurityVulnerability.io on SecurityListing: SecurityVulnerability.io simplifies the process of collecting, enriching, and presenting vulnerability information for both human and machine consumption.

SCANOSS Geo Provenance
Risk Assessment
SCANOSS Geo Provenance Dataset on SecurityListing: Identifies geographic origin and authorship of open source code components

Securden Enterprise Password
API Security
Securden Enterprise Password Manager on SecurityListing: Enterprise password vault for IT teams with centralized storage and sharing

Somansa Webkeeper
Next-Generation Firewalls
Somansa Webkeeper on SecurityListing: SSL/TLS decryption & malicious site blocking solution with AI control

Somansa Privacy-i EDR
Endpoint Detection and Response
Somansa Privacy-i EDR on SecurityListing: Next-gen antivirus & EDR with pattern/behavior detection engines

Sequretek Percept CTEM
Risk Assessment
Sequretek Percept CTEM on SecurityListing: AI-powered CTEM platform for asset visibility, risk prioritization & remediation

Sumo Logic Application
Security Information and Event Management
Sumo Logic Application Modernization on SecurityListing: Cloud-based log analytics & monitoring platform for app modernization

Safing Portmaster
Next-Generation Firewalls
Safing Portmaster on SecurityListing: An open-source application firewall that monitors and controls network traffic with custom filtering rules and real-time visibility into application connections.

Symbiotic Security
Security Awareness Training
Symbiotic Security on SecurityListing: Real-time AI-powered code security tool for IDE vulnerability detection & fix

Symmetry Modern Data
Data Classification
Symmetry Modern Data Security Platform on SecurityListing: DSPM and DDR platform for data discovery, classification, monitoring & response

The Hacker News
Offensive Security
The Hacker News on SecurityListing: The Hacker News is a leading cybersecurity news platform providing updates, insights, and information to professionals and enthusiasts in the field.