search
Join or Log In

Compliance

Browse 532 cybersecurity tools tagged with "Compliance"

H3 Secure

H3 Secure

United Arab Emirates flag
⭐ Editor's Choice

GRC

H3 Secure focuses on providing secure data erasure solutions, secure mobile device management, and information technology security expertise.

4.5(1)
BeyondTrust

BeyondTrust

United States flag

Security Operations

BeyondTrust is a worldwide leader in Privileged Access Management, offering the most seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised re

4.8(3)
Corsica Technologies Security Consulting Services

Corsica Technologies Security

language

Penetration Testing

Corsica Technologies Security Consulting Services on SecurityListing: A cybersecurity consulting service that provides security assessments, compliance guidance, and strategic planning across multiple industries with flexible engagement models.

4.8(3)
Swift Security

Swift Security

language

AI Threat Detection

Swift Security on SecurityListing: A security platform that provides monitoring, control, and protection mechanisms for organizations using generative AI and large language models.

4.8(3)
AAROH

AAROH

QA flag

Compliance Consulting

AAROH helps customers in Government, Law Enforcement, and Enterprises to identify, prevent, detect, resolve and protect from threats, crimes, breaches & frauds arising due to misuse of digital & commu

4.8(3)
Remedio Smart Device Hardening

Remedio Smart Device

language

Endpoint Protection Platform

Remedio Smart Device Hardening on SecurityListing: Automated device hardening and configuration management platform

4.8(3)
Acumera

Acumera

United States flag

Managed Security Service Providers

Acumera is a leader in managed network security, visibility and automation services. Acumera fully secures single-site, multi-site, branch office and corporate office networks, point-of-sale (POS) sy

4.8(3)
Morgan Lewis

Morgan Lewis

United States flag

Security Operations

Morgan Lewis is an international law firm with offices in North America, Europe, Asia, and the Middle East. Practice areas include Privacy and Cybersecurity. Our cybersecurity, incident response and

4.8(3)
Nixon Peabody LLP

Nixon Peabody LLP

United States flag

Security Operations

Nixon Peabody LLP is an international law firm with offices across the USA, Europe and Asia. Practice areas include Data Privacy and Cyber Security. Our Data Privacy and Cyber Security team provides

4.8(3)
IGRC Square

IGRC Square

EG flag

Data Protection

IGRC Square provides cybersecurity solutions for organizations, focusing on governance, risk management, and compliance to safeguard data, devices, and employees. The company emphasizes state-of-the-a

4.8(3)
Guardey Security Awareness Training

Guardey Security Awareness

language

Security Awareness Training

Guardey Security Awareness Training on SecurityListing: Gamified security awareness training platform with microlearning challenges

4.8(3)
Logsign Unified SO Platform

Logsign Unified SO

language

Threat Hunting

Logsign Unified SO Platform on SecurityListing: SOAR platform automating threat detection, incident response, and workflows

4.8(3)
Calypso AI Inference Platform

Calypso AI Inference

language

API Security

Calypso AI Inference Platform on SecurityListing: Platform securing AI models at inference with red-teaming, defense & monitoring

4.8(3)
Latham & Watkins LLP

Latham & Watkins

United States flag

Security Operations

Latham & Watkins is an international law firm with leading transactional, litigation and regulatory practices. Practice areas include Data Privacy, Security and Cybercrime. Our highly ranked, interdi

4.8(3)
Certes

Certes

United States flag

Data Loss Prevention

Certes is a pioneer in delivering cutting-edge security technology solutions, with a specific focus on Data Protection Risk Mitigation (DPRM). With over 20 years of expertise, our technology is deplo

4.8(3)
UL Solutions

UL Solutions

United States flag

Industrial Control System Security

UL Solutions is a safety, security and compliance consulting and certification company. As a global safety science leader, UL Solutions helps companies to demonstrate safety, enhance sustainability, s

4.8(3)
TES

TES

Singapore flag

Security Operations

TES is a provider of IT Lifecycle Services, offering bespoke solutions that help customers manage the commissioning, deployment and retirement of Information Technology assets. We understand the comm

4.8(3)
Proofpoint

Proofpoint

United States flag

Brand Protection

Proofpoint provide the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, social media and mobile messaging. Proofpoint prot

4.8(3)
AppOmni

AppOmni

United States flag

Cloud Security

AppOmni is the only SaaS CSPM solution that gives teams all the tools they need to be successful – from security posture management to monitoring and detection to continuous compliance. To properly s

4.8(3)
Adsigo

Adsigo

Germany flag

Compliance Consulting

Adsigo AG is your reliable and professional partner for all topics concerning PCI certification, compliance and information security. Trust in our more than 15 years of audit experience, internationa

4.7(2)
Alset Technologies

Alset Technologies

United States flag

Governance Risk and Compliance Platforms

Alset Technologies provides a comprehensive solution to DISA STIG (Security Technical Implementation Guide) compliance - DASH.

4.7(2)
cyberconIQ PhishFixIQ

cyberconIQ PhishFixIQ

language

Risk Assessment

cyberconIQ PhishFixIQ on SecurityListing: Behavioral science-based security awareness training and phishing simulation

4.7(2)
ResponseHub Security Questionnaires

ResponseHub Security Questionnaires

language

Risk Assessment

ResponseHub Security Questionnaires on SecurityListing: AI-powered platform for automating security questionnaire responses

4.7(2)
IntelligenceX

IntelligenceX

language

Vulnerability Assessment

IntelligenceX on SecurityListing: Nessus efficiently scans for system vulnerabilities, misconfigurations, and compliance issues.

4.7(2)
Protiviti Cybersecurity Solutions

Protiviti Cybersecurity Solutions

language

Managed Security Service Providers

Protiviti Cybersecurity Solutions on SecurityListing: Global business consulting firm offering cybersecurity consulting services

4.7(2)
Intertek Group

Intertek Group

United Kingdom flag

Industrial Control System Security

Intertek Group provides Assurance, Testing, Inspection and Certification services. Activities include cyber security testing and certification. We work to protect and secure sensitive data and the sa

4.7(2)
ID North Managed Security Services

ID North Managed

language

Privileged Access Management

ID North Managed Security Services on SecurityListing: A managed security service provider specializing in identity security solutions including IAM, IGA, and PAM with implementation, operational, and advisory services.

4.7(2)
Qohash Qostodian

Qohash Qostodian

language

Data Classification

Qohash Qostodian on SecurityListing: Edge data security platform for discovering and managing sensitive data risks

4.7(2)
Airia

Airia

United States flag

Security Operations

Airia is a leading Enterprise AI Orchestration Platform, empowering organizations to securely build, deploy, and manage AI solutions at scale. Our platform seamlessly integrates with existing systems

4.7(2)
AKS iQ

AKS iQ

PK flag

Governance Risk and Compliance Platforms

AKS iQ leads the RegTech sector with AI, automating regulatory compliance in the banking industry and ensuring paperless TBML and CFT adherence in finance. AKS iQ is a leading RegTech company special

4.7(2)
SC Media

SC Media

United States flag

Security Operations

SC Media arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face and establish risk manag

4.7(2)
Zeta Sky

Zeta Sky

United States flag

Backup as a Service

Zeta Sky offers a full range of IT  and cyber-security services for your business. As an AWS consulting partner, our strength is in helping companies leverage Cloud based solutions to either augment t

4.7(2)
Liquid C2 Cyber Defence Services

Liquid C2 Cyber

language

Managed Security Service Providers

Liquid C2 Cyber Defence Services on SecurityListing: Managed cyber defense services for threat detection and response

4.7(2)
Advantio

Advantio

Ireland flag

Governance Risk and Compliance Platforms

Advantio offers a unique combination of technologies and managed, advisory and testing services to increase your cyber resilience. We ensure you will achieve, keep and demonstrate compliance against t

4.7(2)
Ambersail

Ambersail

United Kingdom flag

Governance Risk and Compliance Platforms

Ambersail provide Penetration Testing and Cyber Security Compliance services. Penetration Testing - Make your networks and applications secure. Best value penetration testing with results you can und

4.7(2)
SecuPi Data De-identification

SecuPi Data De-identification

language

Data Masking

SecuPi Data De-identification on SecurityListing: Data de-identification platform using FPE, tokenization, and masking

4.7(2)
XFA

XFA

Belgium flag

Security Operations

XFA is a device security solution that seamlessly identifies every device used for work, increases user awareness, and verifies compliance with the security policy for each device during login — all w

4.7(2)
TESTiLABS

TESTiLABS

Finland flag

Security Operations

TESTiLABS provides test and certification services for multiple industries including wireless, healthcare, telecommunications and automotive. TESTiLABS simplifies and streamlines the journey to EN 18

4.7(2)
BlackSand

BlackSand

United Arab Emirates flag

Data Protection

BlackSand provides cybersecurity services, including virtual CISO, cybersecurity consulting, cybersecurity assessments, and compliance security services, to help organizations achieve their compliance

4.7(2)
British Assessment Bureau

British Assessment Bureau

United Kingdom flag

Security Operations

The British Assessment Bureau is an ISO certification body. We check conformity and compliance of companies to recognised ISO standards including ISO 27001. Our UKAS accreditation is a key part of th

4.7(2)
Hacksplaining

Hacksplaining

language

Secure Code Training

Hacksplaining on SecurityListing: Comprehensive security training platform for web developers, offering hands-on experience with real, vulnerable applications and concrete advice for securing code.

4.7(2)
ANS Group

ANS Group

United Kingdom flag

Managed Security Service Providers

ANS are a strong team of straight-talking tech and business experts. Our mission is to make digital transformation accessible to all. With our Security Centre of Excellence, you get access to our cer

4.7(2)
Archipelo

Archipelo

United States flag

Security Operations

At Archipelo, we empower organizations with Developer Security - to increase software security and compliance throughout the development lifecycle. Our vision is to lead the way in securing the world

4.7(2)
BigCyberGroup

BigCyberGroup

language

Compliance Consulting

BigCyberGroup on SecurityListing: Provides AI-driven cybersecurity solutions including assessments, training, compliance services, and insurance audits to help organizations reduce risk and build a security-aware culture.

4.7(2)
ProcessUnity Threat & Vulnerability Response

ProcessUnity Threat &

language

Risk Assessment

ProcessUnity Threat & Vulnerability Response on SecurityListing: Third-party risk mgmt platform for threat & vulnerability response

4.7(2)
CoSoSys Endpoint Protector

CoSoSys Endpoint Protector

language

Data Loss Prevention

CoSoSys Endpoint Protector on SecurityListing: Multi-OS DLP solution for endpoint data discovery, monitoring, and protection

4.7(2)
LogCraft Detection Engineering

LogCraft Detection Engineering

language

Endpoint Detection and Response

LogCraft Detection Engineering on SecurityListing: Detection-as-code platform for managing detection rules across SIEM/EDR/XDR

4.7(2)
Anchore Enterprise

Anchore Enterprise

language

Container Security

Anchore Enterprise on SecurityListing: Anchore Enterprise is a platform that protects and secures software supply chains end-to-end.

4.7(2)
Borneo

Borneo

United States flag

Data Loss Prevention

Borneo is a Data Security Platform that helps organizations discover, classify, and remediate data and AI governance risks at scale while maintaining continuous compliance. Founded by security expert

4.5(3)
Risk Cognizance Data Protection

Risk Cognizance Data

language

Data Security Posture Management

Risk Cognizance Data Protection on SecurityListing: Data protection service with encryption, access controls, and compliance

4.5(3)
BoostSecurity Software Supply Chain Protection

BoostSecurity Software Supply

language

Software Composition Analysis

BoostSecurity Software Supply Chain Protection on SecurityListing: Software supply chain security platform for SDLC infrastructure protection

4.5(3)
Across Verticals

Across Verticals

MY flag

Compliance Consulting

Across Verticals is a boutique cyber security consulting firm that specializes in holistic, deeply technical and end to end cyber security advisory services based on industry best practices. Our core

4.5(3)
AMR CyberSecurity

AMR CyberSecurity

United Kingdom flag

Compliance Consulting

AMR CyberSecurity delivers next generation cyber security services to assist organisations across a wide variety of sectors in understanding potential threats and effectively countering them. We also

4.5(3)
Concordium

Concordium

Switzerland flag

Security Operations

Concordium aims to build the world’s leading open-source, permissionless, and decentralized blockchain with built-in user identity at the protocol level. Concordium supports regulatory compliance, all

4.5(3)
Astrix Security

Astrix Security

Israel flag

Security Operations

Astrix Security is the first access management solution for third-party app integrations. The rapid increase of app integrations and automation processes has reshaped the modern IT environment into a

4.5(3)
Confidencial Advanced Data Protection

Confidencial Advanced Data

language

Data Loss Prevention

Confidencial Advanced Data Protection on SecurityListing: Data protection platform with selective encryption for unstructured data

4.5(3)
Harbottle & Lewis

Harbottle & Lewis

United Kingdom flag

Security Operations

Harbottle & Lewis is a leading UK-based law firm focused on the Private Client and Technology, Media and Entertainment sectors. Our clients range from start-ups to multinational companies, from house

4.5(3)
CUBE3 AI

CUBE3 AI

United States flag

Security Operations

CUBE3.AI is a web3 security platform that provides real-time transaction protection for smart contracts, safeguarding against cyber exploits, fraud, and compliance risks. At CUBE3.AI, our team consis

4.5(3)
Greenberg Traurig (GT)

Greenberg Traurig (GT)

United States flag

Security Operations

Greenberg Traurig, LLP (GT) is a global law firm with offices in 40 locations in the United States, Latin America, Europe, Asia, and the Middle East. Greenberg Traurig's Data, Privacy & Cybersecurity

4.5(3)
Logpoint SecOps Platform

Logpoint SecOps Platform

language

Security Information and Event Management

Logpoint SecOps Platform on SecurityListing: Integrated SIEM, SOAR, NDR platform with central fleet management capabilities

4.5(3)
Cyvatar Cybersecurity Management

Cyvatar Cybersecurity Management

language

Security Awareness Training

Cyvatar Cybersecurity Management on SecurityListing: All-in-one managed cybersecurity platform with compliance and risk management

4.5(3)
Conviso Platform

Conviso Platform

language

Penetration Testing

Conviso Platform on SecurityListing: AppSec platform for managing application security posture with consulting services

4.5(3)
Votiro Data Detection and Response

Votiro Data Detection

language

Data Masking

Votiro Data Detection and Response on SecurityListing: Zero Trust platform for real-time data masking and file-borne threat prevention

4.5(3)
Comunet

Comunet

Australia flag

Cloud Security

For over 30 years, Comunet has been a trusted Australian cybersecurity partner, delivering specialised consulting, governance, risk and compliance services including ISM, ISO 27001 consulting, and pro

4.5(1)
Elliptic

Elliptic

United Kingdom flag

Digital Forensics and Incident Response

Elliptic solve the crucial problem of identity in cryptocurrencies, with the sole purpose of combating suspicious and criminal activity. We identify illicit activity on the bitcoin and ethereum block

4.5(1)
Concise Technologies

Concise Technologies

United Kingdom flag

Backup as a Service

Concise Technologies provide specialist IT and telecoms solutions, support services, managed backup, disaster recovery, cyber security and consultancy to SME businesses across the UK and Europe. Conc

4.5(1)
Bastazo

Bastazo

United States flag

Governance Risk and Compliance Platforms

Bastazo provides tools for vulnerability and patch management. Focus your cybersecurity operations on vulnerabilities with the highest risk of exploitation. Bastazo's Spartan is a tool for better vul

4.5(1)
Bestman Solutions

Bestman Solutions

United Kingdom flag

Security Operations

As a specialist cyber security practice, we believe that people are an organisation’s most valuable asset. The success of an organisation depends on hiring the right people, and this is where we come

4.5(1)
AI or Not

AI or Not

UN flag

Security Operations

AI or Not - Leverage AI to combat misinformation and elevate the landscape of compliance solutions. AI or Not is a web service that helps users quickly and accurately determine whether an image has b

4.5(1)
Vidoc Security

Vidoc Security

language

Static Application Security Testing

Vidoc Security on SecurityListing: VIDOC is an AI-powered security tool that automates code review, detects and fixes vulnerabilities, and monitors external security, ensuring the integrity of both human-written and AI-generated code in software development pipelines.

