Logo
find AI list
TasksCompareWorkflowsAI NewsTools
Submit ToolSubmit
Log in
Logo
find AI list

Search by task, compare top tools, and use proven workflows to choose the right AI tool faster.

Platform

  • Tasks
  • Tools
  • Compare
  • Alternatives
  • Workflows
  • Reports
  • Personas
  • Roles
  • Stacks
  • Models
  • Agents
  • AI News

Company

  • About
  • Blog
  • FAQ
  • Contact
  • Editorial Policy
  • Privacy
  • Terms

Contribute

  • Submit Tool
  • Manage Tool
  • Request Tool

Stay Updated

Get new tools, workflows, and AI updates in your inbox.

© 2026 findAIList. All rights reserved.

Privacy PolicyTerms of ServiceEditorial PolicyRefund Policy
Back to All Domains
Open compareBrowse workflowsBrowse alternatives
All Domains

Security & Privacy

Workflow Clusters

More & General
200 tasks
Cybersecurity
76 tasks
Privacy & Auth
46 tasks
Back to Matrix

Security & Privacy

Workflow Clusters

More & GeneralCybersecurityPrivacy & Auth
Domain Overview

Explore Security & Privacy by workflow, not by noisy labels

Start with the workflow cluster that matches your goal, then move into the specific tasks and tools underneath it.

3
Clusters
322
Tasks
306
Tool Matches
200 tasks210 tool matches

More & General

Security tasks across governance, risk, and technical controls.

Explore cluster

Top tasks

View full task list
Vulnerability Scanning

See the strongest tool matches for vulnerability scanning.

14
Tools
Vulnerability Management

See the strongest tool matches for vulnerability management.

11
Tools
Deepfake Detection

See the strongest tool matches for deepfake detection.

10
Tools
Detect code vulnerabilities

See the strongest tool matches for detect code vulnerabilities.

9
Tools
Automate incident response

See the strongest tool matches for automate incident response.

7
Tools

Preview tools

Browse domain
Aikido Security logo

Aikido Security

Free to $1200/yr

76 tasks63 tool matches

Cybersecurity

Threat analysis, incident triage, and defensive cybersecurity workflows.

Explore cluster

Top tasks

View full task list
Detect security threats

See the strongest tool matches for detect security threats.

16
Tools
Enforce security policies

See the strongest tool matches for enforce security policies.

8
Tools
End-to-End Encryption

See the strongest tool matches for end-to-end encryption.

6
Tools
Threat Detection

See the strongest tool matches for threat detection.

5
Tools
Provide cybersecurity training

See the strongest tool matches for provide cybersecurity training.

3
Tools

Preview tools

Browse domain
Elastic logo

Elastic

Free

46 tasks33 tool matches

Privacy & Auth

Identity, access, and privacy-compliance support workflows.

Explore cluster

Top tasks

View full task list
Biometric Authentication

See the strongest tool matches for biometric authentication.

4
Tools
Verify document authenticity

See the strongest tool matches for verify document authenticity.

3
Tools
Verify user identity

See the strongest tool matches for verify user identity.

3
Tools
Multi-Factor Authentication

See the strongest tool matches for multi-factor authentication.

3
Tools
Verify credential authenticity

See the strongest tool matches for verify credential authenticity.

1
Tools

Preview tools

Browse domain
Mitek Systems logo

Mitek Systems

Free

Beagle Security logo

Beagle Security

Free to $199/yr

Bitbucket Pipelines logo

Bitbucket Pipelines

Free to $6/mo

GitLab Code Review logo

GitLab Code Review

Free to $99/yr

Arctic Wolf logo

Arctic Wolf

Free

CrowdStrike Falcon logo

CrowdStrike Falcon

Free to $299.95/yr

Graylog logo

Graylog

Free

Specterr logo

Specterr

Free to $99/mo

Salt Project logo

Salt Project

Free

Snyk AI Security Platform logo

Snyk AI Security Platform

Free to $1260/yr

Aiden logo

Aiden

Free

NEC Corporation logo

NEC Corporation

Free

Proof (formerly Notarize) logo

Proof (formerly Notarize)

Free to $99/yr

AI Writing Check logo

AI Writing Check

Free

DocuPrime logo

DocuPrime

Free to $599/yr

Amiqus logo

Amiqus

Free