Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

MX Layer Email
Data Loss Prevention
MX Layer Email Security on SecurityListing: Cloud-based email security platform with AI-powered threat detection

SOCRadar Digital Risk
Threat Intelligence Platforms
SOCRadar Digital Risk Protection Platform on SecurityListing: A digital risk protection platform that combines threat intelligence, dark web monitoring, attack surface management, brand protection, and supply chain intelligence to detect and respond to external cyber threats.

SonarQube Server
Security Scanning
SonarQube Server on SecurityListing: A self-managed static code analysis platform that conducts continuous inspection of codebases to identify security vulnerabilities, bugs, and code quality issues.

Net Desire Technologies

Data Protection
Net Desire Technologies is a UAE-based cybersecurity and IT solutions provider focusing on data protection, networking, backup and storage, and related infrastructure services. They position themselve

Netsurion Managed Detection
Threat Hunting
Netsurion Managed Detection and Response on SecurityListing: MDR service with 24x7 SOC, XDR platform, and threat hunting capabilities

NetWitness Threat Detection
Endpoint Detection and Response
NetWitness Threat Detection & Response on SecurityListing: XDR platform combining NDR, EDR, SIEM, SOAR & UEBA for threat detection

CSIS Emergency Response
Threat Intelligence Platforms
CSIS Emergency Response Retainers on SecurityListing: 24/7 incident response retainer service with guaranteed availability

NINJIO Cybersecurity Awareness
Security Awareness Training
NINJIO Cybersecurity Awareness Training on SecurityListing: Security awareness training platform using storytelling and personalization

North East Business

Governance Risk and Compliance Platforms
The North East Business Resilience Centre (NEBRC) is a non-profit organisation here to support businesses in the North East of England in protecting themselves from cyber crimes and fraud. Establishe

ServerlessStack Elastic Machine
MLSecOps
ServerlessStack Elastic Machine Learning on SecurityListing: ML platform for anomaly detection, outlier detection, classification & regression

OpenOrigins

Security Operations
OpenOrigins was founded with the mission to create a global trust infrastructure for all organizations and individuals that need real, human, and provable content to function. Deepfakes and Fabricate

Cymph Security Playbooks
Security Orchestration Automation and Response
Cymph Security Playbooks on SecurityListing: A vendor-agnostic product for managing and analyzing cybersecurity playbooks.

Stacklet Autonomous Governance
Cloud Security Posture Management
Stacklet Autonomous Governance on SecurityListing: AI-native cloud governance platform for cost optimization and compliance

Operant AI AI
API Security
Operant AI AI Gatekeeper on SecurityListing: Runtime AI security platform protecting GenAI apps from models to APIs

Stellar Cyber AI-Based
Extended Detection and Response
Stellar Cyber AI-Based Open XDR on SecurityListing: AI-based Open XDR platform integrating NDR, AD, and FW for threat detection

Operant MCP Gateway
API Security
Operant MCP Gateway on SecurityListing: Enterprise security gateway for Model Context Protocol (MCP) ecosystems

Opscompass Configuration Drift
Cloud Security Posture Management
Opscompass Configuration Drift on SecurityListing: Detects & monitors config drift across multi-cloud & hybrid environments

ORNA Breach Response
Digital Forensics and Incident Response
ORNA Breach Response & Digital Forensics on SecurityListing: 24/7 breach response and digital forensics service for incident handling

ORNA End-to-End AI
Threat Intelligence Platforms
ORNA End-to-End AI Cyber Incident Response Platform on SecurityListing: AI-powered cyber incident response platform for training, orchestration & mgmt

OSINTLeak Real-time OSINT
Threat Intelligence Platforms
OSINTLeak Real-time OSINT Leak Intelligence on SecurityListing: Real-time OSINT monitoring for leaked credentials, data, and infrastructure