Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Australian Signals Directorate (ASD)

Australian Signals Directorate

Australia flag

Security Operations

The Australian Signals Directorate (ASD, formerly DSD) is an intelligence agency in the Australian Government Department of Defence. ASDs role is to:◾collect and analyse foreign signals intelligence,

BlackSignal Technologies

BlackSignal Technologies

United States flag

Security Operations

BlackSignal Technologies provides cybersecurity, digital signal processing and electronic warfare products to help DOD and IC agency customers counter near-peer threats and other national security cha

12Port

12Port

United States flag

Security Operations

At 12Port, we believe security shouldn’t be complicated or out of reach for any business. Our goal is to provide enterprise-class security technology that is easy to deploy, scalable, and accessible f

CSA Events

CSA Events

United Kingdom flag

Security Operations

The Cloud Security Alliance also conducts several CSA Summits each year. These are typically one day plenary events conducted in cooperation with CSA chapters, as well as being co-located with other p

Business Hive Vilnius (BHV)

Business Hive Vilnius

LT flag

Security Operations

Business Hive Vilnius (BHV) is one of the oldest startup incubator and technology hubs in the Baltics. Primarily focused on hardware, security, blockchain, AI, fintech and enterprise software startups

GISEC Global

GISEC Global

United Arab Emirates flag

Security Operations

GISEC Global provides vendors and companies from around the world with access to lucrative opportunity to capitalize on what's set to become one of the world's booming markets. GISEC Global brings to

CRI4DATA

CRI4DATA

France flag

Compliance Consulting

CRI4DATA's mission is to help organizations build their resilience to cyber risk. Our experts provide advice on holistic cyber risk assessment and the management of its possible transfer to insurers.

Approov

Approov

United Kingdom flag

Threat Intelligence Platforms

Approov provides a comprehensive runtime security solution for mobile apps and their APIs, unified across iOS and Android. Approov Mobile App Protection verifies your app's authenticity and runtime s

Zentek Digital Investigations

Zentek Digital Investigations

United Kingdom flag

Digital Forensics and Incident Response

Zentek has been providing digital forensics services to the public and private sector for computers and mobile devices since 2004. Our team consists of experts in the fields of computer forensics, mo

iZOOlogic

iZOOlogic

United States flag

Brand Protection

iZOOlogic protects hundreds of the world’s leading brands, across banking, finance and government from cybercrime. We provide strong cyber defence solutions to protect client digital assets. The iZOO

Compumatica

Compumatica

Netherlands flag

Industrial Control System Security

Compumatica secure networks is a leading European ICT security manufacturer for cybersecurity and encryption products. Solutions include network security, SCADA/ICS security, Mobile/BYOD and email enc

Zyxel Networks

Zyxel Networks

United Kingdom flag

Managed Security Service Providers

Zyxel Networks is a leading provider of secure, AI-powered networking solutions for small to medium businesses (SMBs) and the enterprise edge. We deliver seamless network connectivity and flexible sol

Kralos

Kralos

Germany flag

Data Loss Prevention

Kralos are an experienced team of Software and IT experts, specialized in the development of innovative cybersecurity solutions. As an innovative company, it is natural for us to think "out of the bo

Alcon Maddox

Alcon Maddox

United Arab Emirates flag

Security Operations

Alcon Maddox is a niche recruitment and executive search firm specialised in sourcing exceptional Cyber Security sales and commercial leadership talent. Headquartered in Dubai, serving clients across

Cipher Tooth

Cipher Tooth

United States flag

Data Loss Prevention

CipherTooth’s unique methodology allows it to detect Man in the Middle (MItM) attacks in real time. We keep all the good stuff and get rid of the weaknesses in HTTPS. CipherTooth can even run over the

Xoriant

Xoriant

United States flag

Cloud Security

Xoriant is a technology leader and execution partner throughout the Build, Run and Transform lifecycle for companies that create technology products, as well as for enterprises that use those products

Braintrace

Braintrace

United States flag

Managed Security Service Providers

Braintrace is a privately held, boutique, sole source cybersecurity provider.  Braintrace’s services include Managed Detection and Response (MDR), Managed SIEM, SIEM-as-a-Service, SOC-as-a-Service, Ad

Buchanan & Edwards

Buchanan & Edwards

United States flag

Compliance Consulting

Buchanan & Edwards delivers forward-focused technology solutions that help our clients transform the way they perform their missions. Our innovative solutions help our defense, intelligence and feder

European Cyber Security Conference

European Cyber Security

Belgium flag

Security Operations

The European Cyber Security Conference organised by Forum Europe will debate what Europe’s response to evolving threats in a dynamic global risk landscape should look like and what the next steps for

ZARIOT

ZARIOT

Ireland flag

Industrial Control System Security

Zariot's mission is to restore order to what is becoming connected chaos in IoT by bringing unrivalled security, control and quality of service. Implementing IoT solutions in an existing system can b

Showing 3581 to 3600 of 4175 products