Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.
Private Machines

Security Operations
Private Machines develops unique patent-pending technology protects cloud and data center workloads. ENFORCER SRX1 is the world’s first general-purpose secure server designed to NIST FIPS 140-2 Level
ICT Misr

Data Protection
ICT Misr is a technology consulting and system integration firm based in Egypt. It provides IT services and solutions across hardware infrastructure, cloud and virtualization, business continuity, sec
Swift Security
AI Threat Detection
Swift Security on SecurityListing: A security platform that provides monitoring, control, and protection mechanisms for organizations using generative AI and large language models.
Armis

Security Operations
Armis offers the markets leading asset intelligence platform designed to address the new threat landscape that connected devices create. Armis Centrix, the cyber exposure management platform, is powe
Axonius Asset Management
Cyber Asset Attack Surface Management
Axonius Asset Management on SecurityListing: Unified asset mgmt platform for devices, identities, apps & infrastructure
AusCERT

Security Operations
AusCERT is the premier Computer Emergency Response Team (CERT) in Australia and a leading CERT in the Asia/Pacific region. AusCERT operates within a worldwide network of information security experts
TES

Security Operations
TES is a provider of IT Lifecycle Services, offering bespoke solutions that help customers manage the commissioning, deployment and retirement of Information Technology assets. We understand the comm
Conviso AppScan
Container Security
Conviso AppScan on SecurityListing: Orchestrates and centralizes app security testing results from multiple scanners
IDECSI MyDataManagement
Data Security Posture Management
IDECSI MyDataManagement on SecurityListing: Data governance & security platform for Microsoft 365 & file servers
Kali
Vulnerability Assessment
Kali on SecurityListing: Kali Linux is a specialized Linux distribution for cybersecurity professionals, focusing on penetration testing and security auditing.
ID North Managed
Privileged Access Management
ID North Managed Security Services on SecurityListing: A managed security service provider specializing in identity security solutions including IAM, IGA, and PAM with implementation, operational, and advisory services.
DenyHosts
Intrusion Detection and Prevention Systems
DenyHosts on SecurityListing: DenyHosts is a script to block SSH server attacks by automatically preventing attackers after failed login attempts.
PentesterLab PRO
Penetration Testing
PentesterLab PRO on SecurityListing: Online platform offering 700+ hands-on web security exercises and training
Dropzone AI
Security Orchestration Automation and Response
Dropzone AI on SecurityListing: Dropzone AI is an autonomous AI agent for SOCs that performs end-to-end investigations of security alerts, integrating with existing cybersecurity tools and data sources.
Liquid C2 Cyber
Managed Security Service Providers
Liquid C2 Cyber Defence Services on SecurityListing: Managed cyber defense services for threat detection and response
BadCyber
Blogs and News
BadCyber on SecurityListing: A curated list of important security news, helping readers stay up-to-date with the latest developments in cybersecurity.
NMAP
Security Scanning
NMAP on SecurityListing: Nmap is an essential network scanning tool used for network security auditing and status monitoring.
Axon Technologies

Data Protection
Axon Technologies is a UAE-headquartered cybersecurity services company focused on protecting critical infrastructure and building a safer digital society. The company offers a complete information se
Cybrary
Penetration Testing
Cybrary on SecurityListing: Cybrary is an online learning platform that provides accessible and affordable training in cybersecurity skills.
ANY.RUN

Security Operations
ANY.RUN is a cloud-based malware analysis service delivering an interactive sandbox for analyzing suspicious and malicious activities. It provides threat intelligence lookup and threat intelligence fe