Best Digital Forensics Software in Africa

Find and compare the best Digital Forensics software in Africa in 2024

Use the comparison tool below to compare the top Digital Forensics software in Africa on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Kroll Cyber Risk Reviews
    See Software
    Learn More
    With more than 3,000 security incidents handled every year, Kroll digital forensics investigators are experts in understanding, analyzing and preserving data during an investigation. In the event of a security incident, Kroll’s forensics investigators can expertly help investigate and preserve data to help provide evidence and ensure business continuity.
  • 2
    GlitchSecure Reviews

    GlitchSecure

    GlitchSecure

    $6,600 per year
    16 Ratings
    See Software
    Learn More
    Hackers build Continuous Security Testing for SaaS Companies Continuous vulnerability assessments and pentests on demand will automatically assess your security posture. Hackers never stop testing and neither should your company. We use a hybrid strategy that combines expert hacker-built testing methodologies, a real time reporting dashboard, and continuous high-quality results. We improve the traditional pentesting cycle by continuously providing expert advice, verification of remediation, and automated security tests throughout the year. Our team of experts will work with you to scope and review all your applications, APIs and networks, ensuring that they are thoroughly tested throughout the year. Let us help you sleep better at night.
  • 3
    FTK Forensic Toolkit Reviews
    FTK® is a purpose-built solution that works with mobile devices and e-discovery technology. It allows you to quickly find relevant evidence, perform faster searches, and dramatically improve your analysis speed. FTK is powerful and proven. FTK indexes and processes data immediately, eliminating the need to wait for searches to complete. FTK can help you get there faster and better than any other data source, no matter how many you have or how much data you need to cull. FTK uses distributed processing and is the only forensics solution to fully leverage multi-thread/multi-core computers. FTK makes use of all of its hardware resources. This allows investigators to find relevant evidence more quickly than other forensics tools. Indexing is done upfront, so searching and filtering are faster than any other solution.
  • 4
    SentinelOne Singularity Reviews

    SentinelOne Singularity

    SentinelOne

    $45 per user per year
    6 Ratings
    One intelligent platform. Unprecedented speeds Infinite scale. Singularity™, enables unrestricted visibility, industry-leading detection and autonomous response. Discover the power of AI powered enterprise-wide security. Singularity is used by the world's largest enterprises to detect, prevent, and respond to cyberattacks at machine speed, greater scale, with higher accuracy, across endpoints, cloud, and identities. SentinelOne's platform offers cutting-edge security by providing protection against malware, scripts, and exploits. SentinelOne's cloud-based platform is innovative, compliant with industry standards and high-performance, whether you are using Windows, Mac, or Linux. The platform is prepared for any threat thanks to constant updates, threat hunting and behavior AI.
  • 5
    IBM QRadar SIEM Reviews
    The market-leading SIEM is built to outpace your adversary in terms of speed, scale, and accuracy SOC analysts' roles are more important than ever as digital threats grow and cyber adversaries become more sophisticated. QRadar SIEM goes beyond threat detection and reaction to help security teams face today’s threats proactively. It does this with advanced AI, powerful intelligence and access to cutting edge content. IBM has a SIEM that will meet your needs, whether you are looking for a cloud-native solution with hybrid scale and speed, or a solution that complements your on-premises architecture. IBM's enterprise-grade AI is designed to increase the efficiency and expertise for every security team. With QRadar SIEM analysts can reduce repetitive tasks such as case creation and risk priority to focus on critical investigations and remediation efforts.
  • 6
    DomainTools Reviews
    Connect indicators from your network to nearly every active domain or IP address on the Internet. This data can be used to inform risk assessments, profile attackers, guide online fraudulent investigations, and map cyber activity to the attacker infrastructure. Get the information you need to make an informed decision about the threat level to your organization. DomainTools Iris, a proprietary threat intelligence platform and investigation platform, combines enterprise-grade domain-based and DNS-based intelligence with a simple web interface.
  • 7
    Magnet AXIOM Cyber Reviews
    Magnet Forensics' solutions are used by large and small enterprises to quickly close cases. They use powerful analytics to surface intelligence and insights. They can also leverage automation and the cloud to reduce downtime, and enable remote collaboration at scale. Magnet Forensics is used by some of the largest corporations in the world to investigate IP theft, fraud and employee misconduct.
  • 8
    Parrot OS Reviews
    Parrot is a global community of security specialists and developers that works together to create a common framework of tools to make their jobs easier, more reliable, and more secure. Parrot OS, Parrot Security's flagship product, is a GNU/Linux distribution that is based on Debian and designed with Security and Privacy as its primary focus. It provides a portable lab for all types of cyber security operations. This includes reverse engineering, pentesting, digital forensics, and reverse engineering. However, it also contains everything you need to create your own software. It is constantly updated and has many sandboxing and hardening options. You have complete control over everything. You can download the system, share it with anyone, and even read the source code. You can also make any changes you wish. This system was created to respect your freedom and will continue to be so.
  • 9
    Cado Reviews
    Investigate all alerts that have been escalated with unmatched speed and depth. Security Operations and Incident Response Teams can revolutionize the way they investigate cyber attacks. You need a platform that can deliver answers in today's complex, evolving hybrid world. Cado Security empowers your teams with unmatched data acquisition, extensive contextualization, and unparalleled speed. The Cado Platform offers automated, detailed data, so teams don't need to scramble for the information they need. This allows for faster resolutions and better teamwork. Once the data is gone with ephemeral, it's gone. Act in real time. Cado Platform, the only tool that can perform full forensic captures and use instant triage collection methods, is able to acquire cloud-based resources such as containers as well as SaaS apps and on-premises endpoints.
  • 10
    Cognitech Video Investigator Reviews
    Video Investigator®, 64 is part of the Tri-Suite64 software suite. It can process still images and video files alike, including improving CCTV footage. There are many ways to enhance video and images in both scenarios. Video Investigator®, 64 is a powerful video- and image enhancement software package. Video Investigator is the only software that offers such a wide range of features and filters to enhance video and images. All other image enhancement, video deblurring, and video resolution enhancement software are available in one package. You can also get additional features. Video Investigator is the best forensic enhancement software.
  • 11
    E3:Universal Reviews
    Top Pick

