search
Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

UK Cyber Security Forum

UK Cyber Security

United Kingdom flag

Security Operations

UK Cyber Security Forum is a community interest group for cyber security companies in the UK. The forum helps to coordinate the setting up of local/regional cyber security industry clusters around th

4.7(2)
CodeLock

CodeLock

United States flag

Security Operations

Codelock is a patent-pending solution that continuously provides software security at the code level, while providing advanced management insights with performance metrics and data analytics. Codeloc

4.5(3)
Agesic

Agesic

UY flag

Security Operations

Agesic is an institution that leads the development of the Digital Government and the Information and Knowledge Society in Uruguay. We are one of the institutions responsible for the development of t

4.5(3)
C11 Cyber Security & Digital Innovation Centre

C11 Cyber Security

United Kingdom flag

Security Operations

4.5(3)
Darkstrike / Qeros

Darkstrike / Qeros

United States flag

Data Loss Prevention

Protect against quantum & ransomware threats. Proactive data security with Q™ — the world’s most advanced unconditionally secure data platform to protect and empower your data. Complete your defense

4.5(3)
Axiomtek

Axiomtek

Taiwan flag

Industrial Control System Security

Axiomtek is a leading design and manufacturing company in the industrial computer and embedded field.

4.5(3)
DARPA Bin2Math

DARPA Bin2Math

language

Static Application Security Testing

DARPA Bin2Math on SecurityListing: Extracts mathematical algorithms from binary programs for CPS analysis.

4.5(3)
Acumin Recruitment

Acumin Recruitment

United Kingdom flag

Security Operations

Acumin is an internationally established Cyber Security recruitment specialist. Operating since 1998, Acumin consulting has been working exclusively in the cyber security landscape with the world’s le

4.5(3)
APT Groups and Operations

APT Groups and

language

Threat Intelligence Platforms

APT Groups and Operations on SecurityListing: A comprehensive list of APT groups and operations for tracking and mapping different names and naming schemes used by cybersecurity companies and antivirus vendors.

4.5(3)
CBIT Digital Forensics Services (CDFS)

CBIT Digital Forensics

Australia flag

Digital Forensics and Incident Response

4.5(3)
Axis Capital

Axis Capital

Belgium flag

Security Operations

AXIS Insurance’s Professional Lines Division is a leading underwriter of technology/cyber coverage and other specialty products around the globe. Our AXIS TechPlus policy addresses liability exposure

4.5(3)
SpoofGuard

SpoofGuard

Switzerland flag

Brand Protection

Spoofguard shields organizations from online scams, automating the entire process from domain monitoring to takedown enforcement. Domain monitoring is crucial in protecting brands against threats lik

4.5(3)
ASU Online - Information Technology Program

ASU Online -

United States flag

Security Awareness Training

With ASU Online, the information technology graduate can design and create effective solutions to today’s knowledge-based problems. Graduates have the ability to: create network architectures within a

4.5(3)
Astrix Security

Astrix Security

Israel flag

Security Operations

Astrix Security is the first access management solution for third-party app integrations. The rapid increase of app integrations and automation processes has reshaped the modern IT environment into a

4.5(3)
Accelerynt

Accelerynt

United States flag

Compliance Consulting

Accelerynt was founded with a singular purpose: help teams like yours build cybersecurity resilience.  Whether you are building a new capability or maturing your team’s existing capabilities, Accelery

4.5(3)
AMR CyberSecurity

AMR CyberSecurity

United Kingdom flag

Compliance Consulting

AMR CyberSecurity delivers next generation cyber security services to assist organisations across a wide variety of sectors in understanding potential threats and effectively countering them. We also

4.5(3)
BlueID

BlueID

Germany flag

Industrial Control System Security

BlueID is an IDaaS technology product which enables your objects to securely connect and interact with your users’ smart phones and smart watches. We created BlueID because we realise the importance

4.5(3)
Zimperium

Zimperium

United States flag

Security Operations

Zimperium offers enterprise class protection for mobile devices against the next generation of advanced mobile attacks. Zimperium is the first and only company to provide a complete mobile security s

4.5(3)
Aegis9

Aegis9

Australia flag

Compliance Consulting

Aegis9 is an Australian owned and sovereign consultancy that specialises in providing tailored security solutions for both public and private sector clients based on their specific needs. Aegis9 secu

4.5(3)
3Lines Venture Capital

3Lines Venture Capital

United States flag

Security Operations

3Lines Venture Capital invests in exceptional founders and startups working on broad disruptive themes of Future of Work, AI enabled enterprises, and Industry 4.0. The confluence and exponential growt

4.5(3)
Showing 401 to 420 of 4175 products