Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Panaseer Continuous Controls Monitoring

Panaseer Continuous Controls

language

Compliance Management

Panaseer Continuous Controls Monitoring on SecurityListing: Continuous Controls Monitoring platform for cybersecurity control effectiveness

4.5(1)
Aegis Cyber Defense Systems

Aegis Cyber Defense

United States flag

Threat Intelligence Platforms

AEGIS is a powerful cybersecurity tool that can help protect your devices and networks from cyber threats, and increase performance. Aegis Defender Pro is a software and service that updates the Nati

4.5(1)
DPDK (Data Plane Development Kit)

DPDK (Data Plane

language

Next-Generation Firewalls

DPDK (Data Plane Development Kit) on SecurityListing: Open-source set of libraries and drivers to accelerate network performance.

4.5(1)
Archivo

Archivo

United Kingdom flag

Backup as a Service

Archivo is a value added reseller focused on Disaster Recovery as a Service (DRaaS), backup, hyper-convergence, hybrid storage and Cyber security. We help our customers to protect themselves against

4.5(1)
Accredia

Accredia

Italy flag

Security Operations

Accredia is the national accreditation body for Italy, responsible for assessing the competence and capability of organisations that provide certification, testing, inspection and calibration services

4.5(1)
Metasploit

Metasploit

language

Endpoint Detection and Response

Metasploit on SecurityListing: A penetration testing framework for identifying and exploiting vulnerabilities.

4.5(1)
ABM Technology Group

ABM Technology Group

United States flag

Compliance Consulting

ABM Technology Group (formerly True IT) provide business information technology services, solutions, and consulting for small to mid-sized organizations. CybersecurityOur team stays one step ahead in

4.5(1)
ExploitDB

ExploitDB

language

Penetration Testing

ExploitDB on SecurityListing: A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.

4.5(1)
Airlock Digital

Airlock Digital

Australia flag

Threat Intelligence Platforms

Airlock Digital was created after many years of experience in implementing whitelisting/ allowlisting solutions in Federal Government and various enterprises in Australia. Unlike signature based file

4.5(1)
Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains

Intelligence-Driven Computer Network

language

Threat Intelligence Platforms

Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains on SecurityListing: A new approach to computer network defense that leverages knowledge about advanced persistent threats, using a kill chain model to describe phases of intrusions and map adversary kill chain indicators to defender courses of action.

4.5(1)
Delve GDPR

Delve GDPR

language

Compliance Management

Delve GDPR on SecurityListing: AI-powered GDPR compliance platform with automated evidence collection

4.5(1)
Archon Secure

Archon Secure

United States flag

Data Loss Prevention

Archon GoSilent Cube delivers a CSfC-certified, plug-and-play security solution for classified and unclassified communication when using the public Internet. Built with Commercial National Security A

4.5(1)
ACCR

ACCR

EG flag

Data Protection

ACCR is a regional policy-oriented think tank focused on digital governance, cybersecurity, and information policy in the Arab world. It conducts research on digital transformation, media analysis, an

4.5(1)
IONIX

IONIX

Israel flag

Security Operations

IONIX (formerly Cyberpion) is the attack surface management solution that uses Connective Intelligence to shine a spotlight on exploitable risks across your real attack surface and its digital supply

4.5(1)
CVE-2024-35693 Scanner

CVE-2024-35693 Scanner

language

Security Scanning

CVE-2024-35693 Scanner on SecurityListing: Scanner for CVE-2024-35693 XSS vuln in WordPress 12 Step Meeting List plugin

4.5(1)
Pair Domains

Pair Domains

language

Brand Protection

Pair Domains on SecurityListing: Domain registration and web hosting services with free features and 24/7 customer support

4.5(1)
ABPSecurite

ABPSecurite

Singapore flag

Cloud Security

ABPSecurite is a leading value-added distributor and a network performance solutions provider. ABPSecurite has an unparalleled portfolio of cybersecurity products and services that meets every critic

4.5(1)
Kriptos Data Classification

Kriptos Data Classification

language

Data Classification

Kriptos Data Classification on SecurityListing: AI-driven data classification platform for sensitive data discovery & labeling

4.5(1)
Adit Ventures

Adit Ventures

United States flag

Security Operations

Adit Ventures is a venture capital firm with a focus on dynamic growth sectors including AI & Machine Learning, Big Data, Cybersecurity and IoT. Adit seeks to capitalize on long-term secular trends i

4.5(1)
Custodia Continuity

Custodia Continuity

United Kingdom flag

Backup as a Service

Custodia Continuity manage your Security, Backup, Continuity and Compliance. You get on with your business. We want to level the playing field, security, ransomware proof backups, good business conti

4.5(1)
Showing 941 to 960 of 4175 products