Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.
Keeran Networks

Backup as a Service
Established in 1999 in Edmonton, Keeran offers businesses specialized IT support and solutions to optimize technology investments. Our tailored strategies enhance connectivity, communication, and secu
AEWIN Technologies

Security Operations
A wealth of security options have evolved with the constantly changing landscape of cybersecurity threats. A network appliance acting as the basis to host a suite of security appliances is an attracti
Conatix

Security Operations
Conatix was formed to apply recent advances in AI and other fields of technology to insider fraud, one of the most intractable problems in cybersecurity. The Conatix CYberSecurity ANAlytics (CYSANSA)
Common Good Cyber

Security Operations
Common Good Cyber is a global initiative with the goal of identifying and implementing innovative models for sustaining groups, organizations, and individuals involved in critical cybersecurity functi
Austrian Trust Circle

Security Operations
The Austrian Trust Circle is an initiative of CERT.at and the Austrian Federal Chancellery and consists of Security Information Exchanges in the individual areas of the strategic information infrastru
CCX Technologies

Security Operations
CCX Technologies design and develop a wide range of cybersecurity and testing solutions for the aviation, and military and government markets. We’ve developed cybersecurity software and hardware plat
Central Intelligence Agency

Security Operations
The CIA is an independent agency responsible for providing national security intelligence to senior US policymakers. This includes cyber security related activities under the Directorate of Science &
CyberNews

Security Operations
Cybernews.com is a research-based online publication that helps people navigate a safe path through their increasingly complex digital lives. Our CyberNews Investigation team uses white-hat hacking t
CyberCareers.gov

Security Operations
CyberCareers.gov was created as part of the Federal Cybersecurity Workforce Strategy to provide a platform for Cybersecurity Job Seekers, Federal Hiring Managers and Supervisors, Current Federal Cyber
Assure IT

Governance Risk and Compliance Platforms
Assure IT is a Singapore company specialising in technology governance, risk and compliance. Cybersecurity is an important enterprise risk. Assure IT adopts a holistic, end-to-end framework to cybers
Darwinium

Security Operations
Darwinium is a Cyberfraud Prevention Platform that provides scalable customer journey protection without complexity. Security and fraud solutions typically risk-assess specific digital interactions r
Cybercrime Support Network

Security Operations
Cybercrime Support Network (Cybercrime Support Network (CSN) is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and
Critifence

Industrial Control System Security
Critifence provides unique Cyber Security solutions designed for Critical Infrastructure, SCADA and Industrial Control Systems which allow to monitor and control OT network easily and totally passivel
Agari

Brand Protection
Agari is the Trusted Email Identity Company™, protecting brands and people from devastating phishing and socially-engineered attacks. Using applied data science and a diverse set of signals, Agari pro
CESAR

Security Operations
CESAR is one of the premier R+D and innovation centers in Brazil. We have a multidisciplinary team of more than 1,100 associates who are highly educated and skilled in advanced technologies such as bl
California Cybersecurity Institute

Security Operations
The California Cybersecurity Institute (CCI) is a multi-agency effort to protect California through enhanced cybercrime forensics and statewide tactical response training. Our partners are the Califor
Crossword Cybersecurity

Security Operations
Crossword Cybersecurity is a technology commercialisation company focusing exclusively on the cyber security sector. We work with research intensive European university partners to identify promising
Cribl

Security Operations
Cribl, the Data Engine for IT and Security, empowers organizations to transform their data strategy. Powered by a data processing engine purpose-built for IT and Security, Cribl’s product suite is a
LegalByte

Digital Forensics and Incident Response
LegalByte is a leading provider of comprehensive legal and forensic services dedicated to addressing the complex challenges of the digital age. With a specialized focus on cyber and crypto-related is
ClearSale (CLSA3)

Security Operations
Clearsale’s innovative fraud solutions combine advanced technology with a passionate team of seasoned experts that understand every client’s unique needs. ClearSale, with more than two decades of exp