Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Logpoint SOAR &
Security Orchestration Automation and Response
Logpoint SOAR & Automation on SecurityListing: SOAR platform for automated alert triage, investigation, and response

Borneo Agentic AI
Data Loss Prevention
Borneo Agentic AI on SecurityListing: Unified platform for data discovery, security, governance, privacy & compliance

Borneo Data Security
Data Classification
Borneo Data Security Platform on SecurityListing: Data security platform for discovering, analyzing, and remediating sensitive data

PhotoRec
Digital Forensics and Incident Response
PhotoRec on SecurityListing: A free, open-source file data recovery software that can recover lost files from hard disks, CD-ROMs, and digital camera memory.

Innvikta Phishing Simulator
Security Awareness Training
Innvikta Phishing Simulator on SecurityListing: Phishing simulation platform with automated attack simulations and training

403Tech Inc.

Backup as a Service
We help your business, with the use of technology, to be more efficient, more secure, and to put less worry on the IT side of things and more emphasis on the things you are passionate about.

Amazon GuardDuty
Cloud Application Detection and Response
Amazon GuardDuty on SecurityListing: Amazon GuardDuty is a threat detection service for AWS accounts.

ID R&D

Security Operations
ID R&D is an award-winning provider of AI-based facial liveness, document liveness, and voice biometrics. With one of the strongest R&D teams in the industry, ID R&D consistently delivers innovative,

Matos AI SPM
AI Model Security
Matos AI SPM on SecurityListing: AI Security Posture Management solution for AI models, data, and services

SafeLine WAF
API Security
SafeLine WAF on SecurityListing: SafeLine WAF is an open-source web application firewall that protects web services by filtering malicious HTTP traffic through intelligent semantic analysis and machine learning-based detection.

Yoti

Security Operations
Yoti offer a suite of business solutions that span identity verification, age estimation, e-signing and AI anti-spoofing technologies. We’re working together to fix an outdated identity system. We be

Flying Cloud Technology
Data Classification
Flying Cloud Technology CrowsNest DSPM on SecurityListing: DSPM platform for data discovery, classification, tracking, and policy enforcement

IDECSI Permission Explorer
Identity Governance and Administration
IDECSI Permission Explorer on SecurityListing: Permission analysis and supervision tool for Microsoft 365 and file servers

Engage Black

Data Loss Prevention
Engage Black is the Security Business Unit of Engage Communication Inc. and focuses on providing advanced cryptographic products. In particular, solutions that secure and protect cryptographic keys, d

VU Security

Security Operations

Goldilock

Security Operations
Goldilock is redefining how sensitive data, devices, networks and critical infrastructure can be secured. Goldilock is based on the premise that your assets should not be physically connected to the

CipherMail

Data Loss Prevention
CipherMail provides email security products which allow organizations world wide to automatically protect their email against unauthorized access both in transit and at rest. CipherMail is used by va

Metasploit
Endpoint Detection and Response
Metasploit on SecurityListing: A penetration testing framework for identifying and exploiting vulnerabilities.

Celebrus

Security Operations
D4t4 Solutions is focused on helping companies get the best possible value from all their data assets. We intend to lead digital disruption by powering artificial intelligence, machine learning, advan

Imprivata Privileged Access
Password Management
Imprivata Privileged Access Management on SecurityListing: PAM solution for discovering, managing, auditing privileged accounts & sessions