Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.
Matos Automated Attack
Risk Assessment
Matos Automated Attack Surface Management on SecurityListing: Automated ASM tool for multi-cloud environments with continuous asset discovery
Intel

Security Operations
Intel products are engineered with built-in security technologies to help protect potential attack surfaces. Because these technologies are rooted in silicon, they can operate without being affected b
Auth0 Platform
API Security
Auth0 Platform on SecurityListing: Developer-focused customer identity platform for authentication & authorization
Infosec4tc CISSP® Exam
Certifications
Infosec4tc CISSP® Exam Preparation Training Course on SecurityListing: CISSP exam prep training course covering 8 (ISC)2 knowledge domains
TechLine

GRC
TechLine is an IT services provider in Egypt that enables FinTechs with IT operations, professional IT consultation, and security/compliance services. The company positions itself as a digital transfo
DataCloak Secure Workspace
Data Loss Prevention
DataCloak Secure Workspace on SecurityListing: Zero Trust secure workspace for enterprise data protection and access control
Expeditions

Security Operations
Founded in 2021 by a team of early researchers and pioneers in the future of warfare, Expeditions invests in leading startups at the intersection of security and deep tech. It is a champion for innova
Airbus Cybersecurity

Compliance Consulting
We provide a global cyber defence approach that dynamically aims to protect, detect and respond to cyber threats with a portfolio including managed security services, industrial control system offerin
Curatrix Technologies

Backup as a Service
Curatrix Technologies is a Managed IT Service provider based in Hampshire, UK, providing high quality and reliable Managed IT Services since 2015. Curatrix Technologies are strong advocates of Cyber
Tulpa AI

Penetration Testing
Tulpa develops safe AI assistants (co-pilots) to support and enhance human performance in high-stakes, mission-critical decision-making environments. We enable high-performance, high-value, scalable w
PentesterLab PRO
Penetration Testing
PentesterLab PRO on SecurityListing: Online platform offering 700+ hands-on web security exercises and training
Applicure Technologies

Security Operations
Applicure Technologies develops the leading multi-platform web application security software products to protect web sites and web applications from external and internal attacks.
Kali
Vulnerability Assessment
Kali on SecurityListing: Kali Linux is a specialized Linux distribution for cybersecurity professionals, focusing on penetration testing and security auditing.
ID North Managed
Privileged Access Management
ID North Managed Security Services on SecurityListing: A managed security service provider specializing in identity security solutions including IAM, IGA, and PAM with implementation, operational, and advisory services.
Bulwark Distribution

Data Protection
Bulwark Distribution is a value-added distributor of IT and cybersecurity solutions serving the Middle East with headquarters in Dubai and regional offices in Saudi Arabia and India. The company partn
IDECSI MyDataManagement
Data Security Posture Management
IDECSI MyDataManagement on SecurityListing: Data governance & security platform for Microsoft 365 & file servers
Goldphish Cybersecurity Training
Security Awareness Training
Goldphish Cybersecurity Training on SecurityListing: Cloud-based security awareness training platform with phishing simulation
Eleviant Tech (CTG

Managed Security Service Providers
Eleviant Tech (CTG Group) is a USA based digital transformation company with expertise in Mobile, Cloud, Web, IoT, AR, RPA, Cyberseurity and AI Technologies, catering to industries like Manufacturing,
Liquid C2 Cyber
Managed Security Service Providers
Liquid C2 Cyber Defence Services on SecurityListing: Managed cyber defense services for threat detection and response
Mobilen Secure Mobile
Mobile Device Management
Mobilen Secure Mobile Network on SecurityListing: Secure mobile network with post-quantum encryption and SIM swap protection