search
Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Private Machines

Private Machines

United States flag

Security Operations

Private Machines develops unique patent-pending technology protects cloud and data center workloads. ENFORCER SRX1 is the world’s first general-purpose secure server designed to NIST FIPS 140-2 Level

4.8(3)
ICT Misr

ICT Misr

EG flag

Data Protection

ICT Misr is a technology consulting and system integration firm based in Egypt. It provides IT services and solutions across hardware infrastructure, cloud and virtualization, business continuity, sec

4.8(3)
Swift Security

Swift Security

language

AI Threat Detection

Swift Security on SecurityListing: A security platform that provides monitoring, control, and protection mechanisms for organizations using generative AI and large language models.

4.8(3)
Armis

Armis

United States flag

Security Operations

Armis offers the markets leading asset intelligence platform designed to address the new threat landscape that connected devices create. Armis Centrix, the cyber exposure management platform, is powe

4.8(3)
Axonius Asset Management

Axonius Asset Management

language

Cyber Asset Attack Surface Management

Axonius Asset Management on SecurityListing: Unified asset mgmt platform for devices, identities, apps & infrastructure

4.8(3)
AusCERT

AusCERT

Australia flag

Security Operations

AusCERT is the premier Computer Emergency Response Team (CERT) in Australia and a leading CERT in the Asia/Pacific region. AusCERT operates within a worldwide network of information security experts

4.8(3)
TES

TES

Singapore flag

Security Operations

TES is a provider of IT Lifecycle Services, offering bespoke solutions that help customers manage the commissioning, deployment and retirement of Information Technology assets. We understand the comm

4.8(3)
Conviso AppScan

Conviso AppScan

language

Container Security

Conviso AppScan on SecurityListing: Orchestrates and centralizes app security testing results from multiple scanners

4.7(2)
IDECSI MyDataManagement

IDECSI MyDataManagement

language

Data Security Posture Management

IDECSI MyDataManagement on SecurityListing: Data governance & security platform for Microsoft 365 & file servers

4.7(2)
Kali

Kali

language

Vulnerability Assessment

Kali on SecurityListing: Kali Linux is a specialized Linux distribution for cybersecurity professionals, focusing on penetration testing and security auditing.

4.7(2)
ID North Managed Security Services

ID North Managed

language

Privileged Access Management

ID North Managed Security Services on SecurityListing: A managed security service provider specializing in identity security solutions including IAM, IGA, and PAM with implementation, operational, and advisory services.

4.7(2)
DenyHosts

DenyHosts

language

Intrusion Detection and Prevention Systems

DenyHosts on SecurityListing: DenyHosts is a script to block SSH server attacks by automatically preventing attackers after failed login attempts.

4.7(2)
PentesterLab PRO

PentesterLab PRO

language

Penetration Testing

PentesterLab PRO on SecurityListing: Online platform offering 700+ hands-on web security exercises and training

4.7(2)
Dropzone AI

Dropzone AI

language

Security Orchestration Automation and Response

Dropzone AI on SecurityListing: Dropzone AI is an autonomous AI agent for SOCs that performs end-to-end investigations of security alerts, integrating with existing cybersecurity tools and data sources.

4.7(2)
Liquid C2 Cyber Defence Services

Liquid C2 Cyber

language

Managed Security Service Providers

Liquid C2 Cyber Defence Services on SecurityListing: Managed cyber defense services for threat detection and response

4.7(2)
BadCyber

BadCyber

language

Blogs and News

BadCyber on SecurityListing: A curated list of important security news, helping readers stay up-to-date with the latest developments in cybersecurity.

4.7(2)
NMAP

NMAP

language

Security Scanning

NMAP on SecurityListing: Nmap is an essential network scanning tool used for network security auditing and status monitoring.

4.7(2)
Axon Technologies

Axon Technologies

United Arab Emirates flag

Data Protection

Axon Technologies is a UAE-headquartered cybersecurity services company focused on protecting critical infrastructure and building a safer digital society. The company offers a complete information se

4.7(2)
Cybrary

Cybrary

language

Penetration Testing

Cybrary on SecurityListing: Cybrary is an online learning platform that provides accessible and affordable training in cybersecurity skills.

4.7(2)
ANY.RUN

ANY.RUN

United Arab Emirates flag

Security Operations

ANY.RUN is a cloud-based malware analysis service delivering an interactive sandbox for analyzing suspicious and malicious activities. It provides threat intelligence lookup and threat intelligence fe

4.7(2)
Showing 101 to 120 of 4175 products