4.5(1)
Bluerydge

Bluerydge

Australia flag

Cloud Security

Bluerydge specialises in cyber security and technology, focusing on the delivery of innovative sovereign solutions through trusted, cleared and experienced professionals. We exist to disrupt the curre

4.5(1)
Zanutix Consulting

Zanutix Consulting

JM flag

Cloud Security

At Zanutix, we are dedicated to providing top-notch IT solutions to businesses of all sizes. With a team of highly skilled and experienced professionals, we specialize in a wide range of services incl

4.5(1)
AppSOC

AppSOC

United States flag

Security Operations

AppSOC is a leader in Application Security Posture Management (ASPM) and Code-to-Cloud Vulnerability Management. Our mission is to break through security silos, consolidate data across hundreds of to

4.5(1)
Libraesva

Libraesva

Italy flag

Security Operations

Libraesva secures email communications for organisations, helping them eliminate email borne threats, preserve email data and provide an environment for their people to communicate safely. With an in

4.5(1)
CBRX AI Security & Governance Consulting

CBRX AI Security

language

Risk Assessment

CBRX AI Security & Governance Consulting on SecurityListing: Consulting services for AI security, governance, and compliance implementation

4.5(1)
BitLyft True MDR

BitLyft True MDR

language

Threat Hunting

BitLyft True MDR on SecurityListing: 24/7 managed detection and response service with US-based SOC analysts

4.5(1)
Aeriandi

Aeriandi

United Kingdom flag

Security Operations

Aeriandi is a leading provider of hosted PCI security compliance solutions for call centres, trusted by high street banks and major Telcos. Our award winning secure voice solutions are being used by

4.5(1)
Inveo Group

Inveo Group

Italy flag

Governance Risk and Compliance Platforms

Inveo group is the Italian leader for the management of privacy and data protection issues. Through one to one assessments we provide customized solutions that fit the compliance and security needs of

4.5(1)
BJSS

BJSS

United Kingdom flag

Cloud Security

BJSS is an award-winning technology and engineering consultancy for business. We deliver complex enterprise software by aligning engineering, advanced technology, user-focused design and our collabora

4.5(1)
Business Intelligence Associates (BIA)

Business Intelligence Associates

United States flag

Digital Forensics and Incident Response

For over a decade, BIA has been developing and implementing defensible, technology driven software solutions complimented by mature professional services that reduce the costs and risks related to lit

4.5(1)
AML Solutions

AML Solutions

New Zealand flag

Security Operations

AML Solutions offer a full range of Anti-Money Laundering and Countering the Financing of Terrorism (AML/CFT) services. These services include preparing Risk Assessments, setting up new or helping wi

4.5(1)
Bonfy.AI

Bonfy.AI

United States flag

Security Operations

Bonfy.AI prevents incidents in the use and communication of AI and human generated content, providing visibility and proactive risk mitigation of confidentiality, privacy, compliance, and integrity ex

4.5(1)
Qohash Recon

Qohash Recon

language

Data Classification

Qohash Recon on SecurityListing: Sensitive data discovery tool for unstructured data in files and cloud storage

4.5(1)
Logsign Unified Security Operations Platform

Logsign Unified Security

language

Threat Intelligence Platforms

Logsign Unified Security Operations Platform on SecurityListing: Unified security operations platform combining SIEM, TI, UEBA, and TDIR

4.5(1)
Bureau

Bureau

United States flag

Governance Risk and Compliance Platforms

Bureau is a no-code, identity decisioning platform that offers businesses the complete range of risk, compliance and ongoing fraud monitoring solutions innovated with AI. Using next-generation orches

4.5(1)
Civo

Civo

United Kingdom flag

Cloud Security

Civo isn’t just another cloud and AI platform, it’s a whole new way of thinking. Designed to challenge traditional models, we’ve built a new kind of cloud, defined a better business model to support i

4.5(1)
Credo AI

Credo AI

United States flag

Security Operations

Credo have pioneered a Responsible AI platform that enables context driven, comprehensive and continuous governance, oversight and accountability of AI. Credo AI is on a mission to empower enterprise

4.5(1)
Agio

Agio

United States flag

Compliance Consulting

Agio provide Managed IT & Cybersecurity for Financial Firms. Our industry-specific expertise and AI-powered service delivery transform reactive support into proactive prevention. The result is a consi

4.5(1)
OutThink Human Risk Intelligence

OutThink Human Risk

language

Risk Assessment

OutThink Human Risk Intelligence on SecurityListing: Human risk intelligence platform quantifying cybersecurity human risk

4.5(1)
cyberconIQ AIQ™ Cyber Coach

cyberconIQ AIQ™ Cyber

language

Risk Assessment

cyberconIQ AIQ™ Cyber Coach on SecurityListing: AI-powered cyber coach & training platform for human risk reduction

4.5(1)
RecordPoint

RecordPoint

United States flag

Governance Risk and Compliance Platforms

RecordPoint is a unified data and AI governance platform. Understand your data. Simplify data management. Reduce data risk. RecordPoint brings calm to the chaotic world of data, letting organizations

4.5(1)
Five Tattva (5Tattva)

Five Tattva (5Tattva)

India flag

Compliance Consulting

At 5TATTVA, we stand at the forefront of cybersecurity, dedicated to providing comprehensive solutions that fortify your digital defences. With a commitment to excellence and a passion for security,

4.5(1)
Aquia

Aquia

United States flag

Compliance Consulting

Aquia are on a mission to enable innovation and drive transformative change to solve the world’s most pressing and complex cybersecurity challenges. We are a Service-Disabled Veteran-Owned Small Busi

4.5(1)
Caveonix

Caveonix

United States flag

Cloud Security

Caveonix’s RiskForesight TM solution is an automated, proactive risk and compliance platform designed for hybrid and multi-cloud. It implements CSPM capabilities in addition to including built-in inte

4.5(1)
GeoEdge

GeoEdge

United States flag

Brand Protection

GeoEdge is the premier provider of ad security and quality solutions for the online and mobile advertising ecosystem. GeoEdge guards against non-compliance, malware, inappropriate content, data leaka

4.5(1)
CyDeploy

CyDeploy

United States flag

Security Operations

CyDeploy helps organizations seamlessly understand the impact of technology changes — like patches and digital transformations — on their environment. Our platform provides cutting-edge features to e

4.5(1)
Acsense

Acsense

Israel flag

Security Operations

Acsense's mission is to eliminate IAM as a single point of failure, mitigating threats such as ransomware, insider attacks and human error. At Acsense, we understand the complexities and challenges o

4.5(1)
Celebrus

Celebrus

United Kingdom flag

Security Operations

D4t4 Solutions is focused on helping companies get the best possible value from all their data assets. We intend to lead digital disruption by powering artificial intelligence, machine learning, advan

4.5(1)
SafeCipher

SafeCipher

United Kingdom flag

Data Loss Prevention

At SafeCipher, we pride ourselves on being your single vendor-neutral resource for navigating the complexities of cryptographic data encryption. Our expertise empowers businesses and institutions to s

4.5(1)
Cyver Pentest Management Platform

Cyver Pentest Management

language

Penetration Testing

Cyver Pentest Management Platform on SecurityListing: Pentest management platform for reporting, project mgmt & client collaboration

4.5(1)
Avalon Cyber

Avalon Cyber

United States flag

Compliance Consulting

Arm your organization in the fight against cyberattacks by partnering with the experts at Avalon Cyber. As a full-service managed security services provider (MSSP), Avalon Cyber offers security asses

4.5(1)
Effectiv

Effectiv

United States flag

Security Operations

Effectiv is a real-time fraud & risk management platform for Financial Institutions and Fintechs. Effectiv’s AI-powered no-code platform enables your risk team to be in control of all fraud & complia

4.5(1)
NDAY Security

NDAY Security

United States flag

Penetration Testing

NDAY Security provide a continuous exploitability platform designed to identify critical vulnerabilities in seconds. Continuous Threat Exposure Management (CTEM)More robust attack surface coverage (t

4.5(1)
LogicGate Risk Cloud

LogicGate Risk Cloud

language

Third-Party Risk Management

LogicGate Risk Cloud on SecurityListing: AI-powered enterprise GRC platform for governance, risk, and compliance mgmt.

4.5(1)
Engage Black

Engage Black

United States flag

Data Loss Prevention

Engage Black is the Security Business Unit of Engage Communication Inc. and focuses on providing advanced cryptographic products. In particular, solutions that secure and protect cryptographic keys, d

4.5(1)
Vyntra Global

Vyntra Global

Switzerland flag

Security Operations

Vyntra is a global leader in transaction intelligence, formed from the merger of NetGuardians and Intix. Combining deep expertise in financial crime prevention and transaction data management, Vyntra

4.5(1)
Adlumin

Adlumin

United States flag

Governance Risk and Compliance Platforms

Adlumin Inc. provides the enterprise-grade security operations platform and managed detection and response services that keep mid-market organizations secure. With one license and one platform, its p

4.5(1)
Zip Security

Zip Security

United States flag

Governance Risk and Compliance Platforms

Zip Security make it easy to deploy, configure, and manage key security tools like cross platform device management (MDM), endpoint detection and response (EDR), and more. Zip's platform streamlines

4.5(1)
Barikat Cyber Security

Barikat Cyber Security

Turkey flag

Compliance Consulting

Barikat is a provider of information security solution and services including security analysis and compliance, security testing, managed security services, incident response and training. All our ef

4.5(1)
Oz Forensics

Oz Forensics

United Arab Emirates flag

Security Operations

Oz Forensics is a global leader in preventing biometric and deepfake fraud. Our flagship products, Oz Liveness and Oz Biometry, play a critical role in helping the world’s best organizations defeat bi

4.5(1)
ACA Group

ACA Group

United States flag

Governance Risk and Compliance Platforms

ACA Group are a leading governance, risk, and compliance (GRC) advisor in financial services. ACA Compliance Group was founded in 2002 by four former SEC regulators and one former state regulator. Th

4.5(1)
Allendevaux & Company

Allendevaux & Company

United States flag

Compliance Consulting

Allendevaux & Company is a full-service agency that helps organizations globally with their Cybersecurity, Data Protection, and Compliance requirements. We offer full-service cybersecurity solutions

4.5(1)
Borderless CS

Borderless CS

Australia flag

Compliance Consulting

Borderless CS's primary goal is to empower Australian businesses by strengthening data protection, enhancing cyber confidence, and raising cybersecurity maturity. We are a leading cybersecurity speci

4.5(1)
Promptfoo

Promptfoo

United States flag

Security Operations

Promptfoo helps developers and enterprises build secure, reliable AI applications. Promptfoo discovers and eliminates major LLM risks before they are shipped to production. Its founders have experien

4.5(1)
BreachRx

BreachRx

United States flag

Security Operations

BreachRx is the first intelligent incident response management platform that provides operational resilience for the entire enterprise. At BreachRx, our vision is to enable organizations to achieve o

4.5(1)
Kolide by 1Password Announcing 1Password Extended Access Management

Kolide by 1Password

language

Zero Trust Network Access

Kolide by 1Password Announcing 1Password Extended Access Management on SecurityListing: A tool for monitoring and managing device compliance and security across multiple platforms

4.5(1)
Acuity RM Group

Acuity RM Group

United Kingdom flag

Governance Risk and Compliance Platforms

Acuity RM Group helps businesses worldwide effectively manage, prioritize and report on their risks to inform strategic and tactical decision-making and build long-term resilience. Its powerful STREAM

4.5(1)
Qualys Web Application Scanning (WAS)

Qualys Web Application

language

Security Scanning

Qualys Web Application Scanning (WAS) on SecurityListing: A cloud-based DAST solution that discovers, inventories, and tests web applications and APIs for security vulnerabilities across diverse environments.

4.5(1)
WiSecure Technologies

WiSecure Technologies

Taiwan flag

Data Loss Prevention

WiSecure Technologies aims to develop cryptographic products meeting requirements in the new economic era. Unlike typical hardware security firms prioritizing "contemporary compliance context", we gua

4.5(1)
Affinity Technology Partners

Affinity Technology Partners

United States flag

Compliance Consulting

Affinity Technology Partners has been fueling the growth of Nashville, Tennessee businesses and nonprofits with reliable IT services since 2002. Our team of IT experts handles everything from CIO str

4.5(1)
BSA - The Software Alliance

BSA - The

United States flag

Security Operations

BSA is the leading advocate for the global software industry before governments and in the international marketplace. Its members are among the world's most innovative companies, creating software so

4.5(1)
Cognizant

Cognizant

United States flag

Industrial Control System Security

Cognizant is a leading provider of information technology, business consulting, enterprise applications, and business process services. Security - Cognizant Security Services offer security platforms

4.5(1)
Eclypsium AI Data Center Security

Eclypsium AI Data

language

Security Scanning

Eclypsium AI Data Center Security on SecurityListing: Firmware & hardware security platform for AI data center infrastructure

4.5(1)
Bravura Security Fabric

Bravura Security Fabric

language

Password Management

Bravura Security Fabric on SecurityListing: Unified IAM & PAM platform with identity mgmt, privileged access & password mgmt

4.5(1)
ControlCase One Audit™

ControlCase One Audit™

language

Risk Assessment

ControlCase One Audit™ on SecurityListing: Unified audit platform for multi-framework compliance assessment

4.5(1)
Kriptos Data Classification

Kriptos Data Classification

language

Data Classification

Kriptos Data Classification on SecurityListing: AI-driven data classification platform for sensitive data discovery & labeling

4.5(1)
Almond

Almond

France flag

Compliance Consulting

Almond is positioned as a key independent French player in audit and consulting in the fields of Cybersecurity, Cloud and Infrastructure. Our DNA is made up of strong values shared by its 150 employe

4.5(1)
Comodo Data Loss Prevention

Comodo Data Loss

language

Data Classification

Comodo Data Loss Prevention on SecurityListing: Cloud-based DLP solution monitoring & controlling sensitive data movement

4.5(1)
APT Search

APT Search

United Kingdom flag

Security Operations

APT Search is a recruitment company specialising within the Legal Technology, Cybersecurity and Privacy sectors. We help data and security organisations grow. Our AI technologies enable deep searchin

