search
Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Alset Technologies

Alset Technologies

United States flag

Governance Risk and Compliance Platforms

Alset Technologies provides a comprehensive solution to DISA STIG (Security Technical Implementation Guide) compliance - DASH.

4.7(2)
Acceptto

Acceptto

United States flag

Security Operations

Acceptto offers the first unified and continuous authentication identity access platform with No-Password.  Our passwordless authentication solution protects enterprise customers, workforce, and partn

4.7(2)
ITButler e-Services

ITButler e-Services

Saudi Arabia flag

Governance Risk and Compliance Platforms

4.7(2)
Infosec4tc CISSP® Exam Preparation Training Course

Infosec4tc CISSP® Exam

language

Certifications

Infosec4tc CISSP® Exam Preparation Training Course on SecurityListing: CISSP exam prep training course covering 8 (ISC)2 knowledge domains

4.7(2)
Cipher xMDR

Cipher xMDR

language

Threat Hunting

Cipher xMDR on SecurityListing: AI-driven MDR service providing unified threat detection across IT, OT, cloud

4.7(2)
Honeywell Process Solutions (HPS)

Honeywell Process Solutions

United States flag

Industrial Control System Security

Honeywell's Industrial Cyber Security Solutions help plants and critical infrastructure sectors defend the availability, reliability and safety of their industrial control systems (ICS) and plant oper

4.7(2)
Pulsedive

Pulsedive

language

Threat Hunting

Pulsedive on SecurityListing: Pulsedive is a threat intelligence platform that provides frictionless threat intelligence for growing teams, offering features such as indicator enrichment, threat research, and API integration.

4.7(2)
Naked Security and Sophos News

Naked Security and

language

Threat Intelligence Platforms

Naked Security and Sophos News on SecurityListing: Naked Security by Sophos offers expert insights and practical advice on cybersecurity threats and protection strategies.

4.7(2)
xargs

xargs

language

Offensive Security

xargs on SecurityListing: A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.

4.7(2)
InfoWatch

InfoWatch

United Arab Emirates flag

Data Protection

InfoWatch develops technologies to control data flow within organizations, visualize how users handle sensitive information, and predict potential data risk to prevent breaches. The company offers pro

4.7(2)
Lumifi ShieldVision™

Lumifi ShieldVision™

language

Endpoint Detection and Response

Lumifi ShieldVision™ on SecurityListing: SOAR platform with investigation, automation, and incident mgmt capabilities

4.7(2)
BigCyberGroup

BigCyberGroup

language

Compliance Consulting

BigCyberGroup on SecurityListing: Provides AI-driven cybersecurity solutions including assessments, training, compliance services, and insurance audits to help organizations reduce risk and build a security-aware culture.

4.7(2)
Risk Cognizance Cyber Risk Assessments

Risk Cognizance Cyber

language

Risk Assessment

Risk Cognizance Cyber Risk Assessments on SecurityListing: Cyber risk assessment service covering attack surface, dark web, ransomware

4.7(2)
DuskRise Security Dashboard

DuskRise Security Dashboard

language

Security Information and Event Management

DuskRise Security Dashboard on SecurityListing: Security dashboard for remote network visibility and policy enforcement

4.7(2)
PEview

PEview

language

Digital Forensics and Incident Response

PEview on SecurityListing: A PE/COFF file viewer that displays header, section, directory, import table, export table, and resource information within various file types.

4.7(2)
Mobilen Secure Mobile Network

Mobilen Secure Mobile

language

Mobile Device Management

Mobilen Secure Mobile Network on SecurityListing: Secure mobile network with post-quantum encryption and SIM swap protection

4.7(2)
Exacom

Exacom

United States flag

Security Operations

Exacom is a leading provider of multimedia logging/recording solutions across public safety, government, DoD, energy, utilities, transportation, and security applications. With thousands of recorders

4.7(2)
Goldphish Cybersecurity Training

Goldphish Cybersecurity Training

language

Security Awareness Training

Goldphish Cybersecurity Training on SecurityListing: Cloud-based security awareness training platform with phishing simulation

4.7(2)
Fireware

Fireware

United Arab Emirates flag

Network Security

Fireware is a cybersecurity-focused company operating in the Middle East, providing information security solutions, data center and connectivity capabilities, and security platform partnerships. The c

4.7(2)
ESET Protect MDR Ultimate

ESET Protect MDR

language

Threat Hunting

ESET Protect MDR Ultimate on SecurityListing: A managed security service providing comprehensive endpoint protection, XDR capabilities, and 24/7 managed detection and response across multiple platforms and environments.

4.7(2)
Showing 321 to 340 of 4175 products