search
Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

BoostSecurity Software Supply Chain Protection

BoostSecurity Software Supply

language

Software Composition Analysis

BoostSecurity Software Supply Chain Protection on SecurityListing: Software supply chain security platform for SDLC infrastructure protection

4.5(3)
Crypto Drainer Attack

Crypto Drainer Attack

language

Write-ups

Crypto Drainer Attack on SecurityListing: A deep dive into the Ledger connect-kit compromise decryption process.

4.5(3)
Netlas

Netlas

language

Threat Hunting

Netlas on SecurityListing: Threat intelligence and digital risk protection platform

4.5(3)
Quad9

Quad9

language

Intrusion Detection and Prevention Systems

Quad9 on SecurityListing: A free DNS recursive service that blocks malicious host names and protects user privacy.

4.5(3)
BooleBox

BooleBox

Italy flag

Data Loss Prevention

Our data protection company’s mission is to design and develop innovative software dedicated to the total protection of sensitive and confidential corporate information wherever it is, always guarante

4.5(3)
Burp Suite Professional

Burp Suite Professional

language

Vulnerability Assessment

Burp Suite Professional on SecurityListing: A web application security testing platform that combines manual and automated testing tools for conducting comprehensive security assessments and penetration testing.

4.5(3)
360 Privacy 360 Defend

360 Privacy 360

language

Digital Risk Protection

360 Privacy 360 Defend on SecurityListing: Digital protection service for executives with data removal and monitoring

4.5(3)
Safe Solutions

Safe Solutions

EG flag

Data Protection

Safe Solutions is a digital transformation company based in Egypt that specializes in information security, data protection, and process automation. They serve businesses across Egypt and the Gulf reg

4.5(3)
DTEX Platform

DTEX Platform

language

Data Loss Prevention

DTEX Platform on SecurityListing: AI-driven platform for insider risk mgmt and DLP using behavioral analysis

4.5(3)
Votiro Data Detection and Response

Votiro Data Detection

language

Data Masking

Votiro Data Detection and Response on SecurityListing: Zero Trust platform for real-time data masking and file-borne threat prevention

4.5(3)
CybSafe GUIDE

CybSafe GUIDE

language

Security Awareness Training

CybSafe GUIDE on SecurityListing: Behavioral science-based security awareness training with personalized interventions

4.5(3)
Exeon NDR

Exeon NDR

language

Network Detection and Response

Exeon NDR on SecurityListing: AI-powered NDR platform with UEBA for threat detection and network visibility

4.5(3)
GreHack 2018 Conference Videos

GreHack 2018 Conference

language

Guides

GreHack 2018 Conference Videos on SecurityListing: Collection of cybersecurity conference videos from GreHack 2018 covering various cutting-edge topics.

4.5(3)
Digital Shadow Information Technology

Digital Shadow Information

United Arab Emirates flag

AI Security

Digital Shadow Information Technology provides data governance, data management, analytics, digital transformation, and cybersecurity solutions with a focus on data science and enterprise IT. The comp

4.5(3)
Offensive Security Manager (OSM)

Offensive Security Manager

CZ flag

Security Operations

Offensive Security Manager is the ultimate AI software that will enforce offensive security automation, orchestration, coverage, ensure quality, and lets you manage whole process. Our mission is to t

4.5(3)
Borneo

Borneo

United States flag

Data Loss Prevention

Borneo is a Data Security Platform that helps organizations discover, classify, and remediate data and AI governance risks at scale while maintaining continuous compliance. Founded by security expert

4.5(3)
Proofpoint Insider Threat Management

Proofpoint Insider Threat

language

Data Loss Prevention

Proofpoint Insider Threat Management on SecurityListing: A security solution that monitors, detects, and responds to insider threats by providing visibility into user activities across endpoints, email, and cloud to prevent data loss from careless, compromised, or malicious insiders.

4.5(1)
DNS Tunnelling

DNS Tunnelling

language

Offensive Security

DNS Tunnelling on SecurityListing: A technique to encode data within DNS queries for covert communication channels.

4.5(1)
Glide Identity Glide-In

Glide Identity Glide-In

language

API Security

Glide Identity Glide-In on SecurityListing: SIM-based identity verification for touchless check-in and authentication

4.5(1)
cabextract

cabextract

language

Digital Forensics and Incident Response

cabextract on SecurityListing: Free software for extracting Microsoft cabinet files, supporting all features and formats of Microsoft cabinet files and Windows CE installation files.

4.5(1)
Showing 521 to 540 of 4175 products