Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

PrivSec

PrivSec

EG flag

Data Protection

PrivSec is an IT Solutions company specialized in the security field, providing services in securing and protecting information and data privacy for companies and institutions.

4.5(1)
FossID Software Composition Analysis

FossID Software Composition

language

Software Composition Analysis

FossID Software Composition Analysis on SecurityListing: SCA tool for code scanning, license identification, and SBOM generation

4.5(1)
Fraud.com fcase Fraud Orchestration

Fraud.com fcase Fraud

language

API Security

Fraud.com fcase Fraud Orchestration on SecurityListing: Fraud orchestration platform for financial institutions

4.5(1)
Gravwell Security Data Platform

Gravwell Security Data

language

Threat Hunting

Gravwell Security Data Platform on SecurityListing: Security data platform for log analysis, metrics, and threat hunting

4.5(1)
Graylog AI-Powered Security & IT Operations

Graylog AI-Powered Security

language

API Security

Graylog AI-Powered Security & IT Operations on SecurityListing: AI-powered SIEM, API security, and log management platform

4.5(1)
HiddenLayer AISec Platform

HiddenLayer AISec Platform

language

Data Loss Prevention

HiddenLayer AISec Platform on SecurityListing: Platform for securing AI models and autonomous agents across their lifecycle

4.5(1)
HackNotice Services

HackNotice Services

language

Third-Party Risk Management

HackNotice Services on SecurityListing: Real-time threat intelligence platform monitoring dark web, breaches & supply chain

4.5(1)
Haekka Phishing Simulator

Haekka Phishing Simulator

language

Security Awareness Training

Haekka Phishing Simulator on SecurityListing: Slack-integrated phishing simulator with real-time training capabilities

4.5(1)
Heeler ASPM

Heeler ASPM

language

Dynamic Application Security Testing

Heeler ASPM on SecurityListing: ASPM platform that correlates security findings and reduces alert noise by 99%

4.5(1)
Hive Pro Uni5 Xposure

Hive Pro Uni5

language

Exposure Management

Hive Pro Uni5 Xposure on SecurityListing: Threat exposure management platform implementing CTEM framework end-to-end

4.5(1)
Imprivata Privileged Access Management

Imprivata Privileged Access

language

Password Management

Imprivata Privileged Access Management on SecurityListing: PAM solution for discovering, managing, auditing privileged accounts & sessions

4.5(1)
How to Write Malleable C2 Profiles for Cobalt Strike

How to Write

language

Offensive Security

How to Write Malleable C2 Profiles for Cobalt Strike on SecurityListing: Learn how to create new Malleable C2 profiles for Cobalt Strike to avoid detection and signatured toolset

4.5(1)
Huntbase Platform

Huntbase Platform

language

Threat Hunting

Huntbase Platform on SecurityListing: Platform for threat investigation with automation and knowledge management

4.5(1)
Innvikta Phishing Simulator

Innvikta Phishing Simulator

language

Security Awareness Training

Innvikta Phishing Simulator on SecurityListing: Phishing simulation platform with automated attack simulations and training

4.5(1)
Incident Response Flowchart

Incident Response Flowchart

language

Guides

Incident Response Flowchart on SecurityListing: A structured approach to managing and responding to suspected security events or incidents.

4.5(1)
Infosec4tc CISM Latest Exam Questions

Infosec4tc CISM Latest

language

Certifications

Infosec4tc CISM Latest Exam Questions on SecurityListing: CISM exam prep with 620 practice questions across 4 online simulators

4.5(1)
Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains

Intelligence-Driven Computer Network

language

Threat Intelligence Platforms

Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains on SecurityListing: A new approach to computer network defense that leverages knowledge about advanced persistent threats, using a kill chain model to describe phases of intrusions and map adversary kill chain indicators to defender courses of action.

4.5(1)
Junglemap SaaS-platform

Junglemap SaaS-platform

language

Security Awareness Training

Junglemap SaaS-platform on SecurityListing: SaaS platform for security awareness training with phishing simulation

4.5(1)
Junglemap NanoLearning

Junglemap NanoLearning

language

Security Awareness Training

Junglemap NanoLearning on SecurityListing: Security awareness training platform using NanoLearning methodology

4.5(1)
Kodem C.O.R.E.

Kodem C.O.R.E.

language

Container Security

Kodem C.O.R.E. on SecurityListing: Unified engine correlating static & runtime analysis for app security

4.5(1)
Showing 641 to 660 of 4175 products