search
Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Opscompass IT Asset Inventory

Opscompass IT Asset

language

Cyber Asset Attack Surface Management

Opscompass IT Asset Inventory on SecurityListing: IT asset inventory tool for multi-cloud and on-premises environments

4.8(3)
Corsica Technologies Security Consulting Services

Corsica Technologies Security

language

Penetration Testing

Corsica Technologies Security Consulting Services on SecurityListing: A cybersecurity consulting service that provides security assessments, compliance guidance, and strategic planning across multiple industries with flexible engagement models.

4.8(3)
Inspira H1UMAN

Inspira H1UMAN

language

AI Threat Detection

Inspira H1UMAN on SecurityListing: AI-powered cybersecurity automation agent for daily workflow execution

4.8(3)
libnids

libnids

language

Intrusion Detection and Prevention Systems

libnids on SecurityListing: Libnids is an implementation of an E-component of Network Intrusion Detection System that emulates the IP stack of Linux 2.0.x and offers IP defragmentation, TCP stream assembly, and TCP port scan detection.

4.8(3)
Cyware Quarterback AI

Cyware Quarterback AI

language

Threat Intelligence Platforms

Cyware Quarterback AI on SecurityListing: AI-powered threat intelligence platform for real-time threat intel management

4.8(3)
CrowdStrike Falcon Exposure Management

CrowdStrike Falcon Exposure

language

Exposure Management

CrowdStrike Falcon Exposure Management on SecurityListing: Attack surface visibility and vulnerability management platform

4.8(3)
DerSecur Software Composition Analysis (SCA)

DerSecur Software Composition

language

Risk Assessment

DerSecur Software Composition Analysis (SCA) on SecurityListing: SCA tool for SBOM generation, dependency analysis, and open-source risk mgmt.

4.8(3)
Miggo WAF Copilot

Miggo WAF Copilot

language

API Security

Miggo WAF Copilot on SecurityListing: AI-powered WAF rule automation for instant vulnerability protection

4.8(3)
Damn Vulnerable iOS App (DVIA)

Damn Vulnerable iOS

language

Penetration Testing

Damn Vulnerable iOS App (DVIA) on SecurityListing: iOS application for testing iOS penetration testing skills in a legal environment.

4.8(3)
DeHashed

DeHashed

language

Digital Risk Protection

DeHashed on SecurityListing: A data-mining and deep web asset search engine for breach analysis and prevention services.

4.8(3)
Bulwark Technologies

Bulwark Technologies

United Arab Emirates flag

Data Protection

Bulwark Technologies is a cybersecurity distributor focused on the Middle East, with headquarters in Dubai and regional offices in Saudi Arabia and India. The company acts as a value-added distributor

4.8(3)
Logsign Unified SO Platform

Logsign Unified SO

language

Threat Hunting

Logsign Unified SO Platform on SecurityListing: SOAR platform automating threat detection, incident response, and workflows

4.8(3)
BeyondTrust

BeyondTrust

United States flag

Security Operations

BeyondTrust is a worldwide leader in Privileged Access Management, offering the most seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised re

4.8(3)
Elpha Secure

Elpha Secure

United States flag

Security Operations

Elpha Secure provides a comprehensive cybersecurity solution, combining technology and insurance to protect against cyber threats. Cyber Assessment - We automatically analyze a client's security post

4.8(3)
Cyber 50 Defense

Cyber 50 Defense

United Arab Emirates flag

GRC

Cyber 50 Defense is an UAE-based cybersecurity company offering governance, risk and compliance (GRC) solutions, 24/7 managed protection, security assessments, incident response, and compliance servic

4.8(3)
Axonius Asset Management

Axonius Asset Management

language

Cyber Asset Attack Surface Management

Axonius Asset Management on SecurityListing: Unified asset mgmt platform for devices, identities, apps & infrastructure

4.8(3)
StealthMole DarkWeb Monitoring

StealthMole DarkWeb Monitoring

language

API Security

StealthMole DarkWeb Monitoring on SecurityListing: Dark web monitoring platform with AI-based crawling and real-time alerts

4.8(3)
ProLion CryptoSpike

ProLion CryptoSpike

language

Extended Detection and Response

ProLion CryptoSpike on SecurityListing: Real-time ransomware detection & blocking for storage systems with recovery

4.8(3)
Crypto Quantique

Crypto Quantique

United Kingdom flag

Industrial Control System Security

Crypto Quantique are building the most secure end-to-end IoT security platform. Our quantum driven cybersecurity solution enables vertically integrated, highly secure IoT deployments based on unforgea

4.8(3)
Bytes Technology Group

Bytes Technology Group

United Kingdom flag

Compliance Consulting

Bytes is a leading provider of world-class IT solutions. Our growing portfolio of services includes cloud, security, licensing, SAM, storage, virtualisation and managed services. Our highly-skilled t

4.8(3)
Showing 41 to 60 of 4175 products