Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

odix CDR API
Advanced Persistent Threat Detection
odix CDR API on SecurityListing: CDR API for file sanitization via Content Disarm & Reconstruction
Swiss GRC Toolbox
Cloud Security
Aqua CNAPP

Cloud Security

Cisilion

Cloud Security
Cisilion's mission is simple – to transform and connect business with next-generation IT infrastructure. Our expertise includes enterprise networking, security, data centre & cloud, managed services a

RedBorder Cybersecurity
Network Detection and Response
RedBorder Cybersecurity on SecurityListing: NDR platform with NGIPS, NetFlow/sFlow analysis, SIEM, and correlation engine

Penta Security D.AMO
Database Security
Penta Security D.AMO Key Management System (KMS) on SecurityListing: Enterprise key management system for encryption key lifecycle management

ORNA AI Crisis
Security Awareness Training
ORNA AI Crisis Simulation on SecurityListing: AI-driven tabletop exercise platform for cyber crisis simulation training

ZARIOT

Industrial Control System Security
Zariot's mission is to restore order to what is becoming connected chaos in IoT by bringing unrivalled security, control and quality of service. Implementing IoT solutions in an existing system can b

Xoriant

Cloud Security
Xoriant is a technology leader and execution partner throughout the Build, Run and Transform lifecycle for companies that create technology products, as well as for enterprises that use those products

Raven Runtime Application
Container Security
Raven Runtime Application Protection on SecurityListing: Runtime app protection with function-level reachability and exploit prevention

RapidFire Tools Network
Risk Assessment
RapidFire Tools Network Detective Pro on SecurityListing: IT risk mgmt toolkit for network assessment, vuln scanning & compliance

CSA Events

Security Operations
The Cloud Security Alliance also conducts several CSA Summits each year. These are typically one day plenary events conducted in cooperation with CSA chapters, as well as being co-located with other p
Orca Cloud Security

Cloud Security

Cypago CGA
Governance Risk and Compliance Platforms
Cypago CGA on SecurityListing: Enterprise Cyber GRC automation platform for compliance and risk management
Oligo Cloud Application
Cloud Security
Runtime application security detecting exploits through eBPF-based library-level behavioral analysis.

Apono Zero Standing
Database Security
Apono Zero Standing Privileges Checklist on SecurityListing: Privileged access platform eliminating standing permissions via JIT access

Centroid

Cloud Security
Centroid is a cloud services and technology company that provides Oracle enterprise workload consulting and managed services across Oracle, Azure, Amazon, Google, and private cloud.

AxoFlow AxoRouter
Data Classification
AxoFlow AxoRouter on SecurityListing: Security data pipeline platform for collection, routing, and processing

TeamTNT Targeting AWS,
Threat Intelligence Platforms
TeamTNT Targeting AWS, Alibaba on SecurityListing: TeamTNT is modifying its malicious shell scripts after they were made public by security researchers.

Uptycs Data Security
Data Classification
Uptycs Data Security Posture Management on SecurityListing: DSPM solution for discovering & classifying sensitive data in cloud workloads