search
Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Abilene Advisors Supplier Shield

Abilene Advisors Supplier

language

Risk Assessment

Abilene Advisors Supplier Shield on SecurityListing: End-to-end TPRM platform with advisory, managed services, and cloud tools

4.8(3)
Cyber 50 Defense

Cyber 50 Defense

United Arab Emirates flag

GRC

Cyber 50 Defense is an UAE-based cybersecurity company offering governance, risk and compliance (GRC) solutions, 24/7 managed protection, security assessments, incident response, and compliance servic

4.8(3)
Damn Vulnerable iOS App (DVIA)

Damn Vulnerable iOS

language

Penetration Testing

Damn Vulnerable iOS App (DVIA) on SecurityListing: iOS application for testing iOS penetration testing skills in a legal environment.

4.8(3)
StealthMole DarkWeb Monitoring

StealthMole DarkWeb Monitoring

language

API Security

StealthMole DarkWeb Monitoring on SecurityListing: Dark web monitoring platform with AI-based crawling and real-time alerts

4.8(3)
Calypso AI Inference Platform

Calypso AI Inference

language

API Security

Calypso AI Inference Platform on SecurityListing: Platform securing AI models at inference with red-teaming, defense & monitoring

4.8(3)
Corsica Technologies Security Consulting Services

Corsica Technologies Security

language

Penetration Testing

Corsica Technologies Security Consulting Services on SecurityListing: A cybersecurity consulting service that provides security assessments, compliance guidance, and strategic planning across multiple industries with flexible engagement models.

4.8(3)
CBRX

CBRX

language

Digital Forensics and Incident Response

CBRX on SecurityListing: CBRX is a cloud-based platform that automates incident analysis and reporting for cybersecurity teams.

4.8(3)
libnids

libnids

language

Intrusion Detection and Prevention Systems

libnids on SecurityListing: Libnids is an implementation of an E-component of Network Intrusion Detection System that emulates the IP stack of Linux 2.0.x and offers IP defragmentation, TCP stream assembly, and TCP port scan detection.

4.8(3)
CrowdStrike Falcon Next-Gen Identity Security

CrowdStrike Falcon Next-Gen

language

Identity Threat Detection and Response

CrowdStrike Falcon Next-Gen Identity Security on SecurityListing: Identity security platform protecting identities across attack chains

4.8(3)
Reverse Engineering Challenges

Reverse Engineering Challenges

language

Cyber Range Training

Reverse Engineering Challenges on SecurityListing: A collection of reverse engineering challenges covering a wide range of topics and difficulty levels.

4.8(3)
Inspira H1UMAN

Inspira H1UMAN

language

AI Threat Detection

Inspira H1UMAN on SecurityListing: AI-powered cybersecurity automation agent for daily workflow execution

4.8(3)
Remedio Smart Device Hardening

Remedio Smart Device

language

Endpoint Protection Platform

Remedio Smart Device Hardening on SecurityListing: Automated device hardening and configuration management platform

4.8(3)
Logsign Unified SO Platform

Logsign Unified SO

language

Threat Hunting

Logsign Unified SO Platform on SecurityListing: SOAR platform automating threat detection, incident response, and workflows

4.8(3)
Cyware Quarterback AI

Cyware Quarterback AI

language

Threat Intelligence Platforms

Cyware Quarterback AI on SecurityListing: AI-powered threat intelligence platform for real-time threat intel management

4.8(3)
IGRC Square

IGRC Square

EG flag

Data Protection

IGRC Square provides cybersecurity solutions for organizations, focusing on governance, risk management, and compliance to safeguard data, devices, and employees. The company emphasizes state-of-the-a

4.8(3)
Bulwark Technologies

Bulwark Technologies

United Arab Emirates flag

Data Protection

Bulwark Technologies is a cybersecurity distributor focused on the Middle East, with headquarters in Dubai and regional offices in Saudi Arabia and India. The company acts as a value-added distributor

4.8(3)
GreyNoise Block

GreyNoise Block

language

Threat Intelligence Platforms

GreyNoise Block on SecurityListing: Real-time threat intel platform detecting malicious scanning & exploitation

4.8(3)
ProLion CryptoSpike

ProLion CryptoSpike

language

Extended Detection and Response

ProLion CryptoSpike on SecurityListing: Real-time ransomware detection & blocking for storage systems with recovery

4.8(3)
NSFOCUS Anti-DDoS System

NSFOCUS Anti-DDoS System

language

Threat Intelligence Platforms

NSFOCUS Anti-DDoS System on SecurityListing: On-premises DDoS mitigation appliance for service providers

4.8(3)
Guardey Security Awareness Training

Guardey Security Awareness

language

Security Awareness Training

Guardey Security Awareness Training on SecurityListing: Gamified security awareness training platform with microlearning challenges

4.8(3)
Showing 21 to 40 of 4175 products