    Paraben Corporation

    $6,295
    24 Ratings
    Do not get lost in unmanageable tools. The E3 Platform allows you to quickly process all types of digital evidence with an easy interface, efficient engines, and an effective workflow. E3:UNIVERSAL version is designed to handle all data types, including hard drive data, smartphones and IoT data. No more need to adjust your tool according to the type of digital data that you have. The E3 Forensic Platform seamlessly integrates a wide range of evidence into one interface. It allows you to search, analyze, review, and report on digital data from all digital sources. Computer forensics is focused on bits and bytes in a file system. This can contain valuable data that could be crucial to your investigation. The E3 Forensic Platform can be used to break down data from old FAT file systems to newer file systems such as Xboxes.
  • 12
    Aid4Mail Reviews
    Top Pick

    Aid4Mail

    Fookes Software Ltd

    $59.95
    12 Ratings
    Aid4Mail is a leading email processing tool from Switzerland. It comes in three editions: 1. Use Converter to collect and convert emails accurately, fast, and reliably. It supports all popular mail services (e.g. Office 365, Gmail, Yahoo! Mail) and mailbox file formats (e.g. PST, OST, OLM, mbox). It’s also a popular solution for preparing mail ingestion into archival, eDiscovery and forensics platforms. 2. Investigator adds powerful search queries based on Gmail and Microsoft 365 syntax, native pre-acquisition filters and Python scripting. Use its forensic features to recover deleted and hidden email, and process corrupt or unknown mail formats. 3. Enterprise adds support for Google Vault, Mimecast, and Proofpoint exports. Use it to migrate your company mail to live accounts (IMAP, Microsoft 365, Gmail). You can integrate its CLI seamlessly with your own tools. Enterprise offers flexible licensing options including installation on a server or on a shareable flash drive. Aid4Mail is used by Fortune 500 companies, government agencies and legal professionals around the world.
  • 13
    Acronis Cyber Protect Reviews
    Acronis Cyber Protect gives you the peace of mind to know your business is covered, with zero-day malware and ransomware protection, backup and forensic investigations. Cyberthreats are evolving at an incredible rate — and simple data backup and cybersecurity tools are no longer enough to contain them. Acronis’ all-in-one cyber protection solutions combine cybersecurity, data backup, disaster recovery, and more to ensure the integrity of the data and systems you rely on. If you’re like other businesses, you probably use a complex patchwork of solutions to defend against data loss and other cyberthreats — but this approach is tough to manage and leads to security gaps. Acronis’ integrated cyber protection solutions safeguard entire workloads with greater efficiency and a fraction of the complexity, freeing up resources and enabling you to focus on protection and enablement rather than juggling tools. Protect entire workloads without the friction. Getting started with Acronis' cyber protection solutions is simple and painless. Provision multiple systems with just a click, and manage everything — from backup policies to vulnerability assessments and patching — through a single pane of glass.
  • 14
    MailArchiva Reviews

