Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

TrustNXT

Security Operations
TrustNXT provides innovative software solutions to safeguard digital photos and videos from manipulation. We are dedicated to being the catalyst for digital truth, empowering organizations and indivi

KBE Information Security

Cloud Security
KBE Security Solutions and Consulting Services approach is comprehensive. We provide services that range from value added security implementation, risk and threats assessment, to security governance a

Goldilock

Security Operations
Goldilock is redefining how sensitive data, devices, networks and critical infrastructure can be secured. Goldilock is based on the premise that your assets should not be physically connected to the

Beame.io

Security Operations
Beame.io is an information security company that distributes open source authentication infrastructure based on encryption. This authentication infrastructure is used for the creation of credentials w

Gorodissky IP Security

Brand Protection
Gorodissky IP Security is a comprehensive approach to protecting your intellectual property on the Internet and beyond that is based on the best practices and solutions in detecting and combating the

Amnet Technology Solutions

Backup as a Service
With a team of experienced technology experts, amnet delivers top-notch services to customers. Amnet continues to invest in new product offerings that provide innovative and best-in-class solutions to

Kordia

Cloud Security
Kordia is a leading provider of mission-critical technology solutions throughout Australasia. Our expertise spans telecommunications, cyber security, field services, media and broadcast; and safety of

Guy Carpenter

Security Operations
Guy Carpenter delivers a powerful combination of broking expertise, strategic advisory services, and industry-leading analytics. Guy Carpenter has pioneered and expanded cyber liability solutions sin

_cyel

Security Operations
_cyel is introducing a new cybersecurity strategy: not a new generation of patches and firewalls, but moving target security – we take away the targets. Without replacing your existing system. Moving

Heimdal Security

Threat Intelligence Platforms
Heimdal Security provides proactive protection against cyber threats including ransomware, exploit kits and financial malware. Block cyber threats before they compromise your system - Through its tra

AXELOS

Security Operations
AXELOS develops best practice frameworks and methodologies used globally by professionals working primarily in IT service management, project, programme and portfolio management and cyber resilience.
Beacon Technology

Threat Intelligence Platforms
Beacon Technology is a multinational cybersecurity company that offers a comprehensive platform consisting of XDR, VMDR, and Breach and Attack simulation tools. This platform is delivered via a robust

Homeland Security Investigations

Security Operations
Homeland Security Investigations (HSI) is a premier federal law enforcement agency within the Department of Homeland Security (DHS). We shield our nation from global threats to ensure Americans are sa

Inavate Consulting

Compliance Consulting
Inavate Consulting are experts in defining and implementing information assurance solutions and governance frameworks. Our ISO27001 consultants are the most experienced in the industry; they have a va

Intersistemi Italia

Compliance Consulting
Intersistemi is a leading Italian company in the field of information technology integration and digital transformation including cybersecurity. Cyber Defense ServicesOur services are designed to sup

SGCyberSecurity

Security Operations
SGCyberSecurity is Singapore's No.1 Cyber Security portal. SGCyberSecurity provide the first ever ecosystem for security companies, businesses, security professionals and consumers to be connected on

SOOHO

Penetration Testing

Encova Insurance

Security Operations
Encova’s cyber liability coverage protects you and your customers in case of a security breach in your company's data. We’ll monitor your customers’ identities if their information is compromised, and

Five Tattva (5Tattva)

Compliance Consulting
At 5TATTVA, we stand at the forefront of cybersecurity, dedicated to providing comprehensive solutions that fortify your digital defences. With a commitment to excellence and a passion for security,

HUB Security

Security Operations