1000+ AI tools.
Vetted.
Deployed.
Ready.
Every tool in this directory has been evaluated by our team against real business use cases — not marketing claims. Browse by category, compare options, and start implementing.
How the directory works
Every tool is pulled directly from our internal CRM — the same stack we use with clients. We add tools when we deploy them, update pricing notes when they change, and retire tools that don't hold up in production.
Use the category filter to narrow by business function. Each card shows a short description and our pricing notes so you can shortlist fast.
Missing a tool?
If you've deployed something that belongs here, we want to hear about it. We review suggestions monthly and add tools that meet our evaluation criteria.
Awake Security provides an AI-driven cybersecurity platform that autonomously hunts and responds to threats, ensuring that networks are protected against sophisticated attacks. It uses machine learning to detect anomalies and potential threats within network traffic.
JASK is an AI-driven security operations center (SOC) platform that automates threat detection and response. It uses machine learning to analyze security data and surface threats, helping security teams to focus on the most critical issues.
Rapid7 InsightIDR is an AI-driven cybersecurity tool that focuses on incident detection and response. It leverages user behavior analytics and machine learning to identify and respond to potential threats in real-time, ensuring enhanced security posture for enterprises.
LogRhythm leverages machine learning and artificial intelligence to provide advanced security analytics and threat detection. It helps organizations to detect, respond to, and neutralize cyber threats efficiently, enhancing their overall cybersecurity posture.
Tessian uses machine learning to protect businesses from threats executed via email, including spear phishing, misdirected emails, and data loss. It analyses email communications and uses AI to assess potential risks and prevent breaches.
Secureworks Taegis XDR is an extended detection and response platform that leverages AI to enhance threat detection, investigation, and response across an organization’s IT environment. It integrates advanced analytics and machine learning to identify threats in real-time and provides actionable insights to improve cybersecurity posture.
Darktrace Antigena is an AI-driven cybersecurity solution that autonomously responds to cyber threats in real-time. Using machine learning and AI algorithms, it detects and neutralizes network threats by understanding normal network patterns and identifying anomalies. It is designed to enhance security operations by providing automated response capabilities to mitigate risks.
Cortex XDR by Palo Alto Networks is an AI-driven cybersecurity platform that integrates endpoint, network, and cloud data to prevent sophisticated cyberattacks. It uses machine learning to analyze data and detect threats in real-time, enhancing security operations with automated responses.
Azure Sentinel is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution. It uses artificial intelligence to help analyze large volumes of data across an enterprise quickly, identifying potential security threats and enabling automated responses.
An autonomous cybersecurity platform that uses AI for prevention, detection, and response across endpoints, containers, cloud workloads, and IoT devices.
A cloud-native endpoint protection platform that uses AI and behavioral analysis to prevent, detect, and respond to threats.
A leading cybersecurity AI company that uses self-learning AI to detect and respond to cyber threats in real time across networks, cloud, and email.
A pioneer in using AI and machine learning to provide predictive threat prevention on endpoints.
Uses AI to detect and hunt for cyberattacker behaviors in real-time, from cloud and data center workloads to user and IoT devices.
Darktrace Antigena is an autonomous response technology that uses AI to respond to cyber threats in real-time. It operates by analyzing patterns and behaviors in network traffic to identify potential threats and take automated actions to mitigate them.
No tools match your search on this page.
We've deployed
Most of these
In production.
Knowing which tools exist is step one. Knowing which ones work for your specific use case, data, and infrastructure is a different question. That's where we come in.
No upfront cost · Italy · Malta · Europe · English & Italian