Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Prowler Lighthouse AI

Prowler Lighthouse AI

language

Cloud Security Posture Management

Prowler Lighthouse AI on SecurityListing: AI-powered cloud security platform with autonomous agents for compliance

4.5(1)
Raven Runtime Prevention

Raven Runtime Prevention

language

Software Composition Analysis

Raven Runtime Prevention on SecurityListing: Runtime protection preventing supply-chain attacks & exploits via library-level policies

4.5(1)
Cognizant

Cognizant

United States flag

Industrial Control System Security

Cognizant is a leading provider of information technology, business consulting, enterprise applications, and business process services. Security - Cognizant Security Services offer security platforms

4.5(1)
Coffee Cup Solutions

Coffee Cup Solutions

United Kingdom flag

Backup as a Service

Over the last 10 years Coffee Cup Solutions have built a large, strong team of IT experts, driving great user experiences for customers, dedicated to supporting and developing the IT function for many

4.5(1)
Apogee Global RMS

Apogee Global RMS

United States flag

Compliance Consulting

Get your cybersecurity plan today: Cybersecurity consulting management, cybersecurity risk management services, cybersecurity staffing & talent acquisition. Apogee Global RMS delivers comprehensive s

4.5(1)
Codacy

Codacy

PT flag

Security Operations

Codacy is a developer-first, API-driven platform that provides a curated collection of best-in-class code analysis, security, coverage, and engineering performance tools. Codacy integrates seamlessly

4.5(1)
Acuity RM Group

Acuity RM Group

United Kingdom flag

Governance Risk and Compliance Platforms

Acuity RM Group helps businesses worldwide effectively manage, prioritize and report on their risks to inform strategic and tactical decision-making and build long-term resilience. Its powerful STREAM

4.5(1)
Cobalt Strike's ExternalC2 framework

Cobalt Strike's ExternalC2

language

Penetration Testing

Cobalt Strike's ExternalC2 framework on SecurityListing: A specification/framework for extending default C2 communication channels in Cobalt Strike

4.5(1)
GNU Binutils

GNU Binutils

language

Digital Forensics and Incident Response

GNU Binutils on SecurityListing: A collection of binary tools for various purposes including linking, assembling, profiling, and more.

4.5(1)
Fidelis Security

Fidelis Security

language

Endpoint Detection and Response

Fidelis Security on SecurityListing: XDR platform with NDR, EDR, deception, AD security, and CNAPP capabilities

4.5(1)
Quorum Cyber Emergency MDR

Quorum Cyber Emergency

language

Threat Hunting

Quorum Cyber Emergency MDR on SecurityListing: Emergency MDR service for orgs experiencing active cyber incidents or attacks

4.5(1)
Clumio

Clumio

United States flag

Backup as a Service

Clumio provides autonomous backup and recovery for critical cloud data. At Clumio, we believe that modern IT teams should not have to worry about their backup and recovery posture. Backups should ope

4.5(1)
Jericho Security Phishing Simulator

Jericho Security Phishing

language

Security Awareness Training

Jericho Security Phishing Simulator on SecurityListing: AI-driven phishing simulation platform for employee security awareness training

4.5(1)
Qohash Recon

Qohash Recon

language

Data Classification

Qohash Recon on SecurityListing: Sensitive data discovery tool for unstructured data in files and cloud storage

4.5(1)
RCMP Cybercrime Strategy

RCMP Cybercrime Strategy

Canada flag

Security Operations

The RCMP Cybercrime Strategy's vision is to reduce the threat, impact and victimization of cybercrime in Canada through law enforcement action. The following three pillars are identified within the st

4.5(1)
Rewterz

Rewterz

United Arab Emirates flag

Application Security

Rewterz is a cybersecurity company that provides advanced defense and threat protection services to organizations worldwide. The company offers capabilities including XDR, threat intelligence, managed

4.5(1)
Knockknock

Knockknock

language

Endpoint Detection and Response

Knockknock on SecurityListing: A free, open-source tool that uncovers persistently installed software on macOS, helping to generically reveal malware.

4.5(1)
Anterix

Anterix

United States flag

Industrial Control System Security

Anterix is focused on empowering the modernization of critical infrastructure and enterprise businesses by enabling private broadband connectivity. Recognizing the complexity facing utilities in addr

4.5(1)
United Nations Office of Counter-Terrorism (UNOCT)

United Nations Office

United States flag

Security Operations

The Office of Counter-Terrorism provides UN Member States with the necessary policy support and spread in-depth knowledge of the United Nations Global Counter-Terrorism Strategy, and wherever necessar

4.5(1)
Cloudbric WAF+

Cloudbric WAF+

language

API Security

Cloudbric WAF+ on SecurityListing: Cloud-based WAF platform with managed security services and AWS WAF integration

4.5(1)
Showing 1081 to 1100 of 4175 products