search
Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

ISS Systems

ISS Systems

EG flag

Data Protection

ISS Systems appears to be a company associated with information security given the domain and the redirected WEAREISS page, but the landing content shown is a generic safety check screen with a Contin

4.7(2)
Exeon Analytics

Exeon Analytics

Switzerland flag

Threat Intelligence Platforms

Exeon Analytics is a Swiss cyber security company that is specialized in detecting hidden data breaches and advanced cyber attacks. Our flagship product ExeonTrace uses machine learning and clusterin

4.7(2)
Certstream

Certstream

language

Brand Protection

Certstream on SecurityListing: Real-time monitoring tool for newly issued SSL certificates.

4.7(2)
Alpha Echo

Alpha Echo

Australia flag

Compliance Consulting

Specialising in security advice and enterprise-wide Cyberworthiness, Alpha Echo helps Australia deliver on cyber outcomes at a military grade level. We deliver realistic, comprehensive, tailored, thr

4.7(2)
Cybernetic Global Intelligence (CGI)

Cybernetic Global Intelligence

Australia flag

Compliance Consulting

4.7(2)
Transpere

Transpere

United States flag

Security Operations

Transpere provides IT Asset Disposition (ITAD), Data Destruction, Electronic Recycling and Onsite Data Services. We recognize the potential threat of stolen data and aim to protect our customers agai

4.7(2)
Fireware

Fireware

United Arab Emirates flag

Network Security

Fireware is a cybersecurity-focused company operating in the Middle East, providing information security solutions, data center and connectivity capabilities, and security platform partnerships. The c

4.7(2)
ESET Protect MDR Ultimate

ESET Protect MDR

language

Threat Hunting

ESET Protect MDR Ultimate on SecurityListing: A managed security service providing comprehensive endpoint protection, XDR capabilities, and 24/7 managed detection and response across multiple platforms and environments.

4.7(2)
Workz Group

Workz Group

United Arab Emirates flag

Industrial Control System Security

Workz connects and protects mobile subscribers of today and tomorrow by providing secure removable or embedded SIMs and remote provisioning solutions for consumer, M2M and IOT devices. Since our start

4.7(2)
LogicalTrust

LogicalTrust

Poland flag

Penetration Testing

LogicalTrust security testing specialists find the weakest points in your company and show you how to fix them step-by-step, as well as how to improve your security. Our offer covers security tests o

4.7(2)
Imprivata Vendor Privileged Access Management

Imprivata Vendor Privileged

language

Privileged Access Management

Imprivata Vendor Privileged Access Management on SecurityListing: Manages third-party vendor privileged access with Zero Trust controls

4.7(2)
Code Dx

Code Dx

United States flag

Security Operations

Code Dx is a software application vulnerability correlation and management system that consolidates and normalizes software vulnerabilities detected by multiple static application security testing (SA

4.7(2)
CyberSource

CyberSource

United Kingdom flag

Security Operations

CyberSource was one of the pioneers in online payment and fraud management services for medium and large-sized merchants.Customers use our CyberSource and Authorize.Net brand solutions to process onli

4.7(2)
Wipe-Global

Wipe-Global

Germany flag

Security Operations

Wipe-Global is specialized in data erasure with an international established service partner network. Our goal is to enable all our service partners to supply our global customers locally with the be

4.7(2)
Cybercory

Cybercory

United Arab Emirates flag

Data Protection

Cybercory is a cybersecurity magazine and media outlet that publishes news, analysis, and features on cybersecurity topics worldwide. It operates as a digital publication with regional coverage includ

4.7(2)
Citrix NetScaler

Citrix NetScaler

language

API Security

Citrix NetScaler on SecurityListing: Application delivery controller for optimizing app performance and security

4.7(2)
Zeta Sky

Zeta Sky

United States flag

Backup as a Service

Zeta Sky offers a full range of IT  and cyber-security services for your business. As an AWS consulting partner, our strength is in helping companies leverage Cloud based solutions to either augment t

4.7(2)
8com

8com

Germany flag

Managed Security Service Providers

8com is an established Managed Security Service Provider (MSSP) with over 75 employees and customers in over 40 countries. Penetration TestingIT security checks from the attacker's point of view. Dur

4.7(2)
Cofrac

Cofrac

France flag

Security Operations

Cofrac is the national accreditation body for France, responsible for assessing the competence and capability of organisations that provide certification, testing, inspection and calibration services.

4.7(2)
Qohash Qostodian

Qohash Qostodian

language

Data Classification

Qohash Qostodian on SecurityListing: Edge data security platform for discovering and managing sensitive data risks

4.7(2)
Showing 361 to 380 of 4175 products