4.5(1)
Votiro Zero Trust Data Security

Votiro Zero Trust

language

Data Masking

Votiro Zero Trust Data Security on SecurityListing: Zero Trust platform for real-time data masking and file sanitization via CDR

4.5(1)
IDECSI Permission Explorer

IDECSI Permission Explorer

language

Identity Governance and Administration

IDECSI Permission Explorer on SecurityListing: Permission analysis and supervision tool for Microsoft 365 and file servers

4.5(1)
Abacus Group

Abacus Group

United States flag

Managed Security Service Providers

Abacus Group is a global IT services firm for alternative investment firms, providing an enterprise technology platform specifically designed to meet the unique needs of the financial services industr

4.5(1)
Xiarch Solutions

Xiarch Solutions

India flag

Compliance Consulting

Xiarch Security is an global security firm that educates clients, identifies security risks, informs intelligent business decisions, and enables you to reduce your attack surface digitally, physically

4.5(1)
Trapezoid

Trapezoid

United States flag

Security Operations

Trapezoid is a cybersecurity company developing Firmware Integrity Management solutions designed to detect unauthorized changes to firmware & BIOS across the entire data center infrastructure. The Tr

4.5(1)
Exabeam Compliance

Exabeam Compliance

language

Compliance Management

Exabeam Compliance on SecurityListing: Compliance management solution for regulatory and security requirements

4.5(1)
AccessAudit Free Scan

AccessAudit Free Scan

language

Vulnerability Assessment

AccessAudit Free Scan on SecurityListing: Free web accessibility scanner for WCAG 2.1 compliance testing

4.5(1)
Bottomline Technologies

Bottomline Technologies

United States flag

Security Operations

Bottomline Technologies is an innovator in business payment automation technology, helping companies make complex business payments simple, smart and secure. Our Cyber Fraud and Risk Management solut

4.5(1)
Aristi Labs

Aristi Labs

United States flag

Cloud Security

Aristi Labs provides comprehensive security solutions to help businesses protect data and intellectual property, minimizing downtime and maximizing productivity. Our mission is to insure high availab

4.5(1)
Eramba

Eramba

language

Governance Risk and Compliance Platforms

Eramba on SecurityListing: A community-driven GRC solution that is simple, affordable, and open-source.

4.5(1)
Bob's Business

Bob's Business

United Kingdom flag

Security Awareness Training

Bob's Business adopts a fresh approach to information security awareness and compliance training. Delivering key information through the use of short animated movies maximises user engagement and rete

4.5(1)
BoostSecurity Cloud-speed Compliance

BoostSecurity Cloud-speed Compliance

language

Compliance Management

BoostSecurity Cloud-speed Compliance on SecurityListing: Compliance and license management platform for regulatory requirements

4.5(1)
Cipher Net Shield

Cipher Net Shield

United Kingdom flag

Digital Forensics and Incident Response

Cipher Net Shield specializes in secure E-wallet solutions with a strong focus on blockchain and cybersecurity, prioritizing both transaction security and the recovery of lost capital. Leveraging blo

4.5(1)
Airlock Digital

Airlock Digital

Australia flag

Threat Intelligence Platforms

Airlock Digital was created after many years of experience in implementing whitelisting/ allowlisting solutions in Federal Government and various enterprises in Australia. Unlike signature based file

4.5(1)
Cyberra Legal Services (CLS)

Cyberra Legal Services

India flag

Security Operations

Cyberra Legal Services is a premier organization in cyber law advisory, cyber crime consultancy, cyber law compliance audit, cyber security services, cyber forensics services and cyber training (law,

4.5(1)
White Pearl Technology Group (WPTG)

White Pearl Technology

Sweden flag

Compliance Consulting

WPTG are a global group that delivers a broad spectrum of ICT solutions and services, guiding its customers through business and digital transformations. Our main focus is on driving sustainable grow

4.5(1)
Flying Cloud Technology CrowsNest DSPM

Flying Cloud Technology

language

Data Classification

Flying Cloud Technology CrowsNest DSPM on SecurityListing: DSPM platform for data discovery, classification, tracking, and policy enforcement

4.5(1)
PortSwigger

PortSwigger

language

Penetration Testing

PortSwigger on SecurityListing: A comprehensive toolkit for web application security testing, offering a range of products and solutions for identifying vulnerabilities and improving security posture.

4.5(1)
Action1

Action1

United States flag

Security Operations

Action1 is a Cloud-based lightweight endpoint security platform that discovers all of your endpoints in seconds and allows you to retrieve live security information from the entire network using plain

4.5(1)
SurePath AI

SurePath AI

United States flag

Security Operations

SurePath AI is a SaaS platform that governs any GenAI solutions you build, adopt, or buy - even Shadow AI. It secures both public and private models, detects usage, mitigates risks, and controls data

4.5(1)
Innvikta InSAT Security Awareness Maturity Calculator

Innvikta InSAT Security

language

Risk Assessment

Innvikta InSAT Security Awareness Maturity Calculator on SecurityListing: Assessment tool for evaluating org security awareness program maturity

4.5(1)
Borneo Agentic AI

Borneo Agentic AI

language

Data Loss Prevention

Borneo Agentic AI on SecurityListing: Unified platform for data discovery, security, governance, privacy & compliance

4.5(1)
Kramer Levin

Kramer Levin

United States flag

Security Operations

Kramer Levin Naftalis & Frankel LLP is a premier, full-service law firm with offices in New York, Silicon Valley and Paris. Practice areas include Cybersecurity, Privacy and Data Protection. Kramer L

4.5(1)
Wahaya IT

Wahaya IT

United States flag

Backup as a Service

Wahaya IT works to provide technology solutions that unify systems to reduce risk, improve performance, and control operating costs. We provide solutions and services to help small and mid-sized orga

4.5(1)
HOBI International

HOBI International

United States flag

Security Operations

HOBI International, Inc. is a leading mobile, IT and data center asset management provider with comprehensive and traceable solutions for device management, reverse logistics, data erasure, refurbishm

4.5(1)
AccountabilIT

AccountabilIT

United States flag

Backup as a Service

AccountabilIT is a full spectrum information technology services firm for enterprises with complex information technology needs seeking relief from those challenges. Protecting your IT infrastructure

4.5(1)
Drata Risk Management

Drata Risk Management

language

Risk Assessment

Drata Risk Management on SecurityListing: Platform for end-to-end risk assessments, control implementation & testing

4.5(1)
Althammer & Kill

Althammer & Kill

Germany flag

Compliance Consulting

Althammer & Kill offers pragmatic solution concepts for data protection and digitization. We advise in the field of data protection, information security and compliance. Our employees work as external

4.5(1)
Ampsight

Ampsight

United States flag

Governance Risk and Compliance Platforms

Ampsight specializes in enabling cloud integration, securing data, and navigating complications that drive critical-mission success. Our cloud-based solutions leverage our expertise to develop, deploy

4.5(1)
Censinet RiskOps™

Censinet RiskOps™

language

Risk Assessment

Censinet RiskOps™ on SecurityListing: Healthcare-focused risk management platform with AI-powered risk assessment

4.5(1)
CybSafe RESPOND

CybSafe RESPOND

language

Risk Assessment

CybSafe RESPOND on SecurityListing: Automation platform for human risk mgmt with behavioral science-based interventions

4.5(1)
BARR ISO 27001 Certifications

BARR ISO 27001

language

Compliance Consulting

BARR ISO 27001 Certifications on SecurityListing: ISO 27001/27017/27018/27701/42001 certification services and ISMS auditing

4.5(1)
American Technology Services (ATS)

American Technology Services

United States flag

Compliance Consulting

American Technology Services provides unparalleled services in information technology to support small and mid-sized business. Our technology span the full range of IT issues, from top-level strategy

4.5(1)
NordLayer Threat Protection

NordLayer Threat Protection

language

VPN

NordLayer Threat Protection on SecurityListing: Business VPN with threat protection, DNS filtering, and malware detection

4.5(1)
AnyTech365

AnyTech365

Spain flag

Managed Security Service Providers

AnyTech365 is a leading European IT Security and Support company helping end users and small businesses have a worry-free experience with all things tech. Our mission is to provide world’s best servi

4.5(1)
Altius IT

Altius IT

United States flag

Security Operations

As Certified Information Systems Auditors, Altius IT offers a full range of audits and assessments including: Website security vulnerability assessmentsWebsite compliance audits and industry requirem

4.5(1)
XpertDPO

XpertDPO

Ireland flag

Governance Risk and Compliance Platforms

XpertDPO provides data security, governance, risk and compliance, GDPR and ISO consultancy to public and private sector organisations. We help change our clients relationship with the data they proce

4.5(1)
Xperien

Xperien

South Africa flag

Security Operations

Xperien (Pty) Limited is a leading Johannesburg-based South African Information Technology Asset Disposition (ITAD) company. We are the only company in Africa with ISO9001:2015 accreditation specifica

4.5(1)
Borneo Agentic AI Data Security Platform

Borneo Agentic AI

language

Data Classification

Borneo Agentic AI Data Security Platform on SecurityListing: AI-powered data security platform with autonomous agents for data protection

4.5(1)
Entrust

Entrust

United States flag

Data Loss Prevention

Entrust is a global leader in digital security, identities, payments, and data protection. As a pioneer in the business of issuing identities and securing transactions, Entrust is actively involved i

4.5(1)
Boman.ai AppSec Tool

Boman.ai AppSec Tool

language

Dynamic Application Security Testing

Boman.ai AppSec Tool on SecurityListing: ASPM platform for monitoring, prioritizing, and remediating risks across SDLC

4.5(1)
Verisys File Integirty Monitoring

Verisys File Integirty

language

Security Information and Event Management

Verisys File Integirty Monitoring on SecurityListing: A next-generation file integrity monitoring and change detection system

4.5(1)
Qmulos Q-Core

Qmulos Q-Core

language

Compliance Management

Qmulos Q-Core on SecurityListing: Compliance mgmt platform for evidence collection, policy tracking & reporting

4.5(1)
ProcessUnity Third-Party Risk Management Platform

ProcessUnity Third-Party Risk

language

Risk Assessment

ProcessUnity Third-Party Risk Management Platform on SecurityListing: Platform for managing third-party vendor risks across the lifecycle

4.5(1)
Delve GDPR

Delve GDPR

language

Compliance Management

Delve GDPR on SecurityListing: AI-powered GDPR compliance platform with automated evidence collection

4.5(1)
WithSecure Elements Cloud

WithSecure Elements Cloud

language

Endpoint Detection and Response

WithSecure Elements Cloud on SecurityListing: Cloud-based cybersecurity platform for MSPs with EDR, XDR, and MDR capabilities

4.5(1)
LogicGate Risk Management Suite

LogicGate Risk Management

language

Risk Assessment

LogicGate Risk Management Suite on SecurityListing: GRC platform for managing risk, compliance, and governance processes

4.5(1)
Echelon

Echelon

Russia flag

Security Operations

Echelon Company is a provider of information security services specializing in certification of security software and hardware products in Russia. 1. Consulting on security certification and accredit

4.5(1)
Systems Assessment Bureau (SAB)

Systems Assessment Bureau

United Kingdom flag

Security Operations

Systems Assessment Bureau (SAB) is a leading ISO Certification body, recognized globally. SAB engages with organizations to outperform in their journey of demonstrating compliance, assurance, innovati

4.5(1)
KryptoKloud

KryptoKloud

United Kingdom flag

Governance Risk and Compliance Platforms

KryptoKloud offer a suite of Managed Services including Security Monitoring and Incident Response as well as a full portfolio of Compliance, Governance and Audit solutions. KryptoKloud was establishe

4.5(1)
Ensighten

Ensighten

United States flag

Governance Risk and Compliance Platforms

Ensighten is a leader in Website Security & Privacy Compliance. Protect Your Website From Malicious Attacks & Formjacking. Securely Manage Third-Party Tech. Monitor & Detect Vulnerabilities. Control a

4.5(1)
Cybersecurity Collaboration Forum

Cybersecurity Collaboration Forum

United States flag

Security Operations

The mission of the Cybersecurity Collaboration Forum is to foster information security communication and idea sharing across the C-Suite, enabling leaders to better defend, preserve and protect local

4.5(1)
Veratad Technologies

Veratad Technologies

United States flag

Security Operations

Veratad Technologies, LLC is a world class provider of online/real-time Identity Verification, Age Verification, Fraud Prevention and Compliance Solutions. Our verification solutions are designed to

4.5(1)
TekSek Cyber Security

TekSek Cyber Security

LK flag

Governance Risk and Compliance Platforms

TekSek is the exclusive sales & marketing partner for Cyber Security Works in the Sri Lankan territory. We provide a wide range of cyber security solutions, from security audits to data security stand

4.5(1)
Akin Gump Strauss Hauer & Feld

Akin Gump Strauss

United States flag

Security Operations

Akin Gump Strauss Hauer & Feld LLP is a leading global law firm providing innovative legal services and business solutions to individuals and institutions. Practice areas include Cybersecurity, Privac

4.5(1)
CMMC Resources

CMMC Resources

language

Compliance Management

CMMC Resources on SecurityListing: A compliance management platform that simplifies CMMC Level 1 certification for defense contractors through guided workflows, policy templates, and evidence management tools.

4.5(1)
Cybool

Cybool

Israel flag

Governance Risk and Compliance Platforms

Cybool delivers Next-Gen Risk and Policy Management by transforming raw security data into actionable threat intel. Unlike traditional GRC solutions, Cybool integrates real-time threat intelligence d

4.5(1)
ControlCase One Audit

ControlCase One Audit

language

Compliance Management

ControlCase One Audit on SecurityListing: Unified audit platform for multi-framework compliance assessment and reporting

4.5(1)
InfoSight

InfoSight

United States flag

Compliance Consulting

InfoSight offers proven Cyber Security, Regulatory Compliance, Risk Management and Infrastructure Solutions to protect your business and your customers from cyber crime and fraud. We are a Cyber Secu

4.5(1)
Panaseer Metrics Measurement

Panaseer Metrics Measurement

language

Risk Assessment

Panaseer Metrics Measurement on SecurityListing: Automates security metrics measurement and reporting for posture management.

4.5(1)
Polymer AI Security

Polymer AI Security

language

Data Classification

Polymer AI Security on SecurityListing: Runtime security platform for AI workflows and SaaS data protection

4.5(1)
ISO2HANDLE

ISO2HANDLE

language

Compliance Management

ISO2HANDLE on SecurityListing: ISO2HANDLE is a powerful software that provides a total solution for Q&R professionals, trusted by over 50,000 users and 750+ organizations worldwide.