    MailArchiva

    Stimulus Software

    $34.56 / user
    MailArchiva is an enterprise-grade email archiving, ediscovery, and compliance solution. MailArchiva has been used in some of the most challenging IT environments around the globe since 2006. MailArchiva is a server that makes it easy to retrieve and store long-term email data. It is ideal for companies who need to comply with e-Discovery records requests quickly and accurately. MailArchiva offers tight integration (including full calendar, contact & file synchronization) with a wide range of mail services including MS Exchange, Office 365, Microsoft 365 (Microsoft 365), and Google Suite. MailArchiva has many benefits. It reduces time to find information and fulfill discovery record requests. It also ensures that emails are preserved over the long-term. It also helps employees collaborate effectively. Sarbanes Oxley Act), which reduces storage costs up to 60%.
  • 15
    CloudNine Reviews

    CloudNine

    CloudNine Discovery

    $35.00/month
    CloudNine, a cloud-based eDiscovery platform, streamlines the process of litigation discovery, audits and investigations. Users can review, upload and create documents from a central location. CloudNine's comprehensive range of professional services, including computer forensics, managed reviews, online hosting, information governance, litigation support and project management, dramatically reduces the overall cost of eDiscovery processing. CloudNine's self service eDiscovery software can help law firms and corporations save time and money.
  • 16
    OSForensics Reviews

    OSForensics

    PassMark Software

    $799 per user per year
    It's faster and easier than ever to extract forensic data from computers. Find everything hidden in a computer. High performance file searching and indexing make it easier to find the right data faster. Quickly and automatically extract passwords, decrypt files, and recover deleted files from Windows, Mac, and Linux file systems. Our hash matching and drive-signature analysis tools can help you identify evidence and suspicious activity. You can automatically create a timeline of user activity and identify and analyze all files. 360deg Case Management Solution. OSF's new reporting tools make it easy to manage your entire digital investigation. You can create custom reports, add narratives, and attach other tools' reports to your OSF report.
  • 17
    Belkasoft X Reviews
    Belkasoft X Forensic is a flagship product from Belkasoft that can be used for computer, mobile and cloud forensics. It allows you to analyze and acquire a wide variety of mobile and computer devices. You can also perform various analytical tasks, run case-wide searches and bookmark artifacts. Belkasoft X Forensic is a forensically sound software that collects, examines and analyzes digital evidence from a variety of sources, including computers, mobile devices, memory, cars, drones and cloud services. Use a portable Evidence Reader to share case details with colleagues. Belkasoft X Forensic is ready to use and can be easily incorporated into customer workflows. The software interface is so easy to use that you can begin working on your cases immediately after Belkasoft X Forensic's deployment.
  • 18
    Cyber Triage Reviews

    Cyber Triage

    Sleuth Kit Labs

    $2,500
    Forensics to Respond to Incidents Fast and Affordable Automated incident response software allows for quick, thorough, and simple intrusion investigations. An alert is generated by SIEM or IDS. SOAR is used to initiate an endpoint investigation. Cyber Triage is used to collect data at the endpoint. Cyber Triage data is used by analysts to locate evidence and make decisions. The manual incident response process is slow and leaves the entire organization vulnerable to the intruder. Cyber Triage automates every step of the endpoint investigation process. This ensures high-quality remediation speed. Cyber threats change constantly, so manual incident response can be inconsistent or incomplete. Cyber Triage is always up-to-date with the latest threat intelligence and scours every corner of compromised endpoints. Cyber Triage's forensic tools can be confusing and lack features that are necessary to detect intrusions. Cyber Triage's intuitive interface makes it easy for junior staff to analyze data, and create reports.
  • 19
    Passware Kit Reviews

    Passware Kit

    Passware

    $1,195 one-time payment
    Passware Kit Forensic, an encrypted electronic evidence discovery tool that reports and decrypts all password protected items on a computer, is complete. The software can recognize over 340 file types and works in batch mode to recover passwords. The software analyzes live memory images and hibernation file types and extracts encryption keys for hard drives and passwords for Windows & Mac accounts. Passware Bootable memory imager is able to acquire the memory of Windows, Linux and Mac computers. After stopping the password recovery process, navigation issues can be resolved. Instant encryption of the most recent VeraCrypt versions by memory analysis. Accelerated password recovery using multiple computers, NVIDIA or AMD GPUs, as well as Rainbow Tables. Passware Kit Forensic Mac offers access to APFS disks via Mac computers equipped with Apple T2 chips.
  • 20
    LLIMAGER Reviews

