Compare Products
Showing all 23 products
Sort by
Reviews: Sorts listings by the number of user reviews we have published, greatest to least.
Sponsored: Sorts listings by software vendors running active bidding campaigns, from the highest to lowest bid. Vendors who have paid for placement have a ‘Visit Website’ button, whereas unpaid vendors have a ‘Learn More’ button.
Avg Rating: Sorts listings by overall star rating based on user reviews, highest to lowest.
A to Z: Sorts listings by product name from A to Z.
Fidelis Elevate
Fidelis Elevate
Fidelis Elevate, an Open XDR (Extended Detection and Response) platform, enables cyber security by automating defense operations across various network architectures. It extends security controls to the cloud and endpoints and use...Read more about Fidelis Elevate
Forensic Toolkit (FTK)
Forensic Toolkit (FTK)
Forensic Toolkit (FTK) is an investigation management software designed to help businesses in the healthcare, finance, legal, energy and other sectors search, process and index data from multiple sources. The platform enables admi...Read more about Forensic Toolkit (FTK)
Magnet AXIOM
Magnet AXIOM
Magnet AXIOM is a Digital Forensics software for Public Safety professionals designed to recover and examine evidence in a case file. The platform allows administrators to retrieve data such as browser history, deleted files and ...Read more about Magnet AXIOM
Detego Digital Forensics
Detego Digital Forensics
Detego Digital Forensics is designed to help intelligence agencies, law enforcement units, and forensic departments analyze and extract data from various online and external storage devices. It allows organizations to capture and ...Read more about Detego Digital Forensics
Trellix Network Security
Trellix Network Security
Trellix Network Security is an on-premise and cloud-based solution designed to help businesses leverage artificial intelligence (AI), Multi-Vector Virtual Execution (MVX) and machine learning (ML) technologies to detect, manage an...Read more about Trellix Network Security
Lima
Lima
Lima is a digital forensics solution, which enables regulatory bodies, law enforcement agencies and businesses to manage forensic cases of all types. Professionals can create auditable notes to maintain compliance with quality sta...Read more about Lima
MailXaminer
MailXaminer
The first major launch in the field of e-Discovery applications, led by MailXaminer, was a complete forensic email investigation and analysis tool, a complete toolkit for recording, analyzing, checking and reporting email evidence...Read more about MailXaminer
Barracuda Forensics and Incident Response
Barracuda Forensics and Incident Response
Barracuda Forensics and Incident Response is an email security solution that helps businesses identify and respond to email attacks. The platform allows employees to automate operational processes, analyze the nature and scope of ...Read more about Barracuda Forensics and Incident Response
Intercept X Endpoint
Intercept X Endpoint
Sophos Intercept X is a hybrid antivirus solution that provides businesses protection against malware, viruses and offers a remote management tool. The anti-malware protection is designed to identify, block or remove threats, thus...Read more about Intercept X Endpoint
E3:Universal
E3:Universal
E3:Universal is an on-premise digital forensics solution, which helps investigators and businesses in the public sector process multiple types of evidence from within a unified platform. Professionals can utilize the content analy...Read more about E3:Universal
Cyber Triage
Cyber Triage
Cyber Triage is an automated incident response software designed to help businesses collect and analyze relevant data after an alert is generated. Key features include malware detection, memory image analysis, Yara rules, threat t...Read more about Cyber Triage
Harmony Endpoint
Harmony Endpoint
Harmony Endpoint is a cloud-based and on-premise security and digital forensics solution, which helps small to large businesses ensure protection from malware, ransomware or phishing attack. Features include threat hunting, real-t...Read more about Harmony Endpoint
DomainTools
DomainTools
DomainTools is a web-based threat intelligence software designed to help businesses assess the risk of domains, investigate online fraud and cybercrimes, manage phishing detection and monitor infringing activity. Key features incl...Read more about DomainTools
CyFIR Investigator
CyFIR Investigator
CyFIR Investigator is an endpoint detection and response solution, which enables businesses to identify and respond to cyber threats across computer networks. Managers can remotely investigate internal issues related to sexual har...Read more about CyFIR Investigator
EnCase Forensic
EnCase Forensic
EnCase Forensic is a digital forensic solution that can collect and preserve critical desktop/mobile evidence from multiple sources such as text messages, call records, pictures, graphics, and much more. Using OCR and image anal...Read more about EnCase Forensic
Aware
Aware
The Aware platform enables organizations to proactively discover, classify, secure, and manage data It solves for governance, risk, compliance and insights from collaboration tools like Slack, Workplace, Teams, and Yammer. Aware s...Read more about Aware
IBM QRadar Incident Forensics
IBM QRadar Incident Forensics
IBM QRadar Incident Forensics is a digital forensics solution that helps businesses streamline operations related to data collection, rebuilding, analysis, and more on a centralized platform. It enables staff members to gain visib...Read more about IBM QRadar Incident Forensics
Trimble Forensics Capture
Trimble Forensics Capture
Trimble Forensics Capture helps investigators map crime scenes and collect data faster with guided workflows. The guide, made up of a series of step-by-step instructions, can be customized by your organization to fit the needs of ...Read more about Trimble Forensics Capture
LeaksID
LeaksID
Companies all over the world may cooperate and share documents safely with LeaksID. Every time a user accesses a document, their name and the date of access are added to every word and component. The marks cannot be removed becaus...Read more about LeaksID
Caseboard
Caseboard
Caseboard is a solution specialized in data integration and analysis, whose functionalities improve the processes of criminal investigation, auditing, prevention and the fight against fraud. Based on interaction with various secu...Read more about Caseboard
FTK Forensic Toolkit
FTK Forensic Toolkit
FTK Forensic Toolkit provides a set of tools to help digital forensic professionals uncover critical evidence efficiently. With its robust investigation capabilities, this toolkit enables the analysis of data from various digital ...Read more about FTK Forensic Toolkit
Aid4Mail
Aid4Mail
Aid4Mail is a fast and accurate email search and conversion application for use in digital forensics, eDiscovery, mail migration and archiving. Its proprietary engine quickly processes large volumes of email data while preserving ...Read more about Aid4Mail
D3 SOAR
D3 SOAR
D3 SOAR is a cybersecurity and incident response solution that helps businesses streamline operations related to security automation, compliance management, auditing and more from within a unified platform. With the built-in visua...Read more about D3 SOAR