4.5(1)
Blake, Cassels & Graydon (Blakes)

Blake, Cassels &

Canada flag

Security Operations

Blakes is one of Canada’s top business law firms serving national and international clients in specialist areas including cyber security. The Blakes Cybersecurity group is a multidisciplinary team of

4.5(1)
Fairly AI

Fairly AI

Canada flag

Security Operations

Fairly AI is on a mission to democratize safe, secure, and compliant AI across the enterprise. SafeAI and non-AI models need risk management and oversight. Fairly provides a continuous monitoring sys

4.5(1)
BeOne Development

BeOne Development

Netherlands flag

Security Awareness Training

BeOne Development provide innovative training and learning solutions for information security and compliance. Our teams are continuously working on digital learning solutions: from creating strong co

4.5(1)
Logsign USO Platform

Logsign USO Platform

language

Security Information and Event Management

Logsign USO Platform on SecurityListing: SIEM platform with compliance reporting for regulatory standards

4.5(1)
Custodia Continuity

Custodia Continuity

United Kingdom flag

Backup as a Service

Custodia Continuity manage your Security, Backup, Continuity and Compliance. You get on with your business. We want to level the playing field, security, ransomware proof backups, good business conti

4.5(1)
ERM Protect PCI Compliance

ERM Protect PCI

language

Compliance Management

ERM Protect PCI Compliance on SecurityListing: PCI DSS compliance services and consulting for payment card security

4.5(1)
Kriptos AI Data Classification

Kriptos AI Data

language

Data Classification

Kriptos AI Data Classification on SecurityListing: AI-driven data classification software for automated document labeling

4.5(1)
Eclypsium Supply Chain Security

Eclypsium Supply Chain

language

Cyber Asset Attack Surface Management

Eclypsium Supply Chain Security on SecurityListing: Supply chain security platform for IT infrastructure hardware and firmware

4.5(1)
Borneo Data Security Platform

Borneo Data Security

language

Data Classification

Borneo Data Security Platform on SecurityListing: Data security platform for discovering, analyzing, and remediating sensitive data

4.5(1)
CBRX AI Adoption Assessment

CBRX AI Adoption

language

Risk Assessment

CBRX AI Adoption Assessment on SecurityListing: AI readiness assessment service evaluating security, compliance, and ROI.

4.5(1)
Jsmon 2.0

Jsmon 2.0

language

API Security

Jsmon 2.0 on SecurityListing: JavaScript security scanner for detecting vulnerabilities in third-party scripts

4.5(1)
Fidelis Halo

Fidelis Halo

language

Container Security

Fidelis Halo on SecurityListing: A cloud native application protection platform that provides security monitoring and protection across cloud, on-premises, and hybrid environments.

4.5(1)
PII Crawler

PII Crawler

language

Data Classification

PII Crawler on SecurityListing: PII Crawler is a data scanning tool that identifies and locates Personally Identifiable Information in various file types and databases.

4.5(1)
Hunter

Hunter

language

Brand Protection

Hunter on SecurityListing: An all-in-one email outreach platform for finding and connecting with professionals, with features for lead discovery, email verification, and cold email campaigns.

4.5(1)
Votiro Advanced Content Disarm & Reconstruction

Votiro Advanced Content

language

Threat Intelligence Platforms

Votiro Advanced Content Disarm & Reconstruction on SecurityListing: CDR solution that sanitizes files to remove malware while preserving functionality

4.5(1)
MX Layer Outbound Email Filtering

MX Layer Outbound

language

Data Loss Prevention

MX Layer Outbound Email Filtering on SecurityListing: Outbound email filtering platform for spam prevention and IP reputation mgmt

4.5(1)
IonX Verisys FIM

IonX Verisys FIM

language

Security Information and Event Management

IonX Verisys FIM on SecurityListing: File integrity monitoring for Windows, Linux & network devices

4.5(1)
Lumifi Network Detection & Response (NDR)

Lumifi Network Detection

language

Managed Detection and Response

Lumifi Network Detection & Response (NDR) on SecurityListing: Managed NDR service monitoring network traffic for threats via co-managed model

4.5(1)
AnChain.AI

AnChain.AI

United States flag

Security Operations

AnChain.AI's analytics platform proactively protects crypto assets by providing proprietary artificial intelligence, knowledge graphs, and threat intelligence on blockchain transactions. Our AI-power

4.5(1)
CybeReady Cybersecurity Training

CybeReady Cybersecurity Training

language

Security Awareness Training

CybeReady Cybersecurity Training on SecurityListing: Automated cybersecurity awareness training with phishing simulation

4.5(1)
ProcessUnity Global Risk Exchange

ProcessUnity Global Risk

language

Risk Assessment

ProcessUnity Global Risk Exchange on SecurityListing: Third-party risk assessment database with 18K+ validated assessments

4.5(1)
KnowBe4 Security Awareness Training

KnowBe4 Security Awareness

language

Security Awareness Training

KnowBe4 Security Awareness Training on SecurityListing: A human risk management platform that combines security awareness training, simulated phishing, real-time coaching, and security orchestration to reduce cybersecurity risks associated with human behavior.

4.5(1)
Cyvatar Compliance Mapping

Cyvatar Compliance Mapping

language

Risk Assessment

Cyvatar Compliance Mapping on SecurityListing: Maps cybersecurity controls to regulatory compliance frameworks

4.5(1)
AKATI Sekurity Proactive Cyber Defense

AKATI Sekurity Proactive

language

Threat Intelligence Platforms

AKATI Sekurity Proactive Cyber Defense on SecurityListing: Managed security services provider offering 24/7 threat monitoring and response

4.5(1)
Cydarm Platform

Cydarm Platform

language

Security Orchestration Automation and Response

Cydarm Platform on SecurityListing: SOC management platform for incident response and cyber response management

4.5(1)
Prophaze WAF-as-a-Service

Prophaze WAF-as-a-Service

language

API Security

Prophaze WAF-as-a-Service on SecurityListing: Cloud-based WAF service protecting web apps from threats and vulnerabilities

4.5(1)
Apollo Secure AI-Powered Cyber Compliance

Apollo Secure AI-Powered

language

Risk Assessment

Apollo Secure AI-Powered Cyber Compliance on SecurityListing: AI-powered cyber compliance platform for security automation and compliance

4.5(1)
G DATA Cyber Defense

G DATA Cyber

language

Endpoint Protection Platform

G DATA Cyber Defense on SecurityListing: German endpoint protection & cyber defense platform with AI-based detection

4.5(1)
Brinqa

Brinqa

United States flag

Governance Risk and Compliance Platforms

Brinqa is a leading provider of unified risk management – enabling stakeholders, governance organizations, and infrastructure and security teams to effectively manage technology risk at the speed of b

4.5(1)
Imprivata Privileged Access Management

Imprivata Privileged Access

language

Password Management

Imprivata Privileged Access Management on SecurityListing: PAM solution for discovering, managing, auditing privileged accounts & sessions

4.5(1)
Anjolen

Anjolen

United States flag

Compliance Consulting

Anjolen provides expertise in cybersecurity, compliance and cyber forensic services. We understand the challenges faced by businesses to increase efficiency by integrating technology into daily produ

4.5(1)
Risk Cognizance GRC Platform

Risk Cognizance GRC

language

Risk Assessment

Risk Cognizance GRC Platform on SecurityListing: GRC platform for consultants/MSSPs to automate compliance risk management

4.5(1)
Panorays Risk DNA

Panorays Risk DNA

language

Risk Assessment

Panorays Risk DNA on SecurityListing: AI-driven third-party risk assessment platform with cybersecurity posture mgmt

4.5(1)
Abilene Advisors Supplier Shield Managed Services

Abilene Advisors Supplier

language

Risk Assessment

Abilene Advisors Supplier Shield Managed Services on SecurityListing: Managed TPRM services providing expert support for vendor risk assessments

4.5(1)
Aphelio

Aphelio

France flag

Compliance Consulting

Aphelio is a company specialising in cybersecurity, operating throughout France to support companies and local authorities in the protection of their information systems. Our areas of expertise are v

4.5(1)
Varutra Consulting

Varutra Consulting

India flag

Cloud Security

Varutra Consulting is an Information Security Consulting, Solutions and Training services firm, providing specialized security services for software, mobile and network. Varutra is a CERT-In Empanele

4.5(1)
Centum Digital

Centum Digital

Spain flag

Compliance Consulting

Centum Digital provide services, products and solutions specialized in communications engineering, control and signal intelligence. We operate mainly in the Aerospace, Defense, Emergency, Security and

4.5(1)
Finite State Platform

Finite State Platform

language

Software Composition Analysis

Finite State Platform on SecurityListing: Platform for vulnerability detection in firmware, binaries, and SBOMs

4.5(1)
Heights Consulting Group

Heights Consulting Group

United States flag

Compliance Consulting

Heights Consulting Group is a cybersecurity consulting firm specializing in strategic guidance, risk governance, and regulatory readiness. Heights Consulting Group exists to empower executive leaders

4.5(1)
Atakama

Atakama

United States flag

Data Loss Prevention

With Atakama, data remains encrypted until the very moment it is used, and the ability to decrypt is based on zero trust architecture. Using multi-factor encryption, Atakama provides exceptional data

4.5(1)
QuilrAI

QuilrAI

United States flag

Data Loss Prevention

Traditional security tools silo these layers, creating gaps that attackers exploit. Quilr unifies them—protecting sensitive data across every touchpoint, securing AI from prompts to autonomous agents,

4.3(2)
AU10TIX

AU10TIX

CY flag

Governance Risk and Compliance Platforms

AU10TIX is an identity intelligence company on a mission to obliterate fraud and make the world a more secure and inclusive place, with forensic-grade technology that confidently links our physical an

4.3(2)
BBS Technology

BBS Technology

Turkey flag

Compliance Consulting

BBS Technology is a company that develops and delivers next-generation cyber security technologies worldwide. With a customer-oriented approach, we strive to fully understand the business requirement

4.3(2)
Bastion Security Group

Bastion Security Group

New Zealand flag

Cloud Security

Bastion Security combines the skills, expertise and leadership from Quantum Security, ZX Security, Helix Security and Cassini. We offer a wide range of services including security assessments, audits

4.3(2)
ABCsolutions

ABCsolutions

Canada flag

Governance Risk and Compliance Platforms

ABCsolutions is dedicated to assisting businesses and professionals achieve compliance with federal anti-money laundering regulations in an intelligent and pragmatic way. With these resources in plac

4.3(2)
PII Tools

PII Tools

language

Data Classification

PII Tools on SecurityListing: A tool for discovering, analyzing, and remedying sensitive data

4.3(2)
AdviserCyber

AdviserCyber

United States flag

Governance Risk and Compliance Platforms

AdviserCyber provide Cybersecurity and Compliance Solutions for Registered Investment Advisers. Registered Investment Advisors’ cybersecurity needs are specific. You need a team at the top of their t

4.3(2)
NST Cyber

NST Cyber

United States flag

Security Operations

NST Cyber provides comprehensive Threat Exposure Management to Global banks and Forbes 2000 companies. NST Cyber was established with the vision of empowering organisations with the necessary tools a

4.3(2)
AlertSec

AlertSec

United States flag

Data Loss Prevention

AlertSec Ensure is a U.S. patented technology that allows you to educate, verify and enforce encryption compliance of third-party devices. Many organizations work with third-parties, such as partners

4.3(2)
Lacework

Lacework

United States flag

Cloud Security

Lacework brings speed, scale, and automation to cloud security and allows security and DevOps teams to collaborate on keeping data and applications safe in today’s highly dynamic cloud environments.

4.3(2)
Amtivo Group

Amtivo Group

United Kingdom flag

Security Operations

Our vision is to inspire and enable organisations globally to reach their true potential, by making governance, compliance and inspection a truly positive and valuable experience. We do this through

4.3(2)
BEEPHISH Training Tools

BEEPHISH Training Tools

language

Security Awareness Training

BEEPHISH Training Tools on SecurityListing: Phishing simulation and security awareness training platform for employees

4.3(2)
F5 AI Guardrails

F5 AI Guardrails

language

Data Loss Prevention

F5 AI Guardrails on SecurityListing: Runtime security for AI models, agents, and data with guardrails and compliance

4.3(2)
TrustLogix TrustAccess

TrustLogix TrustAccess

language

Identity Governance and Administration

TrustLogix TrustAccess on SecurityListing: Data access governance platform enforcing least-privilege across data platforms

4.3(2)
FutureFeed

FutureFeed

language

Compliance Management

FutureFeed on SecurityListing: A tool for achieving and proving compliance with NIST 800-171 and CMMC cybersecurity requirements

4.3(2)
AvePoint Products

AvePoint Products

language

Backup as a Service

AvePoint Products on SecurityListing: Platform for managing, protecting & governing digital workplace assets

4.3(2)
InfoRisk Today

InfoRisk Today

language

Blogs and News

InfoRisk Today on SecurityListing: InfoRisk Today is a key resource for news and insights on information risk management and cybersecurity education.

4.3(2)
CBRX AI Security & Governance

CBRX AI Security

language

Risk Assessment

CBRX AI Security & Governance on SecurityListing: AI security consulting for governance, compliance, and secure AI system design

4.3(2)
Huntress Managed Security Awareness Training

Huntress Managed Security

language

Security Awareness Training

Huntress Managed Security Awareness Training on SecurityListing: Managed security awareness training with threat intel-based content & phishing sims

4.3(2)
4Stop

4Stop

Germany flag

Governance Risk and Compliance Platforms

4Stop is a global KYC, compliance and anti-fraud risk management company. 4Stop have developed their proprietary anti-fraud technology with real-time intelligence and data aggregation to be the best-

4.3(2)
Apono Zero Standing Privileges

Apono Zero Standing

language

Database Security

Apono Zero Standing Privileges on SecurityListing: JIT/JEP access mgmt platform replacing standing privileges w/ time-bound access

4.3(2)
Bleach Cyber

Bleach Cyber

United States flag

Cloud Security

Bleach Cyber helps small businesses with an affordable and user-friendly solution for managing cloud security. With Bleach Cyber, SMEs have a partner who understands their unique challenges and needs

4.3(2)
AccessAudit Website Accessibility Scanner

AccessAudit Website Accessibility

language

Compliance Management

AccessAudit Website Accessibility Scanner on SecurityListing: Website accessibility scanner for ADA/WCAG compliance testing

4.3(2)
Ceerus

Ceerus

United Kingdom flag

Data Loss Prevention

Ceerus was created to simplify the process of deploying and managing security across all the channels in an organisation. We do that by providing a proven layer of security that can be integrated easi

4.2(3)
Boolebox Data Protection Software

Boolebox Data Protection

language

Password Management

Boolebox Data Protection Software on SecurityListing: Data protection software with encryption for files, emails, and passwords

4.2(3)
Wolfpack Information Risk

Wolfpack Information Risk

South Africa flag

Compliance Consulting

Wolfpack specialise in information and cyber threat management covering the full spectrum of prevention, detection, incident response and business resilience capabilities. Advisory - Professional bus

4.2(3)
Forcepoint DLP

Forcepoint DLP

language

Data Loss Prevention

Forcepoint DLP on SecurityListing: Enterprise DLP solution for preventing data loss across cloud, web, email, endpoint

4.2(3)
Chainalysis

Chainalysis

United States flag

Digital Forensics and Incident Response

Chainalysis provides blockchain analysis software to prevent, detect and investigate cryptocurrency money laundering, fraud and compliance violations. Chainalysis uses pattern recognition, machine le

4.2(3)
InfraShield

InfraShield

United States flag

Industrial Control System Security

InfraShield is a US-based cyber-physical security company specializing in the protection of critical infrastructure systems across OT and IT environments. We design and implement tailored solutions, t

