Best Amped Authenticate Alternatives in 2024
Find the top alternatives to Amped Authenticate currently available. Compare ratings, reviews, pricing, and features of Amped Authenticate alternatives in 2024. Slashdot lists the best Amped Authenticate alternatives on the market that offer competing products that are similar to Amped Authenticate. Sort through Amped Authenticate alternatives below to make the best choice for your needs
-
1
Graphika
Graphika
Graphika uses artificial intelligence to create the most detailed maps of social media landscapes. We develop new analytical tools and methods to help our partners navigate online networks. Our intelligence team uses a unique set of patented technologies and tools to create and apply new, rigorous analytical techniques in order to answer difficult questions regarding online conversations. Graphika's team of analysts and investigators is a leader in the detection and analysis of harmful online networks. We regularly produce public reports through our work with industry and academic partners, government agencies, and non-profits. Topics range from state-backed influence campaigns to violent conspiracy networks and targeted harassment campaigns. -
2
Storyzy
Storyzy
AI-based automated research tools make open-source research easier, faster and more effective. Storyzy's platform database is constantly updated with thousands of categorized sources, including websites, blogs, videos, social networks and video channels. These are automatically indexed, archived and added to. Users can customize and add to their own list of sources. All in 42 different languages. Granular investigations allow for the identification of clues and markers as well as hard evidence of information manipulating on websites, blogs and social media documents. Storyzy's teams are developing and designing tools to combat online information manipulation for over ten years. The combination of artificial and human intelligence was the key ingredient that allowed Storyzy to be built with the actual users. -
3
Alethea Artemis
Alethea
Artemis, a multi-channel analysis tool that uses advanced analytics and machine learning to analyze a wide range of online content including forums, social networks, and other resources, identifies and investigates disinformation online by proactively utilizing these technologies. Artemis provides unrivaled intelligence about disinformation networks. Its real-time insight allows our customers to protect their assets from potential damage and risk due to misinformation, disinformation, and social media manipulators. -
4
Logically Intelligence
Logically
Logically Intelligence uses artificial intelligent to identify and tackle harmful or manipulative content quickly and at scale. Our platform ingests data and content from social media platforms, online sources and websites. Logically Intelligence gives analysts the insights they need to detect, assess and act on emerging threats. Create a Situation Room to monitor and analyze a particular information environment using a simple keyword interface or advanced Boolean queries. Identify and analyze narratives that are emerging in a Situation Room. This includes keywords driving the narrative, related posts, and data from the original poster. You can also compare two narratives in time and measure the impact on counter-narratives. The platform will display data in all languages and allow you to add Boolean questions or keywords. -
5
NewsGuard
NewsGuard
NewsGuard, leveraging its bird's-eye view of the digital environment, extracts and catalogs top misinformation narratives that are spreading online. NewsGuard provides machine-readable data about each narrative, such as example language, links that contain the false claim, and keywords and hashtags related to it. The Misinformation Fingerprints are useful as data seeds to existing AI/Social Listening Tools to trace false claims on the internet and social media, or by human analysts for understanding mis- and deception risks. NewsGuard’s Misinformation Fingerprints™ is designed to be used by both human analysts as well as AI tools. It provides a continuously-updated view of the digital environment and a powerful tool for tracking narratives that emerge and spread online. -
6
Truepic
Truepic
All digital content has an history. Details matter, whether they are real or synthetic, edited or original. Truepic's technology empowers transparency and shared confidence in content across the Internet. Truepic's glass to glass technology records the location and editing of content and displays these details wherever you are. Truepic's secure cameras, named one of TIME Magazine's Best inventions, capture, sign, and seal critical details in every photograph or video, including date, time, location, as well as the actual pixels captured. Increase transparency about who, when, where and how content is created for your products. -
7
Blackbird.AI
Blackbird.AI
