Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.
JupiterOne Continuous Evidence
Compliance Management
JupiterOne Continuous Evidence Engine on SecurityListing: Continuous controls monitoring platform with automated evidence generation
Prophaze EagleEye WAF
API Security
Prophaze EagleEye WAF on SecurityListing: Cloud-based WAF protecting web apps from threats with AI-powered analysis
Abusing the COM
Offensive Security
Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32 on SecurityListing: Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32
Mandiant Managed Defense
Threat Hunting
Mandiant Managed Defense on SecurityListing: 24/7 managed threat detection, investigation, and response service
Attic MDR
Threat Hunting
Attic MDR on SecurityListing: 24/7 managed detection and response service for Microsoft 365 environments
Agentic AI AR2™
Threat Intelligence Platforms
Agentic AI AR2™ on SecurityListing: Autonomous AI SOC platform for automated threat response and remediation
Bifrozt
Security Operations
Bifrozt on SecurityListing: High interaction honeypot solution for Linux systems with data control and integrity features.
NinjaOne RMM
Endpoint Protection Platform
NinjaOne RMM on SecurityListing: RMM platform for automating IT management and technician operations
ORDR AI Protect
Zero Trust Network Access
ORDR AI Protect Platform on SecurityListing: AI-powered network segmentation platform for IoT, OT, and IoMT environments
LogRythm SIEM
Security Information and Event Management
LogRythm SIEM on SecurityListing: LogRhythm SIEM is a comprehensive security information and event management platform that collects, analyzes, and responds to security events across an organization's IT infrastructure.
Logsign Unified Security
Threat Intelligence Platforms
Logsign Unified Security Operations Platform on SecurityListing: Unified security operations platform combining SIEM, TI, UEBA, and TDIR
App Detonator
Mobile App Security
App Detonator on SecurityListing: A tool for dynamic analysis of mobile applications in a controlled environment.
Quorum Cyber Clarity
Data Loss Prevention
Quorum Cyber Clarity on SecurityListing: Managed security services platform offering MDR, threat detection, and DLP
GuardRails
Dynamic Application Security Testing
GuardRails on SecurityListing: DevSecOps platform for vulnerability detection and developer security training
Cyvatar Compliance Mapping
Risk Assessment
Cyvatar Compliance Mapping on SecurityListing: Maps cybersecurity controls to regulatory compliance frameworks
Proofpoint Insider Threat
Data Loss Prevention
Proofpoint Insider Threat Management on SecurityListing: A security solution that monitors, detects, and responds to insider threats by providing visibility into user activities across endpoints, email, and cloud to prevent data loss from careless, compromised, or malicious insiders.
Omada Identity On-Premises
Identity Governance and Administration
Omada Identity On-Premises Identity Governance on SecurityListing: On-premises IGA solution for identity lifecycle and access management
Imprivata Access Intelligence
Identity Threat Detection and Response
Imprivata Access Intelligence Platform (AIP) on SecurityListing: User behavior and access analytics platform with AI-powered insights
CINSscore.com
Threat Intelligence Platforms
CINSscore.com on SecurityListing: CINSscore.com provides Threat Intelligence database with accurate IP scores and collective defense through community and Sentinel IPS unit sourced data.
BeSECURE Vulnerability Management
Threat Intelligence Platforms
BeSECURE Vulnerability Management on SecurityListing: A vulnerability assessment and management tool that uses patented technology to accurately identify vulnerabilities and prioritize them by risk.