3.9(2)
Crossbow Labs

Crossbow Labs

India flag

Compliance Consulting

Crossbow Labs empowers businesses of all sizes, from startups to global enterprises, with tailored cybersecurity and compliance solutions. Our expertise in navigating evolving threats and regulations

3.9(2)
American Binary

American Binary

United States flag

Data Loss Prevention

American Binary is a Quantum Safe Networking (TM) and post-quantum encryption company made up of multi-disciplinary technologists, engineers, and security professionals, with expertise in privacy, com

3.9(2)
Qmulos Q-Splunk Services

Qmulos Q-Splunk Services

language

Managed Security Service Providers

Qmulos Q-Splunk Services on SecurityListing: Splunk consulting services for deployment optimization and configuration

3.9(2)
Zeguro

Zeguro

United States flag

Penetration Testing

Zeguro provides complete cybersecurity risk assessment, mitigation and insurance, allowing you to easily manage your cyber risk. Zeguro gives you the tools and training to manage and monitor security

3.9(2)
ORNA Digital Incident Response Plan

ORNA Digital Incident

language

Risk Assessment

ORNA Digital Incident Response Plan on SecurityListing: Digital incident response plan built on SANS 504-B framework

3.9(2)
Abacode

Abacode

United States flag

Governance Risk and Compliance Platforms

Abacode is a Managed Security Services Provider (MSSP). We help businesses consolidate all of their Regulatory Compliance & Cybersecurity needs, under one roof. Abacode is fundamentally different tha

3.9(2)
Gray Swan

Gray Swan

United States flag

Security Operations

Gray Swan is the safety and security provider for the AI era, founded by world leading experts in the AI safety and security space. When your AI fails, your reputation, compliance, and bottom line ar

3.9(2)
Hassans International Law Firm

Hassans International Law

United Kingdom flag

Security Operations

The largest law firm in Gibraltar, Hassans offers a huge selection of legal services to clients based both locally and around the globe. Able to offer legal advice and expertise to clients across corp

3.9(2)
Phriendly Phishing Human (Centred) Risk Management

Phriendly Phishing Human

language

Risk Assessment

Phriendly Phishing Human (Centred) Risk Management on SecurityListing: Human risk mgmt platform with phishing simulation & security awareness training

3.9(2)
Arxan Technologies

Arxan Technologies

United States flag

Industrial Control System Security

Arxan is the trusted global leader of application attack-prevention and self-protection products for Internet of Things (IoT), Mobile, Desktop, and other applications. We help protect our customers a

3.8(1)
EmpowerID Identity Management

EmpowerID Identity Management

language

Privileged Access Management

EmpowerID Identity Management on SecurityListing: Identity management platform for access governance and Zero Trust security

3.8(1)
Abstract Security

Abstract Security

United States flag

Security Operations

Abstract Security has created a revolutionary platform, equipped with an AI-powered assistant, to better centralize the management of security analytics. Abstract transcends next-gen SIEM solutions b

3.8(1)
cyberconIQ CybermetryQS Cyber Risk Dashboard

cyberconIQ CybermetryQS Cyber

language

Risk Assessment

cyberconIQ CybermetryQS Cyber Risk Dashboard on SecurityListing: NIST 2.0-based cyber risk assessment dashboard with maturity scoring

3.8(1)
Compliance Scorecard – Governance as a Service

Compliance Scorecard –

language

Risk Assessment

Compliance Scorecard – Governance as a Service on SecurityListing: A GaaS platform that simplifies and streamlines compliance processes for MSPs, ensuring their policies are properly aligned, authorized, adopted, and assessed.

3.8(1)
AdEPT Technology Group

AdEPT Technology Group

United Kingdom flag

Threat Intelligence Platforms

AdEPT are a managed services and telecommunications provider offering award-winning, proven and uncomplicated technical solutions for over 12,000 organisations across the UK. We specialise in convergi

3.8(1)
3B Data Security

3B Data Security

United Kingdom flag

Compliance Consulting

3B Data Security offer a range of Penetration Testing, Digital Forensics, Incident Response and Data Breach Management Services. Services we offer include proactive preventative security consulting,

3.8(1)
Intech Security

Intech Security

United Kingdom flag

Governance Risk and Compliance Platforms

Intech Security is a UK-based cybersecurity and IT solutions provider committed to protecting businesses, law firms, and charities from evolving digital threats. Specializing in Cyber Essentials and C

3.8(1)
ZeroNorth

ZeroNorth

United States flag

Governance Risk and Compliance Platforms

ZeroNorth provides a new approach to improve software and infrastructure security, simplify continuous compliance reporting and to create more cost-effective risk management programs. Our “mission-co

3.8(1)
Gidisync Solutions

Gidisync Solutions

United Kingdom flag

Cloud Security

From cloud security and incident response to strategic leadership and compliance, our comprehensive suite of cybersecurity services protects your business at every level.

3.8(1)
Casepoint

Casepoint

United States flag

Security Operations

Casepoint is the legal technology platform of choice for corporations, government agencies, and law firms to meet their complex eDiscovery, investigations, and compliance needs. Powered by cutting-ed

3.8(1)
BAAR Privileged Access Management

BAAR Privileged Access

language

Password Management

BAAR Privileged Access Management on SecurityListing: PAM solution for controlling, monitoring, and securing privileged accounts

3.8(1)
Baker Donelson

Baker Donelson

United States flag

Security Operations

Baker Donelson is a law firm with a team of more than 700 attorneys and advisors representing more than 30 practice areas including Data Protection, Privacy and Cybersecurity. Baker Donelson's Data P

3.8(1)
Allen & Overy

Allen & Overy

United Kingdom flag

Security Operations

Allen & Overy is an international law firm. Practice areas include Cybersecurity and Data Protection. Clients turn to us to manage legal risk in relation to the threat of cyber-attacks as well as whe

3.8(1)
International Accreditation Forum (IAF)

International Accreditation Forum

Canada flag

Security Operations

The IAF is the world association of Conformity Assessment Accreditation Bodies. Its primary function is to develop a single worldwide programme of conformity assessment which reduces risk for business

3.8(1)
CyberOwl

CyberOwl

United Kingdom flag

Compliance Consulting

CyberOwl builds on cutting-edge research and combines decades of experience in developing, securing and operating large distributed systems. We are on a mission to leverage data and analytics to shift

3.8(1)
OWASP API Security Top 10

OWASP API Security

language

API Security

OWASP API Security Top 10 on SecurityListing: A community website for API security news, vulnerabilities, and best practices

3.8(1)
BriskInfosec Technology & Consulting

BriskInfosec Technology &

India flag

Compliance Consulting

BriskInfosec provides information security services, products and compliance solutions to our customers. Our associates are our strength - with commitment and deep domain expertise, we offer competiti

3.8(1)
Zluri

Zluri

United States flag

Security Operations

Zluri is a cloud-native SaaSOps platform enabling modern enterprises with SaaS Management and Identity Governance. Zluri empowers IT and Security teams to gain visibility into their SaaS landscape, u

3.8(1)
DLA Piper

DLA Piper

United Kingdom flag

Security Operations

DLA Piper is a global law firm with more than 4,200 lawyers located throughout the Americas, Asia Pacific, Europe and the Middle East. Practice areas include Cybersecurity. In today's interconnected

3.8(1)
Verint Systems

Verint Systems

United States flag

Security Operations

Verint is a leader in CX automation. The world’s most iconic brands rely on our open platform and team of AI-powered bots to create tangible AI business outcomes, now. Fraud & Security SolutionsWe ar

3.8(1)
Bastille-Linux

Bastille-Linux

language

Offensive Security

Bastille-Linux on SecurityListing: Bastille-Linux is a system hardening program that proactively configures the system for increased security and educates users about security settings.

3.8(1)
CRI Group

CRI Group

United Kingdom flag

Governance Risk and Compliance Platforms

CRI Group excels at deterring, detecting and investigating crimes against businesses. We achieve success using a global network of professionals specially trained in Anti-Corruption, Risk Management a

3.8(1)
BlackSwan Technologies

BlackSwan Technologies

United Kingdom flag

Governance Risk and Compliance Platforms

BlackSwan Technologies is reinventing enterprise software through Agile Intelligence for the Enterprise – a fusion of data, artificial intelligence, and cloud technologies. Cyber Underwriting and Thr

3.8(1)
CredShields

CredShields

Singapore flag

Security Operations

CredShields secure smart contracts, protocols, and enterprise applications with AI-powered audits and global compliance standards. At CredShields, we don’t just react to hacks, we predict and prevent

3.8(1)
DestructData

DestructData

United States flag

Security Operations

DestructData is a leading independent provider of End of Life data destruction/security solutions. As a pioneer in this challenging  field, we have worked with the industry’s leading vendors, data re

3.8(1)
ActiveNav

ActiveNav

United States flag

Governance Risk and Compliance Platforms

ActiveNav provide dark data discovery solutions for compliance and information governance. Our cloud platform deploys fast and builds a comprehensive data inventory, presented in dashboards that are

3.8(1)
Armolon

Armolon

United States flag

Backup as a Service

Armolon provides comprehensive data breach and cybersecurity, as well cybersecurity audits and certifications, and disaster recovery/business continuity services to clients. At Armolon, our goal is t

3.8(1)
Herbert Smith Freehills

Herbert Smith Freehills

United Kingdom flag

Security Operations

Herbert Smith Freehills is a leading professional services business offering legal services in specialist areas including data protection and privacy. Our data protection and privacy practice is comp

3.8(1)
Aurva

Aurva

United States flag

Data Loss Prevention

Aurva are a team of engineers, product thinkers, and security minds who believe that data security should be simple, powerful, and built for speed. Securing data in modern cloud environments is no lo

3.8(1)
Breadcrumb Cybersecurity

Breadcrumb Cybersecurity

United States flag

Compliance Consulting

Breadcrumb Cybersecurity is a cybersecurity and advisory firm. We specialize in penetration testing, threat hunting, incident response, regulatory compliance, and employee training services. Our miss

3.8(1)
Axoflow

Axoflow

United States flag

Security Operations

Axoflow helps organizations to consolidate their existing solutions for logs, metrics, and traces, and evolve them into a cloud native observability infrastructure to solve challenges in the areas of

3.8(1)
Industrial Defender

Industrial Defender

United States flag

Industrial Control System Security

Committed to ICS Cybersecurity. Industrial Defender provides a fully automated solution to discover, track and report on assets across your ICS footprint. Industrial Defender ASM collects both config

3.8(1)
Acuant

Acuant

United States flag

Governance Risk and Compliance Platforms

Acuant is a leading global provider of identity verification, regulatory compliance (AML/KYC) and digital identity solutions. The Trusted Identity Platform is powered by AI and human assisted machine

3.8(1)
Auriga

Auriga

United Kingdom flag

Industrial Control System Security

Auriga create innovative software and have become a benchmark for high quality banking software including cyber security solutions to protect business critical devices. Critical devices provide essen

3.8(1)
Aurascape AI

Aurascape AI

United States flag

Security Operations

Aurascape is working on advanced cybersecurity solutions powered by grounds-up generative AI architecture. We have assembled one of the world’s best teams combining Security, Generative AI, and SaaS

3.8(1)
ADL Consulting

ADL Consulting

United Kingdom flag

Compliance Consulting

ADL Consulting provide information security-related consultancy and training support to businesses across the UK. ADL Consulting help medium-sized businesses to develop a pragmatic and efficient stra

3.8(1)
Bedrock Security

Bedrock Security

United States flag

Data Loss Prevention

Bedrock Security is at the forefront of revolutionizing data security in the cloud and GenAI era. We are driven by the imperative belief that data is the lifeblood of organizational growth. In this d

3.8(1)
Avanan

Avanan

United States flag

Cloud Security

Avanan is The Cloud Security Platform. Protect all your SaaS applications using tools from over 60 industry-leading vendors in just one click. We 'cloudify' over 60 best-of-breed security solutions a

3.8(1)
CleanCloud by SEK

CleanCloud by SEK

Brazil flag

Cloud Security

CleanCloud by SEK is a CSPM product focused on public cloud data protection and security regulations, with over 400 compliance checks for the market's leading frameworks and regulations, including ISO

3.8(1)
Axiler

Axiler

Singapore flag

Cloud Security

Axiler is a visionary cybersecurity company, where innovation meets resilience. Through the elegance of AI-driven self-healing architecture, we seamlessly detect, patch, and neutralize threats in real

3.8(1)
Zeus Cloud

Zeus Cloud

United Kingdom flag

Cloud Security

Zeus Cloud provide clients with world-class web hosting services to businesses both big and small. Take advantage of highly available, scalable and secure cloud infrastructure with Zeus Cloud's ZC2™

3.8(1)
Cyberscope

Cyberscope

GR flag

Security Operations

Cyberscope is a Web3 security firm specializing in smart contract audits, crypto security audits, and blockchain vulnerability assessments. Our team of cyber security engineers and compliance experts

3.8(1)
International Data Sanitization Consortium (IDSC)

International Data Sanitization

UN flag

Security Operations

International Data Sanitization Consortium is a group composed of individuals and companies dedicated to standardizing terminology and practices across the data sanitization industry. Our purposes is

3.8(1)
B&L PC Solutions

B&L PC Solutions

United States flag

Backup as a Service

B&L PC Solutions is a trusted managed IT services provider on Long Island, NY, and St. Petersburg, FL. Since 1997, We have delivered expert IT support to all sized businesses, offering services like c

3.8(1)
AccessIT Group

AccessIT Group

United States flag

Cloud Security

AccessIT Group is a specialized cybersecurity solutions provider offering a full range of advanced security services that assist organizations with the design, implementation and operation of their se

3.8(1)
ZDL Group

ZDL Group

United Kingdom flag

Compliance Consulting

At ZDL (fromerly ZeroDayLab) we believe that effective risk management requires a holistic 360° approach. We take a comprehensive view of our clients cyber security risks and provide quality services

3.8(1)
AccuKnox

AccuKnox

United States flag

Cloud Security

Your cloud-native journey shouldn’t feel like a race against relentless cyber attacks. The fear of breaches, compliance failures, and unmanageable alerts can keep any security team up at night. AccuK

3.8(1)
odix TrueCDR™ Kiosk

odix TrueCDR™ Kiosk

language

Endpoint Protection Platform

odix TrueCDR™ Kiosk on SecurityListing: Secure kiosk for sanitizing USB & uploaded files using CDR technology

3.8(1)
Privacera

Privacera

United States flag

Governance Risk and Compliance Platforms

Privacera enables consistent data governance, security, and compliance across all your data services - on-premises and in the cloud - so you can maximize the value of your data. As a member of the IT

3.8(1)
Boston Government Services (BGS)

Boston Government Services

United States flag

Compliance Consulting

Boston Government Services (BGS) is an engineering, technology, and security firm providing mission-focused solutions for the clean energy, nuclear, and federal programs markets. Our unique capabiliti

3.8(1)
Huawei SecoManager Security Controller

Huawei SecoManager Security

language

Security Orchestration Automation and Response

Huawei SecoManager Security Controller on SecurityListing: Security controller for policy mgmt, orchestration & log management

3.8(1)
Lumifi Endpoint Detection & Response (EDR/XDR)

Lumifi Endpoint Detection

language

Endpoint Detection and Response

Lumifi Endpoint Detection & Response (EDR/XDR) on SecurityListing: Managed EDR/XDR service with 24/7 SOC monitoring and threat response

3.8(1)
LogRhythm Axon

LogRhythm Axon

language

Security Information and Event Management

LogRhythm Axon on SecurityListing: A cloud-native SIEM platform that provides security analytics, intuitive workflow, and simplified incident response to help security teams defend against cyber threats.

