Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Miggo WAF Copilot
API Security
Miggo WAF Copilot on SecurityListing: AI-powered WAF rule automation for instant vulnerability protection

Corsica Technologies Security
Penetration Testing
Corsica Technologies Security Consulting Services on SecurityListing: A cybersecurity consulting service that provides security assessments, compliance guidance, and strategic planning across multiple industries with flexible engagement models.

CBRX
Digital Forensics and Incident Response
CBRX on SecurityListing: CBRX is a cloud-based platform that automates incident analysis and reporting for cybersecurity teams.

Swift Security
AI Threat Detection
Swift Security on SecurityListing: A security platform that provides monitoring, control, and protection mechanisms for organizations using generative AI and large language models.

Elpha Secure

Security Operations
Elpha Secure provides a comprehensive cybersecurity solution, combining technology and insurance to protect against cyber threats. Cyber Assessment - We automatically analyze a client's security post

Abilene Advisors Supplier
Risk Assessment
Abilene Advisors Supplier Shield on SecurityListing: End-to-end TPRM platform with advisory, managed services, and cloud tools
IGRC Square

Data Protection
IGRC Square provides cybersecurity solutions for organizations, focusing on governance, risk management, and compliance to safeguard data, devices, and employees. The company emphasizes state-of-the-a

Calypso AI Inference
API Security
Calypso AI Inference Platform on SecurityListing: Platform securing AI models at inference with red-teaming, defense & monitoring

libnids
Intrusion Detection and Prevention Systems
libnids on SecurityListing: Libnids is an implementation of an E-component of Network Intrusion Detection System that emulates the IP stack of Linux 2.0.x and offers IP defragmentation, TCP stream assembly, and TCP port scan detection.

Opscompass IT Asset
Cyber Asset Attack Surface Management
Opscompass IT Asset Inventory on SecurityListing: IT asset inventory tool for multi-cloud and on-premises environments

Cyware Quarterback AI
Threat Intelligence Platforms
Cyware Quarterback AI on SecurityListing: AI-powered threat intelligence platform for real-time threat intel management

CrowdStrike Falcon Exposure
Exposure Management
CrowdStrike Falcon Exposure Management on SecurityListing: Attack surface visibility and vulnerability management platform

Crafting the InfoSec
Threat Intelligence Platforms
Crafting the InfoSec Playbook on SecurityListing: A practical guide to developing a comprehensive security monitoring and incident response strategy, covering incident response fundamentals, threat analysis, and data analysis.

Qmulos Q-BA2
Risk Assessment
Qmulos Q-BA2 on SecurityListing: User behavior analytics & audit solution for insider threat detection

Proofpoint

Brand Protection
Proofpoint provide the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, social media and mobile messaging. Proofpoint prot

DerSecur Software Composition
Risk Assessment
DerSecur Software Composition Analysis (SCA) on SecurityListing: SCA tool for SBOM generation, dependency analysis, and open-source risk mgmt.

Damn Vulnerable iOS
Penetration Testing
Damn Vulnerable iOS App (DVIA) on SecurityListing: iOS application for testing iOS penetration testing skills in a legal environment.

DeHashed
Digital Risk Protection
DeHashed on SecurityListing: A data-mining and deep web asset search engine for breach analysis and prevention services.

Securosys

Data Loss Prevention
Securosys SA is a technology company dedicated to securing data and communications. We develop, produce, and distribute hardware, software and services that protect and verify data and their transmiss

Fasken

Security Operations
Fasken is one of the largest business law firms in Canada and a recognized leader in privacy and cybersecurity law. Privacy and cybersecurity present unique opportunities and risks across your operat