Our AI-driven platform for narrative intelligence allows organizations to understand digital threats in real-time and make strategic decisions when it counts. Risk landscapes have radically changed for all industries. Our suite of solutions delivers actionable risk intelligence to our customers and partners. New actors and techniques are influencing online audiences in ways never seen before. Listening tools alone are not sufficient. Daily risk intelligence summaries help you quickly capture narratives, enabling real-time insights to be made and empowering strategic decision making. You can fine-tune AI-generated narrative intelligence with the help of human context to improve the relevance, accuracy and strategic value of insights. Data-driven recommendations can be tailored to a variety of problem sets and personas. Save time and effort by accelerating the reporting process for intelligence professionals. -
8
Deepware
Deepware
Deepfakes will be the first real punch AI delivers to humanity. The cybersecurity industry is in a race against time to stop deepfakes from undermining the public's faith in reality. Deepfakes are a new threat to cybersecurity. The most powerful cyber-weapon ever, AI-generated synthetic media is about to be used for malicious purposes. We expect deepfakes to be used in destructive ways, primarily as phishing scams, very soon. The main limitation is that there are no legitimate voice-swapping methods, which is a greater danger than face/head swapping. -
9
ValidSoft
ValidSoft
Almost everything we do online requires passwords and security questions. It's part of everyday life. It can be frustrating to keep track of all this information. All this information is there to protect us and ensure that we have access only to our accounts. We hear about breaches of passwords all the time, but we want quick, simple login authentication that saves us money and improves our end-user experience. Voice is the most important authentication factor that will make your life easier. You deliver a simple, quick, secure, password-free login experience for your customers. You can significantly reduce the cost of password management. You comply with biometric privacy laws. The claimed identity is validated by a real-time comparison between an individual's voice and their unique voiceprint. You must ensure that people are who they claim to be. For true Omnichannel Excellence, use one model across multiple channels. -
10
Maltego
Maltego Technologies
€5000 per user per yearMaltego can be used by many users, including security professionals, forensic investigators and investigative journalists as well as researchers. You can easily gather information from disparate data sources. All information can be automatically linked and combined into one graph. Automately combine disparate data sources using point-and-click logic. Our intuitive graphical user interface allows you to enrich your data. You can detect patterns even in the largest graphs using entity weights. You can annotate your graph and then export it for further use. Maltego defaults to using our public Transform server. We have learned over the years that flexibility is important in choosing the right infrastructure for enterprise users. -
11
Originality.AI
Originality.AI
$0.01 per 100 words 10 RatingsAs a serious web publisher, your needs for an AI detection and plagiarism checking tool are unique. All existing plagiarism detection tools were created with Academia at heart. Originality.AI was developed by a team made up of content marketing and GPT-3 AI specialists. It includes features such as Team Management (no sharing your login), Auto Billing, Scan History per User, and most importantly, an AI Writing Detection Tool. All your content can be scanned and saved with information about who scan it, when it was scan, whether AI was suspected, and any plagiarism. You won't have to rely on them claiming that the content is original and plagiarism-free. It gives you and your editor complete control over your plagiarism checking with the team management function. -
12
Sensity
Sensity
Our all-in one solution to classify, analyze and verify ID Documents will help you expand internationally. Stop frauds using a multilayer AI forensic suite. Our analytics dashboard provides detailed reports on the type of fraud. Only onboard users who have faces that are consistent with the faces on the ID documents previously presented. Our solution can find and match a facial image in a database of over a million with 99.2% accuracy. Your clients do not need to perform any actions in front of the cameras with our passive liveness detection. We use four different types approaches that can analyze the document from an entirely different perspective to train your fraud team on how to spot a variety of document fraud. You can reduce the time it takes to review a document from hours to mere seconds, and you will get actionable insights that will help you evaluate the risk level of your new clients. Keep track of everything with a simple, intuitive dashboard. -
13
Intrinsic
Decoy Technologies
Create your own policies that go beyond the standard abuse categories, and enforce them within minutes. Intrinsic provides a platform to build AI agents that are designed to increase user trust. We integrate directly into your existing workflows and gradually enhance human review by automation. Automate moderation for text, images, video and reports. The system gets better with each moderation action. RBAC permissions allow you to manage review queues and escalate issues with ease. Take data-driven decision based on platform-wide health monitoring and policy performance reports. Access advanced security, AI powered analytics, and comprehensive data governance. -
14
TrustServista
TrustServista