3.8(1)
Beta Systems Software

Beta Systems Software

Germany flag

Governance Risk and Compliance Platforms

Beta Systems automate IT-based business processes, control access rights across all platforms securely and reliably, monitor processes, secure the network and optimize the infrastructure management of

3.8(1)
Awantec

Awantec

MY flag

Compliance Consulting

Awantec is a prominent provider of Information and Communication Technology services in Malaysia. Our mission is to advance and accelerate the adoption of digitalization throughout Malaysia, driving p

3.8(1)
Lockdown Enterprise

Lockdown Enterprise

language

Compliance Management

Lockdown Enterprise on SecurityListing: Lockdown Enterprise is a subscription service for Ansible Lockdown to automate security benchmark compliance.

3.8(1)
Concentric AI Data Security Governance Platform

Concentric AI Data

language

Data Classification

Concentric AI Data Security Governance Platform on SecurityListing: Data security governance platform for data at rest, in motion, and GenAI apps

3.8(1)
CyberIAM Identity and Access Management

CyberIAM Identity and

language

Privileged Access Management

CyberIAM Identity and Access Management on SecurityListing: IAM and PAM consulting services and managed identity services platform

3.8(1)
Fortrex Technologies VendorPoint

Fortrex Technologies VendorPoint

language

Risk Assessment

Fortrex Technologies VendorPoint on SecurityListing: Software platform for managing third-party vendor risk and compliance

3.8(1)
Censinet Healthcare Cybersecurity Benchmarking Study

Censinet Healthcare Cybersecurity

language

Risk Assessment

Censinet Healthcare Cybersecurity Benchmarking Study on SecurityListing: Healthcare cybersecurity benchmarking study and peer comparison platform

3.8(1)
ALTR Data Security Platform

ALTR Data Security

language

Data Classification

ALTR Data Security Platform on SecurityListing: Unified data security platform for cloud data access control and governance

3.8(1)
Fortrex Technologies VendSure

Fortrex Technologies VendSure

language

Risk Assessment

Fortrex Technologies VendSure on SecurityListing: Enhanced due diligence service for third-party vendor risk assessment

3.8(1)
iC Consult IAM Consulting

iC Consult IAM

language

Privileged Access Management

iC Consult IAM Consulting on SecurityListing: IAM consulting services for strategy, assessment, roadmap, and implementation

3.8(1)
ERM Protect SOC Compliance Services

ERM Protect SOC

language

Compliance Consulting

ERM Protect SOC Compliance Services on SecurityListing: SOC compliance consulting and audit services for organizations

3.8(1)
Opscompass Compliance

Opscompass Compliance

language

Risk Assessment

Opscompass Compliance on SecurityListing: Compliance monitoring platform for hybrid and multi-cloud environments

3.8(1)
CrashPlan

CrashPlan

United States flag

Backup as a Service

CrashPlan delivers secure, continuous endpoint backup and recovery for businesses of all sizes. Our solution ensures data resilience by protecting critical files from ransomware, accidental deletion,

3.8(1)
aiComply

aiComply

Italy flag

Governance Risk and Compliance Platforms

NavigateCyber, by aiComply, is the first NIST-Based Risk Management Framework Platform specifically designed to tackle NIST’s Cybersecurity Compliance Frameworks leveraging state-of-the-art technology

3.8(1)
Secureframe Comply

Secureframe Comply

language

Third-Party Risk Management

Secureframe Comply on SecurityListing: Compliance automation platform with AI-powered capabilities and monitoring

3.8(1)
Gradient Cyber Quorum™

Gradient Cyber Quorum™

language

Threat Intelligence Platforms

Gradient Cyber Quorum™ on SecurityListing: Unified threat detection platform for network, endpoint, cloud, and user telemetry

3.8(1)
Cenobe Cyber Security

Cenobe Cyber Security

GR flag

Governance Risk and Compliance Platforms

Cenobe provides customized solutions to keep you ahead of potential threats. Our suite of services, including penetration testing, vulnerability assessment, compliance audit, and red teaming, ensures

SecuPi Proactive Data Security Platform

SecuPi Proactive Data

language

Data Classification

SecuPi Proactive Data Security Platform on SecurityListing: Data security platform for real-time protection of sensitive data access

Votiro Active Data Masking

Votiro Active Data

language

Data Masking

Votiro Active Data Masking on SecurityListing: Real-time data masking for PII, PHI, and PCI to enable GenAI adoption & compliance

Resilience The Edge Solution

Resilience The Edge

language

Risk Assessment

Resilience The Edge Solution on SecurityListing: Cyber risk mgmt platform quantifying risk in financial terms using real loss data

Safetica Data Loss Prevention

Safetica Data Loss

language

Data Classification

Safetica Data Loss Prevention on SecurityListing: DLP and insider risk management solution for data discovery and protection

Supply Wisdom Continuous Monitoring

Supply Wisdom Continuous

language

Risk Assessment

Supply Wisdom Continuous Monitoring on SecurityListing: Continuous monitoring platform for third-party supplier and location risks

RoboShadow OWASP ZAP Vulnerability Scanner

RoboShadow OWASP ZAP

language

Vulnerability Assessment

RoboShadow OWASP ZAP Vulnerability Scanner on SecurityListing: Web app & network vulnerability scanner integrating OWASP ZAP, Shodan & Nmap

Soveren Data Security Platform (DSP)

Soveren Data Security

language

Data Classification

Soveren Data Security Platform (DSP) on SecurityListing: Real-time data observability platform combining DSPM, DDR, and DAG capabilities

Supply Wisdom Real-time Alerts

Supply Wisdom Real-time

language

Risk Assessment

Supply Wisdom Real-time Alerts on SecurityListing: Real-time alert system for monitoring third-party vendor risks and events

Thomas Murray Orbit Risk

Thomas Murray Orbit

language

Risk Assessment

Thomas Murray Orbit Risk on SecurityListing: Third-party risk mgmt platform for monitoring operational & cyber risks

Verity

Verity

language

Compliance Management

Verity on SecurityListing: Verity is a comprehensive compliance management tool that helps organizations manage their governance, risk, and compliance initiatives.

Risk Cognizance Multi-Tenant GRC Platform

Risk Cognizance Multi-Tenant

language

Third-Party Risk Management

Risk Cognizance Multi-Tenant GRC Platform on SecurityListing: Multi-tenant white-label GRC platform for MSSPs and organizations

Tenchi Zanshin

Tenchi Zanshin

language

Risk Assessment

Tenchi Zanshin on SecurityListing: Third-party cyber risk mgmt platform with continuous monitoring & remediation

Uptycs Data Security Posture Management

Uptycs Data Security

language

Data Classification

Uptycs Data Security Posture Management on SecurityListing: DSPM solution for discovering & classifying sensitive data in cloud workloads

Stealth-ISS Cybersecurity Readiness Assessment

Stealth-ISS Cybersecurity Readiness

language

Risk Assessment

Stealth-ISS Cybersecurity Readiness Assessment on SecurityListing: Cybersecurity readiness assessment service evaluating security posture

BLINDSPOT

BLINDSPOT

language

Risk Assessment

BLINDSPOT on SecurityListing: Risk intelligence platform for supply chain cyber risk assessment & monitoring

Venn Blue Border

Venn Blue Border

language

Data Loss Prevention

Venn Blue Border on SecurityListing: Secure workspace for BYOD/unmanaged devices without VDI or device takeover

Censinet One™

Censinet One™

language

Risk Assessment

Censinet One™ on SecurityListing: On-demand cyber risk mgmt platform for healthcare third-party & enterprise risk

Galia IT Dedicated SOC

Galia IT Dedicated

language

Threat Intelligence Platforms

Galia IT Dedicated SOC on SecurityListing: Managed SOC service with dedicated security teams for IT and OT environments

CYE Hyver Cybersecurity Maturity

CYE Hyver Cybersecurity

language

Risk Assessment

CYE Hyver Cybersecurity Maturity on SecurityListing: Cybersecurity maturity assessment platform with risk quantification capabilities

Zivver Secure Email Gateway

Zivver Secure Email

language

Data Loss Prevention

Zivver Secure Email Gateway on SecurityListing: Secure email gateway with automated DLP and zero-knowledge encryption

Elite Blue Team Managed EDR

Elite Blue Team

language

Endpoint Detection and Response

Elite Blue Team Managed EDR on SecurityListing: Managed EDR service with behavioral analytics and SIEM telemetry

Fortrex Cybersecurity

Fortrex Cybersecurity

language

Penetration Testing

Fortrex Cybersecurity on SecurityListing: Cybersecurity services provider offering TPRM, VAPT, and security audits

Fortrex VendManage

Fortrex VendManage

language

Risk Assessment

Fortrex VendManage on SecurityListing: End-to-end TPRM solution with vendor risk analysis and documentation mgmt.

ControlCase CMMC

ControlCase CMMC

language

Risk Assessment

ControlCase CMMC on SecurityListing: CMMC compliance consulting for federal contractors and CUI protection

Penta Security D.AMO Key Management System (KMS)

Penta Security D.AMO

language

Database Security

Penta Security D.AMO Key Management System (KMS) on SecurityListing: Enterprise key management system for encryption key lifecycle management

Quorum Cyber Clarity Data

Quorum Cyber Clarity

language

Data Loss Prevention

Quorum Cyber Clarity Data on SecurityListing: Managed data security service with DLP and insider risk management

Somansa Privacy-i

Somansa Privacy-i

language

Data Classification

Somansa Privacy-i on SecurityListing: Enterprise DLP solution for endpoint, network, and print data leakage prevention

MaxxMDR MDR + NDR

MaxxMDR MDR +

language

Threat Hunting

MaxxMDR MDR + NDR on SecurityListing: Managed detection & response with network detection & response capabilities

READI Connector Studio

READI Connector Studio

language

Identity Governance and Administration

READI Connector Studio on SecurityListing: Low-code platform for building custom identity connectors for IGA systems

Ridge IT The One Platform

Ridge IT The

language

Security Awareness Training

Ridge IT The One Platform on SecurityListing: Managed cybersecurity platform with IT services, zero trust, and compliance

SCANOSS Geo Provenance Dataset

SCANOSS Geo Provenance

language

Risk Assessment

SCANOSS Geo Provenance Dataset on SecurityListing: Identifies geographic origin and authorship of open source code components

Risk Cognizance Customizable Policies and Controls

Risk Cognizance Customizable

language

Policy Management

Risk Cognizance Customizable Policies and Controls on SecurityListing: Platform for creating and managing customizable compliance policies and controls

SaltWorks SaltMiner Community

SaltWorks SaltMiner Community

language

Penetration Testing

SaltWorks SaltMiner Community on SecurityListing: Pen test management and reporting platform for manual assessments

SaltWorks SaltMiner

SaltWorks SaltMiner

language

Application Security Posture Management

SaltWorks SaltMiner on SecurityListing: AppSec posture mgmt platform for aggregating & reporting app security data

Securden Privileged Access Management

Securden Privileged Access

language

Password Management

Securden Privileged Access Management on SecurityListing: PAM platform for managing privileged accounts, sessions, and access control

Standss EmailMerge COM Add-in

Standss EmailMerge COM

language

Data Classification

Standss EmailMerge COM Add-in on SecurityListing: Outlook add-in for sending personalized bulk emails via mail merge

SAFE Contract Intelligence AI Agent

SAFE Contract Intelligence

language

Risk Assessment

SAFE Contract Intelligence AI Agent on SecurityListing: AI agent that automates contract review and risk analysis for TPRM

SAFE Intake Form AI Agent

SAFE Intake Form

language

Third-Party Risk Management

SAFE Intake Form AI Agent on SecurityListing: AI agent that automates vendor intake form parsing for TPRM onboarding

Sumo Logic Logs for Security

Sumo Logic Logs

language

Security Information and Event Management

Sumo Logic Logs for Security on SecurityListing: Cloud-based log analytics platform for security monitoring and threat detection

SAFE Public Records AI Agent

SAFE Public Records

language

Risk Assessment

SAFE Public Records AI Agent on SecurityListing: AI agent that collects and analyzes public records for vendor risk assessment

SAFE Smart Tiering AI Agent

SAFE Smart Tiering

language

Risk Assessment

SAFE Smart Tiering AI Agent on SecurityListing: AI agent that auto-classifies and updates vendor tiers in real-time for TPRM

SAFE Vendor Interaction AI Agent

SAFE Vendor Interaction

language

Risk Assessment

SAFE Vendor Interaction AI Agent on SecurityListing: AI agent that automates vendor interaction for TPRM processes

Risk Cognizance Supply Chain Cyber Risk Management Platform

Risk Cognizance Supply

language

Risk Assessment

Risk Cognizance Supply Chain Cyber Risk Management Platform on SecurityListing: Supply chain cyber risk mgmt platform with AI vendor detection & monitoring

SaltyCloud Isora Lite

SaltyCloud Isora Lite

language

Risk Assessment

SaltyCloud Isora Lite on SecurityListing: Free TPSRM platform for EDU using HECVAT questionnaires to assess vendors

Thomas Murray Orbit Security

Thomas Murray Orbit

language

Risk Assessment

Thomas Murray Orbit Security on SecurityListing: Platform for enterprise & third-party cyber risk mgmt with security ratings

ThreatConnect Risk Quantifier

ThreatConnect Risk Quantifier

language

Risk Assessment

ThreatConnect Risk Quantifier on SecurityListing: Cyber risk quantification platform translating security controls into financial risk

SAP GRC

SAP GRC

language

Governance Risk and Compliance Platforms

SAP GRC on SecurityListing: SAP GRC and cybersecurity solutions provide integrated capabilities for managing enterprise risk, compliance, international trade, cybersecurity, and identity and access governance, leveraging predictive analytics, real-time monitoring, and automation.

