Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

CipherMail

CipherMail

Netherlands flag

Data Loss Prevention

CipherMail provides email security products which allow organizations world wide to automatically protect their email against unauthorized access both in transit and at rest. CipherMail is used by va

4.5(1)
Anjolen

Anjolen

United States flag

Compliance Consulting

Anjolen provides expertise in cybersecurity, compliance and cyber forensic services. We understand the challenges faced by businesses to increase efficiency by integrating technology into daily produ

4.5(1)
CINSscore.com

CINSscore.com

language

Threat Intelligence Platforms

CINSscore.com on SecurityListing: CINSscore.com provides Threat Intelligence database with accurate IP scores and collective defense through community and Sentinel IPS unit sourced data.

4.5(1)
Action1

Action1

United States flag

Security Operations

Action1 is a Cloud-based lightweight endpoint security platform that discovers all of your endpoints in seconds and allows you to retrieve live security information from the entire network using plain

4.5(1)
F5 BIG-IP Local Traffic Manager

F5 BIG-IP Local

language

Next-Generation Firewalls

F5 BIG-IP Local Traffic Manager on SecurityListing: Application delivery controller with load balancing and traffic management

4.5(1)
Jericho Security Customized Cybersecurity Training

Jericho Security Customized

language

Security Awareness Training

Jericho Security Customized Cybersecurity Training on SecurityListing: AI-powered platform for customized cybersecurity training & phishing sims

4.5(1)
SafeLine WAF

SafeLine WAF

language

API Security

SafeLine WAF on SecurityListing: SafeLine WAF is an open-source web application firewall that protects web services by filtering malicious HTTP traffic through intelligent semantic analysis and machine learning-based detection.

4.5(1)
DataProof Communications

DataProof Communications

South Africa flag

Compliance Consulting

DataProof Communications is Cybersecurity Company specialising in cybersecurity operations, incident management and response best practices and technologies. DataProof’s objective is to provide compr

4.5(1)
Andreessen Horowitz (a16z)

Andreessen Horowitz (a16z)

United States flag

Security Operations

Andreessen Horowitz (known as "a16z") is a venture capital firm in Silicon Valley, California that backs bold entrepreneurs building the future through technology. The firm is led by general partners

4.5(1)
CHEQ

CHEQ

United States flag

Brand Protection

CHEQ is an AI-driven cybersecurity company disrupting the ad-verification space by introducing fully autonomous, preemptive technology for brand safety and ad-fraud prevention. CHEQ provides Autonomo

4.5(1)
Chatham House

Chatham House

United Kingdom flag

Security Operations

Chatham House, the Royal Institute of International Affairs, is an independent policy institute based in London, with a mission is to help build a secure, prosperous and just world. Topics cover forei

4.5(1)
403Tech Inc.

403Tech Inc.

Canada flag

Backup as a Service

We help your business, with the use of technology, to be more efficient, more secure, and to put less worry on the IT side of things and more emphasis on the things you are passionate about.

4.5(1)
Omada Identity Cloud

Omada Identity Cloud

language

Risk Assessment

Omada Identity Cloud on SecurityListing: Cloud-based IGA solution for identity lifecycle mgmt and access governance

4.5(1)
Prophet Security Prophet AI Threat Hunter

Prophet Security Prophet

language

Threat Hunting

Prophet Security Prophet AI Threat Hunter on SecurityListing: AI-driven threat hunting platform for SOC alert triage and investigation

4.5(1)
Charlton Networks

Charlton Networks

United Kingdom flag

Backup as a Service

Charlton Networks provide a complete range of IT infrastructure, network and security solutions aimed at SME companies. From system/data backup and recovery services, safeguarding and recovering your

4.5(1)
AnChain.AI

AnChain.AI

United States flag

Security Operations

AnChain.AI's analytics platform proactively protects crypto assets by providing proprietary artificial intelligence, knowledge graphs, and threat intelligence on blockchain transactions. Our AI-power

4.5(1)
AB Handshake

AB Handshake

United States flag

Security Operations

AB Handshake offers a game-changing solution for telecom service providers that eliminates fraud on inbound and outbound voice traffic. We validate each call using our advanced system of interaction b

4.5(1)
Valiant Technologies

Valiant Technologies

India flag

Data Protection

Valiant Technologies Pvt Ltd is a leading provider of information security consulting and training solutions, established in 2003. Catering to a diverse range of sectors including commercial enterpris

4.5(1)
Actelis Networks

Actelis Networks

United States flag

Security Operations

Actelis Networks is a market leader in cyber-hardened, rapid deployment networking solutions for wide-area IoT including federal, state and local government, ITS, military, utility, rail, telecom and

4.5(1)
Certo Software

Certo Software

United Kingdom flag

Security Operations

As mobile devices are now such an integral part of our daily lives the importance of protecting them has never been greater. Adapting traditional PC antivirus for mobile is no longer enough. At Certo

4.5(1)
Showing 1121 to 1140 of 4175 products