TrustServista utilizes advanced artificial intelligence algorithms to provide content analysts, media professionals, and content distributors in-depth content analysis and verification capabilities. TrustServista uses artificial intelligence to determine the trustworthiness or news articles. The trustworthiness algorithm is based on a combination of deep content analysis, publisher profiles, sources that are mentioned or linked to, as well as different perspectives from other publishers. TrustServista provides a range of text analysis capabilities, including entity extraction, sentiment analyses, and standardized classification. Our news analytics service analyzes over 60,000 articles per week in multiple languages and provides actionable, real-time intelligence. TrustServista determines automatically the semantic similarity of documents and extracts hyperlinks from online articles. -
15
TrustLab
TrustLab
TrustLab is a future-proof regulatory compliance solution powered by AI and leading industry experts. Check that your platform is compliant: EU Digital Services Act UK Online Safety Act Australian Online Safety Act Plug-and-play user complaint system covering current and future regulatory needs such as the Digital Services Act. Compliance with regulatory requirements, including transparency reports, messages, statements of reasons, appeals and more. Liability protection for fines resulting from the moderation of user content. Monitor and measure the performance of platform moderators with certainty. Leverage TrustGraph’s AI capabilities and the industry benchmark to quantitate risk in real-time. Identify and punish networks of bad actors that promote harmful content. -
16
ZeroFox
ZeroFox
Social media and digital presence are a major part of many people's engagement strategies. Organizations spend a lot of money on them. Security teams must be able to understand and address the risks presented by digital platforms, which are the largest unsecured IT network on the planet. This 2 minute overview video will show you how ZeroFox Platform works. The ZeroFox Platform protects your brand, cyber, and physical security on social media and digital platforms. You can assess your organization's digital risk exposure on a wide range of platforms where cyberattacks occur. The ZeroFox mobile app puts the powerful protection of ZeroFox at your fingertips wherever and whenever you need. -
17
OARO Media
OARO
Artificial intelligence has made it possible to create realistically manipulated photos and videos. These are called deep fakes. OARO Media creates a permanent data trail, allowing businesses, governing authorities, and individual users to authenticate photos or videos. It is the only app that can generate reliable photos and video embedded with records of user identification, content, timestamp and GPS coordinates. Insurers place a high value on improving customer service and managing claims efficiently. Authenticating insurance claims was a laborious process that involved high staff costs. Adjusters had to visit the sites to verify the damage claims and customers couldn't easily access the adjuster’s records. -
18
Parafact
Parafact
$29 per monthParafact is a platform powered by AI that allows users to fact-check text generated by humans or AI in real-time using reliable sources. Parafact analyzes the text instantly by copying and pasting it. Citations are provided for each verified claim. This tool is perfect for a variety of writing types, including research papers and articles, blog posts and social media content. Parafact uses state-of-the art AI models to ensure accuracy and reliability in the fact-checking process. It also offers a developer friendly API that allows seamless integration of fact-checking into other applications. The platform is fully automatic, saving users time and effort when compared to manual fact checking methods. We have a plan for you, whether you're a fact-checker or a large organisation looking to verify at scale. -
19
Cognitech FiA 64
Cognitech
FiA is a software package that includes analysis tools and is designed to allow for the forensic analysis of digital images and their authentication. This comprehensive toolkit allows the user to examine the evidence and identify possible traces or inconsistencies. FiA is used for detecting forged/doctored digital image evidence. It can be used to authenticate and uncover any tampering or modification that has occurred in a doctored photo. This allows the expert to prepare all necessary reports for court. All results are based upon a forensic scientific methodology. FiA is a proven solution that has been tested over many years. Further research is underway to expand software authentication capabilities to include video authentication. FiA was created for Law Enforcement Agencies only. It is not possible to purchase this technology without completing the comprehensive training course. -
20
LiarLiar
LiarLiar
