Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

ITButler e-Services

ITButler e-Services

Saudi Arabia flag

Governance Risk and Compliance Platforms

4.7(2)
Hacker101

Hacker101

language

Guides

Hacker101 on SecurityListing: Free online class for web security and hacking

4.7(2)
Guardian Data Destruction

Guardian Data Destruction

United States flag

Security Operations

Guardian Data Destruction provides a comprehensive suite of onsite e-data destruction services, ranging from hard drive shredding, NSA degaussing and DOD erasure on desktop and data center equipment t

4.7(2)
Pulsedive

Pulsedive

language

Threat Hunting

Pulsedive on SecurityListing: Pulsedive is a threat intelligence platform that provides frictionless threat intelligence for growing teams, offering features such as indicator enrichment, threat research, and API integration.

4.7(2)
Hemaya IT

Hemaya IT

EG flag

Data Protection

Hemaya IT Security is a cybersecurity company delivering trusted security solutions and digital transformation support for enterprises across the Middle East and North Africa. The company emphasizes c

4.7(2)
Debevoise & Plimpton

Debevoise & Plimpton

United States flag

Compliance Consulting

Debevoise & Plimpton LLP is a premier law firm with market-leading practices in areas including Data Strategy & Security. The Debevoise Data Strategy & Security (DSS) practice is global and interdisc

4.7(2)
Adsigo

Adsigo

Germany flag

Compliance Consulting

Adsigo AG is your reliable and professional partner for all topics concerning PCI certification, compliance and information security. Trust in our more than 15 years of audit experience, internationa

4.7(2)
DuskRise Security Dashboard

DuskRise Security Dashboard

language

Security Information and Event Management

DuskRise Security Dashboard on SecurityListing: Security dashboard for remote network visibility and policy enforcement

4.7(2)
Arkime

Arkime

language

Network Detection and Response

Arkime on SecurityListing: Arkime is an open-source network capture and analysis tool that provides comprehensive network visibility, facilitating swift identification and resolution of security and network issues.

4.7(2)
Abusix

Abusix

Germany flag

Threat Intelligence Platforms

Abusix specializes in Internet security, network abuse handling, antispam and fraud prevention. Our mission is to help ISPs & Internet companies solve the rapidly growing problem of outgoing spam and

4.7(2)
Mobilen Secure Mobile Network

Mobilen Secure Mobile

language

Mobile Device Management

Mobilen Secure Mobile Network on SecurityListing: Secure mobile network with post-quantum encryption and SIM swap protection

4.7(2)
Invicti Software Composition Analysis

Invicti Software Composition

language

Vulnerability Assessment

Invicti Software Composition Analysis on SecurityListing: SCA tool with proof-based validation and runtime analysis for open-source risks

4.7(2)
xargs

xargs

language

Offensive Security

xargs on SecurityListing: A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.

4.7(2)
Fireware

Fireware

United Arab Emirates flag

Network Security

Fireware is a cybersecurity-focused company operating in the Middle East, providing information security solutions, data center and connectivity capabilities, and security platform partnerships. The c

4.7(2)
Airbus Cybersecurity

Airbus Cybersecurity

France flag

Compliance Consulting

We provide a global cyber defence approach that dynamically aims to protect, detect and respond to cyber threats with a portfolio including managed security services, industrial control system offerin

4.7(2)
Tulpa AI

Tulpa AI

United Kingdom flag

Penetration Testing

Tulpa develops safe AI assistants (co-pilots) to support and enhance human performance in high-stakes, mission-critical decision-making environments. We enable high-performance, high-value, scalable w

4.7(2)
ESET Protect MDR Ultimate

ESET Protect MDR

language

Threat Hunting

ESET Protect MDR Ultimate on SecurityListing: A managed security service providing comprehensive endpoint protection, XDR capabilities, and 24/7 managed detection and response across multiple platforms and environments.

4.7(2)
JupiterOne Cyber Asset Attack Surface Management

JupiterOne Cyber Asset

language

Exposure Management

JupiterOne Cyber Asset Attack Surface Management on SecurityListing: Platform for cyber asset attack surface mgmt with asset visibility & control

4.7(2)
Naked Security and Sophos News

Naked Security and

language

Threat Intelligence Platforms

Naked Security and Sophos News on SecurityListing: Naked Security by Sophos offers expert insights and practical advice on cybersecurity threats and protection strategies.

4.7(2)
Cybercory

Cybercory

United Arab Emirates flag

Data Protection

Cybercory is a cybersecurity magazine and media outlet that publishes news, analysis, and features on cybersecurity topics worldwide. It operates as a digital publication with regional coverage includ

4.7(2)
Showing 341 to 360 of 4175 products