search
Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Miggo WAF Copilot

Miggo WAF Copilot

language

API Security

Miggo WAF Copilot on SecurityListing: AI-powered WAF rule automation for instant vulnerability protection

4.8(3)
Corsica Technologies Security Consulting Services

Corsica Technologies Security

language

Penetration Testing

Corsica Technologies Security Consulting Services on SecurityListing: A cybersecurity consulting service that provides security assessments, compliance guidance, and strategic planning across multiple industries with flexible engagement models.

4.8(3)
CBRX

CBRX

language

Digital Forensics and Incident Response

CBRX on SecurityListing: CBRX is a cloud-based platform that automates incident analysis and reporting for cybersecurity teams.

4.8(3)
Swift Security

Swift Security

language

AI Threat Detection

Swift Security on SecurityListing: A security platform that provides monitoring, control, and protection mechanisms for organizations using generative AI and large language models.

4.8(3)
Elpha Secure

Elpha Secure

United States flag

Security Operations

Elpha Secure provides a comprehensive cybersecurity solution, combining technology and insurance to protect against cyber threats. Cyber Assessment - We automatically analyze a client's security post

4.8(3)
Abilene Advisors Supplier Shield

Abilene Advisors Supplier

language

Risk Assessment

Abilene Advisors Supplier Shield on SecurityListing: End-to-end TPRM platform with advisory, managed services, and cloud tools

4.8(3)
IGRC Square

IGRC Square

EG flag

Data Protection

IGRC Square provides cybersecurity solutions for organizations, focusing on governance, risk management, and compliance to safeguard data, devices, and employees. The company emphasizes state-of-the-a

4.8(3)
Calypso AI Inference Platform

Calypso AI Inference

language

API Security

Calypso AI Inference Platform on SecurityListing: Platform securing AI models at inference with red-teaming, defense & monitoring

4.8(3)
libnids

libnids

language

Intrusion Detection and Prevention Systems

libnids on SecurityListing: Libnids is an implementation of an E-component of Network Intrusion Detection System that emulates the IP stack of Linux 2.0.x and offers IP defragmentation, TCP stream assembly, and TCP port scan detection.

4.8(3)
Opscompass IT Asset Inventory

Opscompass IT Asset

language

Cyber Asset Attack Surface Management

Opscompass IT Asset Inventory on SecurityListing: IT asset inventory tool for multi-cloud and on-premises environments

4.8(3)
Cyware Quarterback AI

Cyware Quarterback AI

language

Threat Intelligence Platforms

Cyware Quarterback AI on SecurityListing: AI-powered threat intelligence platform for real-time threat intel management

4.8(3)
CrowdStrike Falcon Exposure Management

CrowdStrike Falcon Exposure

language

Exposure Management

CrowdStrike Falcon Exposure Management on SecurityListing: Attack surface visibility and vulnerability management platform

4.8(3)
Crafting the InfoSec Playbook

Crafting the InfoSec

language

Threat Intelligence Platforms

Crafting the InfoSec Playbook on SecurityListing: A practical guide to developing a comprehensive security monitoring and incident response strategy, covering incident response fundamentals, threat analysis, and data analysis.

4.8(3)
Qmulos Q-BA2

Qmulos Q-BA2

language

Risk Assessment

Qmulos Q-BA2 on SecurityListing: User behavior analytics & audit solution for insider threat detection

4.8(3)
Proofpoint

Proofpoint

United States flag

Brand Protection

Proofpoint provide the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, social media and mobile messaging. Proofpoint prot

4.8(3)
DerSecur Software Composition Analysis (SCA)

DerSecur Software Composition

language

Risk Assessment

DerSecur Software Composition Analysis (SCA) on SecurityListing: SCA tool for SBOM generation, dependency analysis, and open-source risk mgmt.

4.8(3)
Damn Vulnerable iOS App (DVIA)

Damn Vulnerable iOS

language

Penetration Testing

Damn Vulnerable iOS App (DVIA) on SecurityListing: iOS application for testing iOS penetration testing skills in a legal environment.

4.8(3)
DeHashed

DeHashed

language

Digital Risk Protection

DeHashed on SecurityListing: A data-mining and deep web asset search engine for breach analysis and prevention services.

4.8(3)
Securosys

Securosys

Switzerland flag

Data Loss Prevention

Securosys SA is a technology company dedicated to securing data and communications. We develop, produce, and distribute hardware, software and services that protect and verify data and their transmiss

4.8(3)
Fasken

Fasken

Canada flag

Security Operations

Fasken is one of the largest business law firms in Canada and a recognized leader in privacy and cybersecurity law. Privacy and cybersecurity present unique opportunities and risks across your operat

4.8(3)
Showing 61 to 80 of 4175 products