Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Covert Red Team Attack Infrastructure

Covert Red Team

language

Offensive Security

Covert Red Team Attack Infrastructure on SecurityListing: Back-end component for red team operations with crucial design considerations.

4.5(1)
Crowdstrike Charlotte AI

Crowdstrike Charlotte AI

language

Extended Detection and Response

Crowdstrike Charlotte AI on SecurityListing: GenAI assistant that provides faster intelligence for security operations

4.5(1)
CrowdStrike Endpoint Security

CrowdStrike Endpoint Security

language

Endpoint Detection and Response

CrowdStrike Endpoint Security on SecurityListing: Endpoint protection platform with EDR and EPP capabilities

4.5(1)
CrowdStrike Falcon Onum

CrowdStrike Falcon Onum

language

Security Information and Event Management

CrowdStrike Falcon Onum on SecurityListing: Data pipeline mgmt for SOC transformation with real-time data processing

4.5(1)
CrowdStrike Falcon for XIoT

CrowdStrike Falcon for

language

Industrial Control System Security

CrowdStrike Falcon for XIoT on SecurityListing: XIoT security platform providing visibility and protection for IoT/OT assets

4.5(1)
CSIS Assume Breach

CSIS Assume Breach

language

Penetration Testing

CSIS Assume Breach on SecurityListing: Simulated breach testing service to identify vulnerabilities and weaknesses

4.5(1)
OpenTekware

OpenTekware

EG flag

Data Protection

OpenTekware is a global information security services company that delivers comprehensive cybersecurity consulting and managed security offerings. With over a decade of experience, the firm works with

4.5(1)
CVE-2024-35693 Scanner

CVE-2024-35693 Scanner

language

Security Scanning

CVE-2024-35693 Scanner on SecurityListing: Scanner for CVE-2024-35693 XSS vuln in WordPress 12 Step Meeting List plugin

4.5(1)
cyberconIQ AIQ™ Cyber Coach

cyberconIQ AIQ™ Cyber

language

Risk Assessment

cyberconIQ AIQ™ Cyber Coach on SecurityListing: AI-powered cyber coach & training platform for human risk reduction

4.5(1)
PosixSpawn

PosixSpawn

United Arab Emirates flag

Application Security

PosixSpawn specializes in protecting companies from cyber attacks and performing security research on a wide range of software and devices. It provides defensive information security solutions globall

4.5(1)
CybeReady Cybersecurity Training

CybeReady Cybersecurity Training

language

Security Awareness Training

CybeReady Cybersecurity Training on SecurityListing: Automated cybersecurity awareness training with phishing simulation

4.5(1)
Cybersecurity Ventures

Cybersecurity Ventures

language

Industry Reports

Cybersecurity Ventures on SecurityListing: Cybersecurity Ventures is a leading research and market intelligence firm providing insights, news, and analysis on the cybersecurity industry.

4.5(1)
CyberWaze Global

CyberWaze Global

United Arab Emirates flag

Application Security

CyberWaze Global is a cybersecurity consulting firm based in the United Kingdom with global headquarters in Dubai and a regional presence in Riyadh, providing cyber security professionals and managed

4.5(1)
Cydarm Platform

Cydarm Platform

language

Security Orchestration Automation and Response

Cydarm Platform on SecurityListing: SOC management platform for incident response and cyber response management

4.5(1)
Sentrollers

Sentrollers

EG flag

Network Security

Sentrollers is an Egypt-based technology company specializing in networking, IT security, and Internet of Things (IoT) solutions. The company partners with major vendors such as Cisco, PRTG, Solarwind

4.5(1)
CYE Hyver Risk Mitigation Planning

CYE Hyver Risk

language

Exposure Management

CYE Hyver Risk Mitigation Planning on SecurityListing: Risk mitigation planning platform for prioritizing vulnerability remediation

4.5(1)
Cypago ChatGRC

Cypago ChatGRC

language

Governance Risk and Compliance Platforms

Cypago ChatGRC on SecurityListing: AI-powered GRC interface for querying compliance frameworks and controls

4.5(1)
Cyvatar Compliance Mapping

Cyvatar Compliance Mapping

language

Risk Assessment

Cyvatar Compliance Mapping on SecurityListing: Maps cybersecurity controls to regulatory compliance frameworks

4.5(1)
DeepSource SCA

DeepSource SCA

language

Software Composition Analysis

DeepSource SCA on SecurityListing: SCA platform with reachability analysis, AI-powered fixes, and license compliance

4.5(1)
DNS Tunnelling

DNS Tunnelling

language

Offensive Security

DNS Tunnelling on SecurityListing: A technique to encode data within DNS queries for covert communication channels.

4.5(1)
Showing 601 to 620 of 4175 products