$29.99 one-time paymentSupports all your favorite tools and platforms. LiarLiar uses cutting-edge AI to analyze body language, heart rate and micro movements to detect deception. Our tool provides you with unprecedented insight into the truth when it comes to video calls or video analyses. LiarLiar is easy to set up and operate thanks to its user-friendly interface. Even those with little tech knowledge can become experts at detecting lies by clicking a button. LiarLiar is compatible with popular video call programs like Zoom, Google Meet and Skype. It can also be used to analyze videos from YouTube or local videos. Analyze any conversation at any time. We're offering lifetime beta access for just $29.99. LiarLiar is a powerful tool that you can use to expose your lies. You will also receive updates for a low price. Install LiarLiar using our simple installer on your Windows or Mac device. -
21
Medex Forensics
Medex Forensics
Medex, unlike any other software, reveals information not found in the metadata of digital video files. Investigators can now answer new questions about videos and identify additional crimes and perpetrators using previously impossible methods. Medex Forensics offers examiners the latest automated tools for digital audio authentication, source detection and provenance analysis. Medex's patented method of examining digital videos gives investigators and prosecutors a new perspective on digital video. Identify the provenance of a video, including the camera model and make used to capture it. Also identify any editing software. Triage videos extracted from mobile devices and quickly get actionable intelligence. -
22
Axon Investigate
Axon
Incorrect playback software can change video evidence and impede investigation. Axon Investigate lets you review footage in more proprietary video formats from third parties than any other product on the market. It also provides instant access to original metadata, including date, time and image numbers. Video evidence is used in more than 80% investigations. Axon Investigate improves the video investigative process dramatically, saving officers 10 hours per week through simple, fast, and repeatable workflows. Manage and organize hundreds video sources into a single project, track activities, tag relevant events and extract available video to create court-ready deliverables. Axon Investigate was developed by a team certified forensic video analysts to ensure that investigators can view original video evidence as well as share accurate copies for court. -
23
Google Fact Check Explorer
Google
The Fact Check Tools consists of two tools, Fact Check Explorer and Fact Check Markup Tool. Both tools are designed to make the work of fact checkers, journalists and researchers easier. Google does not create or endorse any of these fact-checks. If you disagree, please contact the website that published it. -
24
Buster.Ai
Buster.Ai
A verification algorithm is essential due to the proliferation of fake news. Your business is at risk if you make decisions based on false data. Be sure to check your information before making a decision. Our AI analyzes every statement in real-time, 24/7, in order to protect organizations against misinformation. Use data analysis to identify harmful, toxic and divisive content on social networks and prevent its impact on organisations. Our solution reduces the risks of identifying fake information. Businesses rely on accurate information to make important business decisions. Enter your assertion in natural language to get relevant insights. Identify misinformation on social media about your organization. Identify actors who are damaging to your investments. -
25
Bot Sentinel
Bot Sentinel
FreeBot Sentinel is designed to be as simple to use as possible, and as informative as we can. We display detailed information publicly about Twitter accounts that the platform is tracking in order to give visitors a better understanding on how nefarious Twitter accounts spread misinformation and target other Twitter accounts. We strive to be as transparent and provide as many data points for visitors as possible. Bot Sentinel, a non-partisan platform, tracks all accounts. The platform uses artificial intelligence and machine learning to classify Twitter profiles and add them to a public database that anyone can access. Our machine-learning model was trained to classify Twitter profiles using thousands of Twitter accounts and millions tweets. The system is able to classify accounts correctly with 95% accuracy. We are not using other machine learning tools that detect "bots" but instead focusing on specific behavior and activities deemed inappropriate for Twitter. -
26
Cyabra
Cyabra
Cyabra uncovers threats on social platforms to companies, products and people by exposing and reporting malicious agents, disinformation and bot networks. Cyabra integrates seamlessly into your system and offers unparalleled OSINT coverage, including Facebook, TikTok and Twitter, as well as news sites and the cybercrime underground. Cyabra provides real-time alerts, actionable insights and advanced mitigation. Protect local and national elections against foreign and domestic influences. Stop bad actors from influencing public discourse with social engineering tactics. Discover the key leaders and protests that are fueling online hate and rage. -
27
Fakespot
Mozilla
