Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Carbonite

Backup as a Service
Carbonite offers all the tools necessary for protecting data from the most common forms of data loss, including ransomware, accidental deletions, hardware failures and natural disasters. From automat

Crest International

Security Operations
Crest is focused on professionalizing the technical cyber security market whilst driving quality and standards of the organizations that operate within it. In collaboration with industry, Crest has b

Cybersecurity Innovation Hub

Security Operations
The main objective of Cybersecurity Innovation Hub is to bring cybersecurity and other advanced technologies closer to companies and, with the adoption of technology within their business processes, t

Zaviant Consulting

Compliance Consulting
Zaviant Consulting is a leading data security and privacy consulting firm assisting organizations comply with constantly evolving security frameworks and privacy regulations. Pragmatic in our approac

eCapital

Security Operations
eCAPITAL is a leading venture capital firm that provides early to growth stage funding to technology companies in the fields of software & information technology, cybersecurity, industry 4.0, new mate

BakerHostetler

Security Operations
BakerHostetler is one of the largest law firms in the USA and represents clients around the globe. We have five core practice groups: Litigation, Business, Employment, Intellectual Property, and Tax.

C5 Capital

Security Operations

ETSI

Security Operations
ETSI is a European Standards Organization (ESO). We are the recognized regional standards body dealing with telecommunications, broadcasting and other electronic communications networks and services i

Alliance for Cyber

Security Operations
The Alliance for Cyber Security (Allianz für Cybersicherheit) is an initiative of the Federal Office for Information Security (BSI) founded in cooperation with the Federal Association for Information

BioID

Security Operations
BioID are a German company offering deepfake detection, liveness detection, facial authentication & identity verification as a Service. With 20 years of experience our special focus is on biometric a

BehavioSec

Security Operations
BehavioSec uses the way your customers type, swipe, and hold their devices, and enables them to authenticate themselves through their own behavior patterns. You can stop fraud, prevent account takeov

Zeneth Technology Partners

Compliance Consulting
Zeneth is a consulting firm providing information technology and cybersecurity services to federal and commercial clients.

CyPhyCon

Industrial Control System Security
CyPhyCon (Cyber-Physical Systems Security Conference) is an annual event exploring threats and solutions to cyber-kinetic attacks – cyber attacks on cyber-physical systems such as industrial control s

Cohesity

Backup as a Service
Cohesity redefines data management to solve mass data fragmentation. Cohesity lowers TCO and radically simplifies the way businesses back up, manage, protect, and extract value from their data—in the

Authomize

Security Operations
Authomize aggregates identities and authorization mechanisms from any applications around your hybrid environment into one unified platform so you can easily and rapidly manage and secure all users, s

Collins Aerospace

Managed Security Service Providers
Collins Aerospace has the unique ability to leverage technologies across different industries. Our exploration and ingenuity stretches beyond the boundaries of aerospace and defense to provide solutio

Inception Cyber

Threat Intelligence Platforms
Inception Cyber, the inventors of intent-based security, is leading the next generation of threat prevention for an increasingly AI-driven world. Our patent-pending Neural Analysis and Correlation En

Aspiron Search

Security Operations
Aspiron Search is a niche-focused Cybersecurity search firm that works exclusively with venture-backed Cybersecurity firms. Using our robust search methodology and established network, we work to attr

Boxcryptor

Data Loss Prevention
Boxcryptor encrypts your sensitive files before uploading them to cloud storage services. Boxcryptor encrypts your data on your device before it is synchronized to the cloud. Thereby, the highest pos

Catalogic Software

Backup as a Service
Catalogic DPX, The Smart Choice in Data ProtectionReliable, rapid, and low-cost backup and recovery. Protect and recover your data from human errors, disasters, and ransomware attacks. Fast recovery-i