Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Logpoint SOAR & Automation

Logpoint SOAR &

language

Security Orchestration Automation and Response

Logpoint SOAR & Automation on SecurityListing: SOAR platform for automated alert triage, investigation, and response

4.5(1)
Borneo Agentic AI

Borneo Agentic AI

language

Data Loss Prevention

Borneo Agentic AI on SecurityListing: Unified platform for data discovery, security, governance, privacy & compliance

4.5(1)
Borneo Data Security Platform

Borneo Data Security

language

Data Classification

Borneo Data Security Platform on SecurityListing: Data security platform for discovering, analyzing, and remediating sensitive data

4.5(1)
PhotoRec

PhotoRec

language

Digital Forensics and Incident Response

PhotoRec on SecurityListing: A free, open-source file data recovery software that can recover lost files from hard disks, CD-ROMs, and digital camera memory.

4.5(1)
Innvikta Phishing Simulator

Innvikta Phishing Simulator

language

Security Awareness Training

Innvikta Phishing Simulator on SecurityListing: Phishing simulation platform with automated attack simulations and training

4.5(1)
403Tech Inc.

403Tech Inc.

Canada flag

Backup as a Service

We help your business, with the use of technology, to be more efficient, more secure, and to put less worry on the IT side of things and more emphasis on the things you are passionate about.

4.5(1)
Amazon GuardDuty

Amazon GuardDuty

language

Cloud Application Detection and Response

Amazon GuardDuty on SecurityListing: Amazon GuardDuty is a threat detection service for AWS accounts.

4.5(1)
ID R&D

ID R&D

United States flag

Security Operations

ID R&D is an award-winning provider of AI-based facial liveness, document liveness, and voice biometrics. With one of the strongest R&D teams in the industry, ID R&D consistently delivers innovative,

4.5(1)
Matos AI SPM

Matos AI SPM

language

AI Model Security

Matos AI SPM on SecurityListing: AI Security Posture Management solution for AI models, data, and services

4.5(1)
SafeLine WAF

SafeLine WAF

language

API Security

SafeLine WAF on SecurityListing: SafeLine WAF is an open-source web application firewall that protects web services by filtering malicious HTTP traffic through intelligent semantic analysis and machine learning-based detection.

4.5(1)
Yoti

Yoti

United Kingdom flag

Security Operations

Yoti offer a suite of business solutions that span identity verification, age estimation, e-signing and AI anti-spoofing technologies. We’re working together to fix an outdated identity system. We be

4.5(1)
Flying Cloud Technology CrowsNest DSPM

Flying Cloud Technology

language

Data Classification

Flying Cloud Technology CrowsNest DSPM on SecurityListing: DSPM platform for data discovery, classification, tracking, and policy enforcement

4.5(1)
IDECSI Permission Explorer

IDECSI Permission Explorer

language

Identity Governance and Administration

IDECSI Permission Explorer on SecurityListing: Permission analysis and supervision tool for Microsoft 365 and file servers

4.5(1)
Engage Black

Engage Black

United States flag

Data Loss Prevention

Engage Black is the Security Business Unit of Engage Communication Inc. and focuses on providing advanced cryptographic products. In particular, solutions that secure and protect cryptographic keys, d

4.5(1)
VU Security

VU Security

Argentina flag

Security Operations

4.5(1)
Goldilock

Goldilock

United Kingdom flag

Security Operations

Goldilock is redefining how sensitive data, devices, networks and critical infrastructure can be secured. Goldilock is based on the premise that your assets should not be physically connected to the

4.5(1)
CipherMail

CipherMail

Netherlands flag

Data Loss Prevention

CipherMail provides email security products which allow organizations world wide to automatically protect their email against unauthorized access both in transit and at rest. CipherMail is used by va

4.5(1)
Metasploit

Metasploit

language

Endpoint Detection and Response

Metasploit on SecurityListing: A penetration testing framework for identifying and exploiting vulnerabilities.

4.5(1)
Celebrus

Celebrus

United Kingdom flag

Security Operations

D4t4 Solutions is focused on helping companies get the best possible value from all their data assets. We intend to lead digital disruption by powering artificial intelligence, machine learning, advan

4.5(1)
Imprivata Privileged Access Management

Imprivata Privileged Access

language

Password Management

Imprivata Privileged Access Management on SecurityListing: PAM solution for discovering, managing, auditing privileged accounts & sessions

4.5(1)
Showing 1181 to 1200 of 4175 products