SAFE Monitoring AI Agent

SAFE Monitoring AI

language

Risk Assessment

SAFE Monitoring AI Agent on SecurityListing: AI agent for continuous third-party risk monitoring and assessment

Certes DPRM

Certes DPRM

language

Data Security Posture Management

Certes DPRM on SecurityListing: Quantum-safe data protection platform securing data in transit with encryption

SAI360 Services

SAI360 Services

language

Managed Security Service Providers

SAI360 Services on SecurityListing: Professional services for GRC software implementation and support

SCANOSS Encryption Dataset

SCANOSS Encryption Dataset

language

Risk Assessment

SCANOSS Encryption Dataset on SecurityListing: Identifies cryptographic algorithms and libraries in code for compliance

SecurEnvoy Data Discovery Platform

SecurEnvoy Data Discovery

language

Data Classification

SecurEnvoy Data Discovery Platform on SecurityListing: Automated data discovery & classification for sensitive data across on-prem & cloud

Seemplicity RemOps

Seemplicity RemOps

language

Exposure Management

Seemplicity RemOps on SecurityListing: Remediation operations platform for vulnerability and exposure management

Sentra Accurate Data Discovery & Classification

Sentra Accurate Data

language

Data Classification

Sentra Accurate Data Discovery & Classification on SecurityListing: AI-based data discovery & classification platform for cloud environments

MX Layer Email Compliance

MX Layer Email

language

Data Loss Prevention

MX Layer Email Compliance on SecurityListing: Email compliance and archiving solution with DLP and threat protection

Sprinto AI GRC

Sprinto AI GRC

language

Third-Party Risk Management

Sprinto AI GRC on SecurityListing: AI-native GRC platform for compliance, audit, vendor risk, and risk management

Stealth ISS SOC-as-a-Service

Stealth ISS SOC-as-a-Service

language

Endpoint Detection and Response

Stealth ISS SOC-as-a-Service on SecurityListing: 24/7 managed SOC service with monitoring, protection, and incident response

Sumo Logic Cloud SIEM

Sumo Logic Cloud

language

Threat Hunting

Sumo Logic Cloud SIEM on SecurityListing: Cloud-native SIEM for real-time threat detection and investigation

Supply Wisdom Comprehensive Intelligence

Supply Wisdom Comprehensive

language

Risk Assessment

Supply Wisdom Comprehensive Intelligence on SecurityListing: Third-party risk intelligence platform with real-time alerts and reports

Tumeryk AI Trust Infrastructure

Tumeryk AI Trust

language

Data Loss Prevention

Tumeryk AI Trust Infrastructure on SecurityListing: AI trust infrastructure platform for securing GenAI apps & workforce usage

SecurEnds Unified Identity Platform

SecurEnds Unified Identity

language

Privileged Access Management

SecurEnds Unified Identity Platform on SecurityListing: Unified identity platform for IGA, PAM, compliance, and access governance

Panorays

Panorays

language

Third-Party Risk Management

Panorays on SecurityListing: Panorays is a third-party cyber risk management platform that combines external attack surface monitoring with automated security questionnaires to assess, remediate, and continuously monitor vendor security postures.

Innvikta InSAT LMS

Innvikta InSAT LMS

language

Security Awareness Training

Innvikta InSAT LMS on SecurityListing: Cloud-based LMS for security awareness training with SCORM compliance

Safe Security Autonomous TPRM

Safe Security Autonomous

language

Risk Assessment

Safe Security Autonomous TPRM on SecurityListing: AI-powered TPRM platform for automated vendor risk assessment and monitoring

Runecast DORA Compliance Automation

Runecast DORA Compliance

language

Compliance Management

Runecast DORA Compliance Automation on SecurityListing: Compliance automation & vulnerability mgmt for VMware, cloud, Windows & Linux

Software Improvement Group Sigrid®

Software Improvement Group

language

Static Application Security Testing

Software Improvement Group Sigrid® on SecurityListing: Software portfolio governance platform for code quality and security analysis

ServiceNow Security Operations

ServiceNow Security Operations

language

Threat Intelligence Platforms

ServiceNow Security Operations on SecurityListing: Platform for automating threat and vulnerability mgmt with incident response

Todyl Unified Platform

Todyl Unified Platform

language

Managed Detection and Response

Todyl Unified Platform on SecurityListing: Unified cybersecurity platform for MSPs with SASE, EDR, SIEM, MXDR, and GRC

Liquid C2 Cyber Risk Assurance

Liquid C2 Cyber

language

Risk Assessment

Liquid C2 Cyber Risk Assurance on SecurityListing: Cyber risk assessment and assurance services for organizations

ORNA End-to-End AI Cyber Incident Response Platform

ORNA End-to-End AI

language

Threat Intelligence Platforms

ORNA End-to-End AI Cyber Incident Response Platform on SecurityListing: AI-powered cyber incident response platform for training, orchestration & mgmt

RiskXchange Attack Surface Management

RiskXchange Attack Surface

language

Risk Assessment

RiskXchange Attack Surface Management on SecurityListing: Attack surface management platform for monitoring vulnerabilities and breaches

Risk Cognizance Integrated Connected GRC Software

Risk Cognizance Integrated

language

Governance Risk and Compliance Platforms

Risk Cognizance Integrated Connected GRC Software on SecurityListing: Integrated GRC platform connecting governance, risk, and compliance functions

Protiviti Artificial Intelligence

Protiviti Artificial Intelligence

language

Risk Assessment

Protiviti Artificial Intelligence on SecurityListing: Global business consulting firm offering AI and risk management services

syslog-ng

syslog-ng

language

Security Information and Event Management

syslog-ng on SecurityListing: A log management solution that optimizes SIEM performance, provides rapid search and troubleshooting, and meets compliance requirements.

Risk Cognizance Third Party Risk Management

Risk Cognizance Third

language

Risk Assessment

Risk Cognizance Third Party Risk Management on SecurityListing: Platform for managing vendor risks across the entire third-party lifecycle

Safe Security Autonomous CTEM

Safe Security Autonomous

language

Exposure Management

Safe Security Autonomous CTEM on SecurityListing: Autonomous CTEM platform for managing exposure risk with AI agents

Tenchisecurity Zanshin

Tenchisecurity Zanshin

language

Risk Assessment

Tenchisecurity Zanshin on SecurityListing: Third-party security posture management platform for continuous vendor risk mgmt

Sardine Platform

Sardine Platform

language

Governance Risk and Compliance Platforms

Sardine Platform on SecurityListing: Fraud prevention and AML compliance platform with device intelligence and ML

Satori

Satori

language

Data Security Posture Management

Satori on SecurityListing: A data security platform that provides automated sensitive data discovery, access control, monitoring, and compliance capabilities for organizations managing data across multiple storage platforms.

SAFE Balbix

SAFE Balbix

language

Exposure Management

SAFE Balbix on SecurityListing: AI-native platform for cyber risk quantification, exposure & vendor mgmt.

Seceon OTM Platform

Seceon OTM Platform

language

Extended Detection and Response

Seceon OTM Platform on SecurityListing: All-in-one platform combining SIEM, XDR, SOAR with AI/ML threat detection

SecuPi Proactive DAM

SecuPi Proactive DAM

language

Database Security

SecuPi Proactive DAM on SecurityListing: Database activity monitoring solution for cloud and on-premises databases

Securiti

Securiti

language

Data Security Posture Management

Securiti on SecurityListing: A data security and AI governance platform that provides unified control and management of data assets across hybrid cloud environments with focus on AI security and compliance.

Security Mentor Security Awareness Training

Security Mentor Security

language

Security Awareness Training

Security Mentor Security Awareness Training on SecurityListing: Security awareness training platform with phishing simulation and policy tracking

ServiceNow Governance Risk and Compliance (GRC)

ServiceNow Governance Risk

language

Governance Risk and Compliance Platforms

ServiceNow Governance Risk and Compliance (GRC) on SecurityListing: ServiceNow Governance, Risk, and Compliance (GRC) is an integrated suite of products that enables organizations to build operational resilience, mitigate risks, and ensure compliance across the enterprise through a unified platform, data model, AI-powered insights, and automated workflows.

Simbian AI Security Operations

Simbian AI Security

language

Penetration Testing

Simbian AI Security Operations on SecurityListing: AI-powered security operations platform for autonomous alert triage & response

Risk Cognizance GRC Risk Management Software

Risk Cognizance GRC

language

Risk Assessment

Risk Cognizance GRC Risk Management Software on SecurityListing: GRC platform for risk management, compliance tracking, and risk register

Stealth-ISS Cybersecurity Risk Assessment

Stealth-ISS Cybersecurity Risk

language

Risk Assessment

Stealth-ISS Cybersecurity Risk Assessment on SecurityListing: Cybersecurity risk assessment service for breach prevention & insurance reqs

SP 800-82, Guide to Industrial Control Systems (ICS) Security

SP 800-82, Guide

language

Guides

SP 800-82, Guide to Industrial Control Systems (ICS) Security on SecurityListing: A comprehensive guide to securing Industrial Control Systems (ICS) from cyber threats, published by NIST.

StrikeOne Cybersecurity Posture Tool (CPT)

StrikeOne Cybersecurity Posture

language

Risk Assessment

StrikeOne Cybersecurity Posture Tool (CPT) on SecurityListing: Compliance assessment tool for CIS, ISO 27001/27002, and NIST CSF frameworks

TCS Cybersecurity

TCS Cybersecurity

language

Managed Security Service Providers

TCS Cybersecurity on SecurityListing: Enterprise cybersecurity services from TCS consulting firm

Thomas Murray Orbit Diligence

Thomas Murray Orbit

language

Risk Assessment

Thomas Murray Orbit Diligence on SecurityListing: Platform for managing third-party due diligence and vendor risk assessments

SimSpace Cyber Range

SimSpace Cyber Range

language

Cyber Range Training

SimSpace Cyber Range on SecurityListing: Cyber range platform for training, testing, and validating security readiness

Wald AI

Wald AI

language

Data Loss Prevention

Wald AI on SecurityListing: DLP platform securing sensitive data in AI assistants via sanitization & E2EE

Standss SendGuard for Outlook

Standss SendGuard for

language

Data Loss Prevention

Standss SendGuard for Outlook on SecurityListing: Outlook add-in for email DLP, compliance, and accidental send prevention

Tumerik AI Trust Score™

Tumerik AI Trust

language

Risk Assessment

Tumerik AI Trust Score™ on SecurityListing: Real-time AI application security with trust scoring and guardrails

archTIS Spirion

archTIS Spirion

language

Data Classification

archTIS Spirion on SecurityListing: Sensitive data discovery, classification, and remediation platform

SAFE Communication AI Agent

SAFE Communication AI

language

Risk Assessment

SAFE Communication AI Agent on SecurityListing: AI agent that automates vendor communication for TPRM questionnaires

BigID Data Security Platform

BigID Data Security

language

Data Loss Prevention

BigID Data Security Platform on SecurityListing: Enterprise data security platform with DSPM, DLP, privacy, and AI security

TestSavant AI Security Assurance Platform

TestSavant AI Security

language

AI Model Security

TestSavant AI Security Assurance Platform on SecurityListing: AI security assurance platform for red-teaming, guardrails & compliance

UTMStack Real-time SIEM & XDR

UTMStack Real-time SIEM

language

Extended Detection and Response

UTMStack Real-time SIEM & XDR on SecurityListing: Open source SIEM and XDR platform for real-time threat detection and response

Varonis DSPM

Varonis DSPM

language

Data Security Posture Management

Varonis DSPM on SecurityListing: DSPM platform that discovers, classifies, and protects data with automated remediation

Todyl Platform

Todyl Platform

language

Endpoint Detection and Response

Todyl Platform on SecurityListing: Unified platform combining SASE, EDR, SIEM, MXDR, GRC, and security automation

TrustLayer Mail

TrustLayer Mail

language

Email Security Platforms

TrustLayer Mail on SecurityListing: Email security platform with inline threat protection and compliant archiving

Tumeryk AI Trust Score™ Generator

Tumeryk AI Trust

language

Vulnerability Assessment

Tumeryk AI Trust Score™ Generator on SecurityListing: Automates LLM vulnerability assessments and red teaming with AI Trust Score

Opscompass Configuration Drift

Opscompass Configuration Drift

language

Cloud Security Posture Management

Opscompass Configuration Drift on SecurityListing: Detects & monitors config drift across multi-cloud & hybrid environments

Risk Cognizance Cloud Monitoring as a Service

Risk Cognizance Cloud

language

Risk Assessment

Risk Cognizance Cloud Monitoring as a Service on SecurityListing: Cloud monitoring and assessment service for security and compliance

Flyingduck Comprehensive SBOM Management

Flyingduck Comprehensive SBOM

language

Software Composition Analysis

Flyingduck Comprehensive SBOM Management on SecurityListing: SBOM management platform for tracking dependencies and vulnerabilities

Huntress Managed SIEM

Huntress Managed SIEM

language

Threat Hunting

Huntress Managed SIEM on SecurityListing: Managed SIEM with 24/7 AI-assisted SOC for threat detection and compliance

Website Privacy Test

Website Privacy Test

language

Third-Party Risk Management

Website Privacy Test on SecurityListing: Website privacy and security testing tool for cookie and third-party analysis

Risk Cognizance GRC Tool for Mapping Compliance Levels

Risk Cognizance GRC

language

Governance Risk and Compliance Platforms

Risk Cognizance GRC Tool for Mapping Compliance Levels on SecurityListing: GRC platform for mapping compliance levels across regulatory frameworks

Nightfall AI Data Exfiltration Prevention

Nightfall AI Data

language

Data Classification

Nightfall AI Data Exfiltration Prevention on SecurityListing: AI-native DLP preventing data exfiltration across endpoints, SaaS, and AI apps

XeneX Managed Cybersecurity

XeneX Managed Cybersecurity

language

Managed Security Service Providers

XeneX Managed Cybersecurity on SecurityListing: Managed cybersecurity service with 24/7 SOC, XDR, SIEM, and compliance support

XFA Device Security

XFA Device Security

language

Mobile Device Management

XFA Device Security on SecurityListing: Agentless device security platform for BYOD, managed, and external devices.