FreeFakespot will protect you from being ripped off while shopping online. Join the secure online shopping revolution to get the truth before you buy about products, reviews and sellers. Fakespot is there to protect you when you shop online, whether at home or via mobile. Fakespot’s new browser app lets you browse the open web and, when you land on sites we support, Fakespot’s features will be enabled to help you make informed purchases. Share via other browsers and shopping apps. Share to analyze functionality remains for users who are coming from our old app. Since Fakespot was founded, we have analyzed more than 9 billion product and seller ratings. Our analysis helps you to make informed decisions, so that you will love everything you purchase and never return a thing. Fakespot is always up-to-date with the latest threats, and our algorithms are constantly updated to protect you. Fakespot offers safe, secure shopping, saving you time, money and headaches. -
28
Factiverse
Factiverse
You can find reliable sources in seconds, whether you're writing your own content or checking AI-generated content. Save hours of manual research and focus on your writing. Use the most comprehensive collection manual fact-checks available since 1991 to elevate your fact-checking. Get hourly updates on certified fact-checkers worldwide in your feed. Stay on top of false stories. Keep your focus when doing research, writing or analysis. Hover over industry-specific jargon, complex terms, and other terms to get embedded explanations. Increase reader engagement and keep them on your page. -
29
Ad Observer
Ad Observer
Who pays for online advertising that targets you? Who is showing you ads based on your marital status, liberal leanings, oil industry work, or other categories? Do they say different things to different people? Install our browser plugin to send us the ads that you see on Facebook or YouTube without compromising your privacy. Ad Observer can be added to your Web Browser. It copies the ads that you see on Facebook or YouTube so that anyone can see them. You can enter demographic information to help us better understand why advertisers target you. We will never ask you for any information that can identify you. -
30
ActiveFence
ActiveFence
ActiveFence is a leading Trust and Safety provider of online platforms. It protects over three billion users daily from malicious content and behavior. ActiveFence is trusted by Trust and Safety teams across the board to protect their users from online harms such as child abuse, disinformation and hate speech, fraud and terror. Our platform is equipped with a full range of capabilities, including AI-driven harmful content detection. ActiveFence protects online platforms in over 100 different languages. This allows people to interact and thrive online safely. -
31
Reality Defender
Reality Defender
Reality Defender's proactive platform can detect deepfakes and stop them before they become a major problem. Deepfake-driven disinformation is exploding. AI-powered fraud techniques are now more accessible than ever. Reality Defender is a first-line defense against cybercrimes as attacks continue to increase. Scans user-generated content for fabricated items using API, Webhooks and Web Apps to stop deepfakes from the first day. Download PDF report cards and CSVs, or receive instant deepfake notifications via email. Our government-grade detection system, developed by the world's top AI research teams provides enterprises and entities of all sizes with intuitive protection against damaging deepfakes. -
32
Public Editor
Public Editor
We are a community of critical thinkers who review the most popular news articles on the Internet. We train ourselves to identify misinformation by completing nine different assessment tasks. Our browser extensions let everyone know which ideas are incorrect or misleading. You can also send us news articles that we haven't yet reviewed. We need your help in order to continue identifying misinformation and building trust in an shared reality. -
33
Utopia AI Moderator
Utopia
Automation with Utopia AI Moderator improves quality, speeds up publishing speed, and reduces costs. Utopia AI Moderator protects your online community from spam, fraud, cyberbullies, and other abusive content. It learns from previous publishing decisions and works in real-time with a higher level of accuracy than humans. Utopia AI Moderator can understand the context and works in any language. It is particularly adept in informal languages, slang, or dialects. Our tool improves the quality of published content. It eliminates publishing delays and provides consistent, reliable curation 24 hours a day. This allows human moderators to concentrate on moderation policy management and the most difficult cases. Utopia AI Moderator can be used in production within two weeks. It moderates 100% of your incoming material. It learns as it works to keep it current. -
34
WeVerify
WeVerify
FreeOnline disinformation and fake content has emerged as a serious danger to democracy, the economy and society. Even for experienced journalists, fact checkers, human right activists, or media literacy scholars, content verification at scale and near real-time can be a challenge. WeVerify aims to develop intelligent content verification and disinformation analyses methods and tools that involve a human in the loop. Social media and web-based content will be analyzed, contextualized, and contextualized in the context of a broader online ecosystem to expose fabricated material. This will be done through cross-modal content validation, social network analysis and micro-targeted disinformation, as well as a blockchain-based database of known fakes. -
35
Forensic Email Collector
Metaspike
