Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

watchTowr Adversary Sight Engine

watchTowr Adversary Sight

language

API Security

watchTowr Adversary Sight Engine on SecurityListing: Continuous external attack surface discovery and monitoring platform

4.7(2)
2024 Data Breach Investigations Report

2024 Data Breach

language

Industry Reports

2024 Data Breach Investigations Report on SecurityListing: Get insights into the latest cybersecurity trends and expert advice on enhancing organizational security.

4.7(2)
Goldphish Cybersecurity Training

Goldphish Cybersecurity Training

language

Security Awareness Training

Goldphish Cybersecurity Training on SecurityListing: Cloud-based security awareness training platform with phishing simulation

4.7(2)
D3 Morpheus AI SOC

D3 Morpheus AI

language

Threat Intelligence Platforms

D3 Morpheus AI SOC on SecurityListing: AI-driven SOC platform for automated alert triage, investigation, and response

4.7(2)
Anubis Networks Mail Protection Service

Anubis Networks Mail

language

Data Loss Prevention

Anubis Networks Mail Protection Service on SecurityListing: Email security gateway for enterprises protecting against threats and risks

4.7(2)
Kali

Kali

language

Vulnerability Assessment

Kali on SecurityListing: Kali Linux is a specialized Linux distribution for cybersecurity professionals, focusing on penetration testing and security auditing.

4.7(2)
Ampliphae

Ampliphae

United Kingdom flag

Cloud Security

4.7(2)
PentesterLab PRO

PentesterLab PRO

language

Penetration Testing

PentesterLab PRO on SecurityListing: Online platform offering 700+ hands-on web security exercises and training

4.7(2)
ID North Managed Security Services

ID North Managed

language

Privileged Access Management

ID North Managed Security Services on SecurityListing: A managed security service provider specializing in identity security solutions including IAM, IGA, and PAM with implementation, operational, and advisory services.

4.7(2)
Acunetix Vulnerability Scanner

Acunetix Vulnerability Scanner

language

Vulnerability Assessment

Acunetix Vulnerability Scanner on SecurityListing: A comprehensive web application security testing solution that offers built-in vulnerability assessment and management, as well as integration options with popular software development tools.

4.7(2)
IDECSI MyDataManagement

IDECSI MyDataManagement

language

Data Security Posture Management

IDECSI MyDataManagement on SecurityListing: Data governance & security platform for Microsoft 365 & file servers

4.7(2)
PEview

PEview

language

Digital Forensics and Incident Response

PEview on SecurityListing: A PE/COFF file viewer that displays header, section, directory, import table, export table, and resource information within various file types.

4.7(2)
HitmanPro

HitmanPro

language

Endpoint Protection Platform

HitmanPro on SecurityListing: Malware detection and removal tool for infected computers

4.7(2)
Conviso AppScan

Conviso AppScan

language

Container Security

Conviso AppScan on SecurityListing: Orchestrates and centralizes app security testing results from multiple scanners

4.7(2)
Secureframe SOC 2

Secureframe SOC 2

language

Risk Assessment

Secureframe SOC 2 on SecurityListing: Automates SOC 2 compliance process with continuous monitoring and audit support

4.7(2)
BadCyber

BadCyber

language

Blogs and News

BadCyber on SecurityListing: A curated list of important security news, helping readers stay up-to-date with the latest developments in cybersecurity.

4.7(2)
Liquid C2 Cyber Defence Services

Liquid C2 Cyber

language

Managed Security Service Providers

Liquid C2 Cyber Defence Services on SecurityListing: Managed cyber defense services for threat detection and response

4.7(2)
SecuPi Data De-identification

SecuPi Data De-identification

language

Data Masking

SecuPi Data De-identification on SecurityListing: Data de-identification platform using FPE, tokenization, and masking

4.7(2)
ISS Systems

ISS Systems

EG flag

Data Protection

ISS Systems appears to be a company associated with information security given the domain and the redirected WEAREISS page, but the landing content shown is a generic safety check screen with a Contin

4.7(2)
SafeBreach Exposure Validation Platform

SafeBreach Exposure Validation

language

Exposure Management

SafeBreach Exposure Validation Platform on SecurityListing: Exposure validation platform combining BAS and attack path validation (CART)

4.7(2)
Showing 141 to 160 of 4175 products