Compare 142 Cybersecurity Tools Across 17 Categories
Compare pricing, features, and deployment options across 17 cybersecurity categories.
Featured
SplitSecure
FeaturedSplitSecure uses Shamir Secret Sharing to split credentials across multiple devices you control — no single point of compromise, no vendor dependency. A fundamentally different approach to secrets management.
Browse Categories
Secrets Management
11 toolsTools for managing API keys, passwords, certificates, and other sensitive credentials across your infrastructure.
SIEM & Security Analytics
9 toolsSecurity information and event management platforms for log analysis, threat detection, and incident response.
PAM & Identity
10 toolsPrivileged access management and identity governance tools for controlling and auditing access to critical systems.
Endpoint & EDR
9 toolsEndpoint detection and response platforms for protecting devices against malware, ransomware, and advanced threats.
Security Data Pipeline
10 toolsTools for routing, transforming, and optimizing security data flows across your infrastructure.
SASE & Zero Trust
9 toolsSecure access service edge and zero trust platforms for securing distributed workforces and cloud applications.
Firewall & NGFW
9 toolsNext-generation firewall platforms for network security, intrusion prevention, and application-layer protection.
Identity & Access Management
9 toolsIdentity and access management platforms for single sign-on, multi-factor authentication, and lifecycle management.
Cloud Security & CNAPP
9 toolsCloud-native application protection platforms for securing cloud workloads, containers, and infrastructure.
Vulnerability Management
9 toolsVulnerability scanning and management platforms for identifying, prioritizing, and remediating security weaknesses.
Email Security
9 toolsEmail security platforms for protecting against phishing, BEC, malware, and other email-borne threats.
Data Security & Governance
9 toolsData security and governance platforms for discovering, classifying, and protecting sensitive data across your organization.
Application Security
9 toolsApplication security testing tools for finding and fixing vulnerabilities in code, dependencies, and containers.
Email Encryption
8 toolsEmail encryption platforms for protecting sensitive communications with end-to-end encryption, DLP, and compliance.
Password Management
9 toolsEnterprise password managers for centralized credential storage, secure sharing, and admin controls across your organization.
Infrastructure Access
10 toolsInfrastructure access platforms for securing and auditing access to servers, databases, Kubernetes, and cloud resources.
Network Detection & Response
1 toolsAI-driven network traffic analysis platforms for detecting lateral movement, insider threats, and advanced attacks across hybrid environments.