Polymer Data Loss Prevention

Polymer Data Loss

language

Data Classification

Polymer Data Loss Prevention on SecurityListing: DLP solution for SaaS and AI apps with automated policy enforcement

RateYourCyber Cybersecurity Assessment

RateYourCyber Cybersecurity Assessment

language

Risk Assessment

RateYourCyber Cybersecurity Assessment on SecurityListing: Cybersecurity assessment platform for SMEs with maturity scoring and roadmaps

XYGATE Aegis Scan

XYGATE Aegis Scan

language

Risk Assessment

XYGATE Aegis Scan on SecurityListing: Automated vulnerability scanning for HPE NonStop systems

Supply Wisdom Risk Insights

Supply Wisdom Risk

language

Risk Assessment

Supply Wisdom Risk Insights on SecurityListing: Third-party risk monitoring platform with real-time alerts and reporting

Innvikta Security Awareness Training

Innvikta Security Awareness

language

Security Awareness Training

Innvikta Security Awareness Training on SecurityListing: Security awareness training platform with phishing simulation capabilities

Anchore Secure

Anchore Secure

language

Container Security

Anchore Secure on SecurityListing: Container & source code scanning for vulnerabilities, malware, and secrets

Risk Cognizance Vendor Management

Risk Cognizance Vendor

language

Risk Assessment

Risk Cognizance Vendor Management on SecurityListing: Vendor management platform for third-party risk and compliance oversight

RiskXchange Vendor Risk Management

RiskXchange Vendor Risk

language

Risk Assessment

RiskXchange Vendor Risk Management on SecurityListing: Platform for assessing and monitoring third-party vendor security risks

SoSafe Proactive Human Risk Management

SoSafe Proactive Human

language

Security Awareness Training

SoSafe Proactive Human Risk Management on SecurityListing: Monitors user behavior and measures security risks through behavioral analytics

QuoIntelligence Threat Intelligence Services

QuoIntelligence Threat Intelligence

language

Brand Protection

QuoIntelligence Threat Intelligence Services on SecurityListing: European threat intelligence as-a-service provider with analyst support

Accenture Cybersecurity Consulting

Accenture Cybersecurity Consulting

language

Risk Assessment

Accenture Cybersecurity Consulting on SecurityListing: Enterprise cybersecurity consulting and managed services provider

cyberconIQ AIQ™

cyberconIQ AIQ™

language

Risk Assessment

cyberconIQ AIQ™ on SecurityListing: Behavioral science-based cyber training & NIST 2.0 assessment platform

Cynomi Automated vCISO Platform

Cynomi Automated vCISO

language

Risk Assessment

Cynomi Automated vCISO Platform on SecurityListing: Automated vCISO platform for MSSPs/MSPs to deliver cybersecurity services

SaltyCloud Isora GRC

SaltyCloud Isora GRC

language

Risk Assessment

SaltyCloud Isora GRC on SecurityListing: GRC platform for infosec assessment, risk mgmt, vendor & asset oversight

DerScanner Full Cycle Application Security Testing

DerScanner Full Cycle

language

Dynamic Application Security Testing

DerScanner Full Cycle Application Security Testing on SecurityListing: Full-cycle app security platform with SAST, DAST, MAST, SCA & binary analysis

CultureAI

CultureAI

language

AI Model Security

CultureAI on SecurityListing: AI usage visibility and control platform for security and compliance teams

SAFE Questionnaire Analyzer AI Agent

SAFE Questionnaire Analyzer

language

Risk Assessment

SAFE Questionnaire Analyzer AI Agent on SecurityListing: AI agent that auto-populates third-party security questionnaires

SECJUR Automated Compliance

SECJUR Automated Compliance

language

Compliance Management

SECJUR Automated Compliance on SecurityListing: Automated compliance platform for EU standards like NIS2, ISO 27001, TISAX

Seezo Security Design Reviews

Seezo Security Design

language

Risk Assessment

Seezo Security Design Reviews on SecurityListing: Automated security design review platform for developers

SoSafe Cybersecurity Awareness Training

SoSafe Cybersecurity Awareness

language

Risk Assessment

SoSafe Cybersecurity Awareness Training on SecurityListing: Security awareness training platform with phishing simulations and AI chatbot

Uno.ai

Uno.ai

language

Governance Risk and Compliance Platforms

Uno.ai on SecurityListing: Uno.ai is an AI-powered GRC platform that automates various governance, risk, and compliance processes to enhance efficiency and risk management.

SimSpace Cyber Range Platform

SimSpace Cyber Range

language

Threat Intelligence Platforms

SimSpace Cyber Range Platform on SecurityListing: Cyber range platform for training, testing, and validating security controls.

Whitehats Data Privacy Solution

Whitehats Data Privacy

language

Data Classification

Whitehats Data Privacy Solution on SecurityListing: Data privacy & GRC platform with DSPM, compliance automation, and risk mgmt.

Risk Cognizance Ransomware Susceptibility

Risk Cognizance Ransomware

language

Risk Assessment

Risk Cognizance Ransomware Susceptibility on SecurityListing: Assesses organizational vulnerability to ransomware attacks

onShore Security Maturity Assessment

onShore Security Maturity

language

Risk Assessment

onShore Security Maturity Assessment on SecurityListing: Cybersecurity maturity assessment service evaluating security posture

SecPod Saner Patch Management

SecPod Saner Patch

language

Security Scanning

SecPod Saner Patch Management on SecurityListing: Automated patch management solution for enterprise systems

QuoIntelligence Risk Intelligence Service

QuoIntelligence Risk Intelligence

language

Digital Risk Protection

QuoIntelligence Risk Intelligence Service on SecurityListing: Risk intelligence service for supply chain, geopolitical & compliance risks

audius SmartWorkline

audius SmartWorkline

language

Governance Risk and Compliance Platforms

audius SmartWorkline on SecurityListing: Digital workplace platform connecting people, tools, and processes securely

Securden Unified PAM

Securden Unified PAM

language

Privileged Access Management

Securden Unified PAM on SecurityListing: A powerful tool that enables organizations to discover, manage, and secure privileged access, helping to reduce the risks associated with privileged accounts and activities.

Uno Third Party Risk Management

Uno Third Party

language

Risk Assessment

Uno Third Party Risk Management on SecurityListing: AI-powered platform for automating vendor risk assessment and scoring

Risk Cognizance Automated Compliance Management Software

Risk Cognizance Automated

language

Compliance Management

Risk Cognizance Automated Compliance Management Software on SecurityListing: Automated GRC platform for compliance tracking and risk management

Votiro Data Security

Votiro Data Security

language

Data Security Posture Management

Votiro Data Security on SecurityListing: Data security platform with CDR, data masking, and threat analytics

AwareGO Human Risk Assessment

AwareGO Human Risk

language

Risk Assessment

AwareGO Human Risk Assessment on SecurityListing: Human risk assessment and security awareness training platform

SteelCon 2018

SteelCon 2018

language

Industry Reports

SteelCon 2018 on SecurityListing: Cybersecurity conference featuring talks on various hacking topics by industry experts.

Oneleet Cybersecurity & Compliance Platform

Oneleet Cybersecurity &

language

Compliance Management

Oneleet Cybersecurity & Compliance Platform on SecurityListing: Automated compliance and security platform for SOC 2, ISO 27001, and HIPAA

NERC Alerts

NERC Alerts

language

Blogs and News

NERC Alerts on SecurityListing: Receive important notifications and updates related to North American electric grid security.

Mandos Cybersecurity Insights

Mandos Cybersecurity Insights

language

Blogs and News

Mandos Cybersecurity Insights on SecurityListing: Blog providing cybersecurity, AI security, and leadership insights for CISOs

XPO IT Services

XPO IT Services

United Kingdom flag

Security Operations

XPO IT Services are dedicated to providing secure, high quality IT recycling and asset disposal services. We recognise the need to not only protect our customers’ data security, but the wider natural

AgileBlue (Agile1)

AgileBlue (Agile1)

United States flag

Managed Security Service Providers

AgileBlue (formerly Agile1) is a managed breach detection company with an Autonomous SOC-as-a-Service for 24×7 monitoring, detection and guided response for cloud, digital infrastructures and applicat

Utimaco

Utimaco

Germany flag

Governance Risk and Compliance Platforms

UTIMACO is a global platform provider of trusted Cybersecurity and Compliance solutions and services. UTIMACO develops on-premises and cloud-based hardware security modules, solutions for key managem

Kennedys

Kennedys

United Kingdom flag

Security Operations

Kennedys is a global law firm with expertise in litigation/dispute resolution and advisory services, particularly in the insurance/reinsurance and liability sectors, including cyber risk. Our global

Wazuh

Wazuh

United States flag

Security Operations

Wazuh provides a security solution capable of monitoring your infrastructure, detecting threats, intrusion attempts, system anomalies, poorly configured applications and unauthorized user actions. It

Framatome

Framatome

France flag

Industrial Control System Security

Framatome is an international leader in nuclear energy recognized for its innovative solutions and low-carbon value added technologies. Framatome Cybersecurity portfolio is directly inspired by its u

D.med Software

D.med Software

Germany flag

Industrial Control System Security

D.med Software is a company with a focus on cybersecurity for embedded software and cloud applications for the medical industry. Founded in 2015 as a medical device consultancy company, D.med Softwar

CybX Security LLC

CybX Security LLC

United States flag

Backup as a Service

CybX is the first company of its kind to merge the practice of computer forensics with computer security and information security. Our products exceed the normal standards of computer security, produc

ClearDATA

ClearDATA

United States flag

Cloud Security

The ClearDATA Managed Cloud protects sensitive healthcare data using purpose-built DevOps automation, compliance and security safeguards, and healthcare expertise. Why ClearDATA?- The only healthcare

Brighterion

Brighterion

United States flag

Security Operations

Brighterion solutions stop payment and acquirer fraud, reduce credit risk and delinquency, fight financial crime, prevent healthcare fraud, waste and abuse, and more. Brighterion deliver a leading ar

AlertEnterprise

AlertEnterprise

United States flag

Industrial Control System Security

AlertEnterprise uniquely eliminates silos and uncovers blended threats across IT Security, Physical Access Controls and Industrial Control Systems for true prevention of insider threat, fraud, theft,

360 Advanced

360 Advanced

United States flag

Governance Risk and Compliance Platforms

360 Advanced is a relationship-focused cybersecurity and compliance firm offering integrated compliance solutions customized to meet your business’ needs. We work with organizations that are seeking t

Blancco Technology Group

Blancco Technology Group

United States flag

Security Operations

Blancco Technology Group is a leading global provider of mobile device diagnostics and secure data erasure solutions. Blancco is the industry standard in data erasure and mobile device diagnostics. B

6clicks

6clicks

Australia flag

Governance Risk and Compliance Platforms

6clicks is an easy way to implement your risk and compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRAMP and many other standards. Hundreds of businesses trust

Appsian Security

Appsian Security

United States flag

Data Loss Prevention

Appsian provides powerful solutions that help organizations take control of their business critical data and financial transactions. Our unique approach that combines data security with controls for

Anatomy IT

Anatomy IT

United States flag

Governance Risk and Compliance Platforms

Anatomy IT empowers healthcare providers to deliver exceptional patient care with cutting-edge technology and cybersecurity solutions. Our expertly curated Security Suite is designed to secure, prote

ExchangeDefender

ExchangeDefender

United States flag

Security Operations

ExchangeDefender provides cybersecurity services that secures your company email and data, and guarantees 24/7 email access. ExchangeDefender has been providing email security, compliance, and busine

AHAD

AHAD

United Arab Emirates flag

Compliance Consulting

AHAD provides cybersecurity, digital transformation, and risk management services and solutions. AHAD was founded to provide cybersecurity solutions to Government, Fortune 500, And Start-Up Companies

Adili Group

Adili Group

KE flag

Compliance Consulting

Adili Group is a leading pan-African corporate advisory firm. We deliver tailored solutions in regulation and compliance, risk management, and improving business efficiency.

Match Systems

Match Systems

Singapore flag

Governance Risk and Compliance Platforms

Match Systems is a provider of technology-driven solutions for financial crime detection, compliance and risk management. Match Systems is the Data provider of information about cryptocurrency addres

Acumenis

Acumenis

Australia flag

Compliance Consulting

At Acumenis, we help organisations of all sizes to manage information security effectively. We believe that a successful security program is one that not only achieves compliance and manages security

ANSEC IA

ANSEC IA

United Kingdom flag

Compliance Consulting

ANSEC is a consultancy practice providing independent Information Assurance and IT Security focussed services to customers throughout the UK, Ireland and internationally. Established in May 2007, the

A-LIGN

A-LIGN

United States flag

Governance Risk and Compliance Platforms

A-LIGN is a technology-enabled security and compliance partner trusted by more than 2,500 global organizations to mitigate cybersecurity risks. A-LIGN was founded in 2009 to help companies like yours

Nuvias Group

Nuvias Group

United Kingdom flag

Cloud Security

Nuvias Group is a specialist value-addedd IT distribution company offering a service-led and solution-rich proposition ready for the new world of technology supply. Nuvias was born from cyber securit

A&O IT Group

A&O IT Group

United Kingdom flag

Compliance Consulting

A&O IT Group provide IT support and services including  IT Managed Services, IT Project Services, IT Engineer Services and Cyber Security. We offer tried and tested solutions across the whole range o

Zilla Security

Zilla Security

United States flag

Governance Risk and Compliance Platforms

Zilla combines identity governance with cloud security to deliver comprehensive access visibility, reviews, lifecycle management, and policy-based security remediation. Zilla is a SaaS platform for a

Assure IT

Assure IT

Singapore flag

Governance Risk and Compliance Platforms

Assure IT is a Singapore company specialising in technology governance, risk and compliance. Cybersecurity is an important enterprise risk. Assure IT adopts a holistic, end-to-end framework to cybers

Davis Wright Tremaine (DWT)

Davis Wright Tremaine

United States flag

Security Operations

Davis Wright Tremaine is a full-service law firm with offices throughout the US and in Shanghai, China. Practice areas include Technology, Privacy & Security. Technology, Privacy & Security Overview:

ABS Group

ABS Group

United States flag

Governance Risk and Compliance Platforms

ABS Group provides risk and reliability solutions and technical services that help clients confirm the safety, integrity and security of critical assets and operations. ABS Group provides a complete

Suzan AI

Suzan AI

France flag

Security Operations

Suzan is an AI-native governance, compliance and risk management tool that helps you build trust. Focus on innovation, we take care of regulations. Deploy AI you can trust. Suzan for AI is your AI-po

WizNucleus

WizNucleus

United States flag

Industrial Control System Security

WizNucleus develops, markets and supports a software platform (Cyberwiz-Pro) that enables Critical Infrastructure enterprises to ensure the future state of their cybersecurity and to remain compliant

BitRaser

BitRaser

United States flag

Security Operations

BitRaser is a plug and play software that permanently erases data beyond the scope of data recovery. It provides audit reports for fulfilling internal / external corporate audit requirements and compl

Bit Sentinel

Bit Sentinel

RO flag

Compliance Consulting

Bit Sentinel is an information security company. We help companies like yours discover, prioritize, and effectively remediate potential cybersecurity risks. From penetration testing to incident respo

Aiden Technologies

Aiden Technologies

United States flag

Governance Risk and Compliance Platforms

Aiden simplifies your IT process, giving you peace of mind and security by ensuring your computers get exactly the software they need and nothing else. Our Mission is to automate compliance and elimin

Bionic

Bionic

United States flag

Governance Risk and Compliance Platforms

Bionic is an agentless way to get control over your increasingly complex applications so you can manage, operate, and secure them faster and more efficiently. Bionic Streamlines Security ReviewsWith

FoxGuard

FoxGuard

United States flag

Industrial Control System Security

FoxGuard develops customized cyber security, compliance and industrial computing solutions for critical infrastructure entities and control system vendors. FoxGuard provides a variety of services tha

CybernetIQ

CybernetIQ

Canada flag

Security Operations

CLAW by CybernetIQ is the industry's most advanced SOAR platform helping unify all cybersecurity tools under one  umbrella and providing organizations faster, better and more accurate cybersecurity.

Assura

Assura

United States flag

Compliance Consulting

Assura provides innovative cybersecurity advisory and managed services to all industries including government, healthcare, financial, manufacturing, and transportation sectors. Our unique capabilitie

iNovex

iNovex

United States flag

Compliance Consulting

iNovex is a community of innovators that work together to solve hard problems. We partner with you to meet problems head-on and push boundaries with technology solutions. We build comprehensive and in

Awake Security

Awake Security

United States flag

Threat Intelligence Platforms

Awake Security offer a security solution built on an AI platform that acts like the human brain to sense, detect, and respond to threats you may not even know exist. Awake Security is the only advanc

Zymr

Zymr

United States flag

Cloud Security

Zymr specialize in cloud computing solutions including Cloud Security, Cloud Mobility, Cloud Apps, Cloud Infrastructure and Cloud Orchestration. Zymr has worked closely with several leading cloud sec