Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Introduced in 2006, Column Case Management has emerged as the premier web-based case management solution tailored for both commercial and public sector entities. Utilizing the BMC Remedy Action Request System (ARS) as its foundation, this software empowers organizations to streamline both straightforward and intricate processes, thereby promoting adherence to best practices and standardization. Key features encompass reporting and analytics, task automation, knowledge management, service level agreements (SLAs), notifications oversight, and audit control, to name a few. Among the widely-used applications of Column Case Management are Column Case Investigative, Column Customer Service Support, and Column Records Management. This versatility and comprehensive functionality make it an invaluable tool for organizations seeking to enhance their operational efficiency.

Description

OpenText™ Security Suite, utilizing OpenText™ EnCase™, offers comprehensive visibility across various devices including laptops, desktops, and servers, enabling the proactive detection of sensitive information, threat identification, remediation, and meticulous, forensically-sound data collection and analysis. With over 40 million endpoints equipped with its agents, it serves notable clients, including 78 companies from the Fortune 100 list, alongside a community of more than 6,600 EnCE™ certified professionals, thereby establishing itself as the benchmark for incident response and digital investigations in the industry. EnCase solutions address a multitude of requirements for enterprises, government bodies, and law enforcement agencies, covering aspects such as risk management, compliance, file analytics, endpoint detection and response (EDR), and digital forensics with the most reliable cybersecurity software available. By tackling issues that frequently remain unnoticed or unresolved at the endpoint level, Security Suite not only enhances the security posture of organizations but also reinstates trust among their clients, thanks to its unmatched dependability and extensive coverage. This suite ultimately empowers organizations to navigate the complex landscape of cybersecurity with confidence and efficiency.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

5X
EnCase Forensic

Integrations

5X
EnCase Forensic

Pricing Details

$60000.00/one-time
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Column Technologies

Founded

1998

Country

United States

Website

www.columnit.com

Vendor Details

Company Name

OpenText

Founded

1991

Country

Canada

Website

www.opentext.com/products-and-solutions/products/security

Product Features

Investigation Management

Contact Management
Data Management
Incident Management
Reporting & Statistics
Subject Profiles

Law Enforcement

Case Management
Certification Management
Court Management
Court Management Integration
Crime Scene Management
Criminal Database
Dispatching
Evidence Management
Field Reporting
Incident Mapping
Internal Affairs Administration
Investigation Management
Scheduling

Product Features

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Investigation Management

Contact Management
Data Management
Incident Management
Reporting & Statistics
Subject Profiles

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Alternatives

Case Closed Software Reviews

Case Closed Software

Crime Tech Solutions

Alternatives

Polonious Reviews

Polonious

Polonious Systems
Magnet AXIOM Cyber Reviews

Magnet AXIOM Cyber

Magnet Forensics
VIXN Reviews

VIXN

Fermata Discovery