    LLIMAGER

    e-Forensics Inc

    $425
    LLIMAGER was created to meet the need for a simple, low-cost "live" forensic image solution for Mac computers. It is capable of capturing an entire synthesized disk including the volume unallocated, as macOS views the disk with its partitions installed. The application was designed to be easy-to-use and intuitive for digital forensics examiners at the entry level. The application uses built-in Mac utilities to provide a versatile solution that is compatible with a variety of macOS versions both old and new. This ensures the tool is functional across a wide range of system configurations and upgrades. FEATURES INCLUDE Powerful and fast "Live" imaging CLI-based application Supports Intel, Apple Silicone, T2 Chips and APFS File Systems. Full Acquisition Log Hashed DMG images using MD5 or SHA-256 Choose between Encrypted and Decrypted DMGs to be used in commercial forensics software Unlimited Technical Support
  • 21
    EchoMark Reviews

    EchoMark

    EchoMark

    $ 19 per month
    Collaboration and communication meet privacy and security. Other companies try to prevent data leakage by limiting information flow, but we use invisible personalized watersmarks in emails and documents to allow seamless sharing while also being easily traceable. EchoMark's invisible solution allows you to track down the source of information, whether it is via email, photo, or printout. The use of advanced features such as computer vision detection and natural language versioning helps to ensure successful tracking. EchoMark will watermark your documents and emails automatically once you have set up the parameters. Upload the original document if you suspect that a leak occurred or have spotted a document on the internet. EchoMark uses computer vision to compare each marked copy with the leaked fragment.
  • 22
    Microsoft Purview Audit Reviews
    Access audit logs in order to assist investigations. Access audit logs and determine the scope of compromise to support investigations. Get a dynamic bandwidth limit to access your auditing information. Support investigations by providing visibility into events such as when a mail item was accessed, replied to and forwarded or when and what an user searched for in Exchange Online or SharePoint Online. Create customized audit log retention policy to retain audit records depending on the service in which the audited actions occur, the specific audited actions, or the user that performs the audited action. Initially, organizations are allocated a baseline limit of 2,000 requests per hour. This limit will increase dynamically based on the number of seats and subscriptions. Add-on licenses allow you to retain audit log records up to ten years.
  • 23
    BloxOne Threat Defense Reviews
    BloxOne Threat Defense maximizes brand security by working with existing defenses to protect your network. It also automatically extends security to your digital imperatives including SD-WAN and IoT. It powers security orchestration automation and response (SOAR), which reduces time to investigate and respond to cyberthreats. It also optimizes security ecosystem performance and lowers total cost of enterprise threat defense. This solution transforms the core network services that you rely upon to run your business into your most valuable security asset. These services include DNS, DHCP, and IP address management (DDI) which play a central part in all IP-based communications. Infoblox makes them the common denominator, allowing your security stack to work together at Internet scale and in unison to detect and prevent threats earlier and to stop them from happening.
  • 24
    Quest IT Security Search Reviews
    IT can have a difficult time seeing the unseeable. It can be difficult to find the right data and make sense out of billions of events that are being collected and reviewed from many sources, both on-premises and in the cloud. It can make all the difference in the event that there is a security breach. IT Security Search, a Google-like IT search engine, enables IT administrators to quickly respond and analyze security incidents. The web-based interface combines disparate IT data from many Quest compliance and security solutions into one console. This makes it simpler than ever to reduce complexity when searching, analyzing, and maintaining critical IT information scattered across multiple information silos. Role-based access allows auditors, help desk staff, IT mangers and other stakeholders to access the reports they need.
  • 25
    Truxton Reviews

    Truxton

    Truxton

    $3,495 per user
    Truxton's intuitive, analyst-driven interface makes it easy to get up to date quickly without having to learn specialized code or techniques. Truxton is simple, but it doesn't mean you have to be without sophisticated tools. You'll have access to cutting-edge features such as entity filters, user-definable queries, coordinated reviews, notes and findings. The investigation dashboard shows the current status of each investigation. It displays the case number/type, name of the investigator, and media involved in the investigation. You can also access a variety of tools to help you manage, review, and export your case to other Truxton users. It would be great if multiple users could simultaneously work on the same case. You could also send a file to an expert on the subject matter for review. Without having to deal with proprietary code, you can export files to another platform. Truxton's open architecture makes it possible to import your data into other tools for verification or reporting.
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next