$499 one-time paymentExpertly preserve email evidence without breaking the bank. Plug and play output for digital forensic investigations or eDiscovery. There are times when collecting a complete mailbox is not possible, often because of privacy concerns or time constraints. eDiscovery and digital forensics workflows, on the other hand, often require a complete collection followed by post-acquisition searches. This problem is solved creatively by Forensic email Collector. Instant in-place searches can be performed on mailboxes stored on the server prior to acquisition. Forensically, only the search results can be preserved. There is no need to label, tag, or modify the target mailbox. Attachments to emails that contain hyperlinks to cloud storage systems can cause problems in your forensic preservation. If the original acquisition is completed, the linked attachments will need to be authenticated and cannot be accessed. -
36
Amped FIVE
Amped Software
Amped FIVE has been praised for its reliability and efficiency in the workflow. Amped FIVE was developed to meet the demand for forensic image and videos enhanced using scientific principles. The software that is used today was developed by video and image analysts from around the world, ensuring that all aspects of an investigation can be completed in a single application. This all-in-one software solution, developed specifically for forensics and public safety, has 140 filters and tools to convert, enhance, analyze and present images and videos. It supports all types of image and video data from a variety of multimedia sources, including audio streams, from CCTV and DVR system, body-worn cameras and dash cameras, mobile phones, fingerprints and documents. -
37
Belkasoft Remote Acquisition
Belkasoft
Belkasoft Remote Acquisition (Belkasoft R), a new digital forensic tool, is designed to remote extract data from hard and removable drives, RAM, mobile devices, and other types. Belkasoft R is useful for cases where an incident response analyst or digital forensic investigator must quickly gather evidence and the devices are located in geographically dispersed locations. -
38
ADF Cloud Platform
ADF Solutions
$35000ADF Solutions is the leader in digital forensics and media exploitation tools. These tools can be used to analyze Android/iOS smartphones, mobile devices and computers, as well as external drives, drive images and other media storage (USB flash sticks, memory cards, etc.). ADF triage software is about speed, scalability and ease-of-use. It also provides relevant results. These tools have a proven track-record in reducing forensic backlogs, streamlining investigations, and rapid access to intelligence and digital evidence. Our customers include federal, local, and state law enforcement agencies, military, defense agencies, Office of Inspector General office, Attorneys General, and other investigative professionals around the world. -
39
Belkasoft Triage
Belkasoft
Belkasoft Triage, a digital forensic and incident response tool, is a new digital forensic tool that allows for quick analysis of live computers and partial images of important data. Belkasoft T is designed for situations where an investigator or first responder is on the scene of an incident and must quickly identify and obtain digital evidence stored on a Windows computer. In situations of urgency, the product is invaluable when it is necessary to quickly detect specific data and obtain investigative leads rather than conducting an in-depth analysis. -
40
EnCase Forensic
OpenText
The Gold Standard in Forensic Investigations, including Mobile Acquisition. Enhance investigation efficiency by releasing optical character recognition (OCR), which seamlessly extracts embedded text from scanned documents, images, and PDFs as part the evidence collection workflow. 21.2 adds social media artifact support. It also includes an enhanced workflow that allows users cross-reference different artifact types. This greatly improves evidence processing workflows. OpenText Security, formerly Guidance Software, created the digital investigation software category with EnCase Forensic back in 1998. EnCase Forensic has been the standard in criminal investigations, and SC Magazine named it the Best Computer Forensic Software for eight consecutive years. EnCase Forensic is the only solution that offers the same level in functionality, flexibility, and court acceptance. -
41
Binalyze AIR
Binalyze
Binalyze AIR, a market-leading Digital Forensics and Incident Response Platform, allows enterprises and MSSP security operations teams collect full forensic evidence at scale and speed. Our incident response capabilities, such as remote shell, timeline, and triage, help to close down DFIR investigation investigations in record time. -
42
Virtual Forensic Computing
MD5
$1000 per yearVirtual Forensic Computing (VFC) was created by us. This software is a world-famous tool that allows Digital Forensic Investigators (VFC) to view a suspect's computer in its native environment. They can also preserve crucial metadata by not turning on the original device. VFC is widely used by many law enforcement agencies around the globe. It is considered an essential tool in every Computer Forensic Investigator’s toolbox. MD5 LTD was founded in 2003 by an ex-Head of the Digital Forensics Unit at the National Crime Squad. It is a leading provider of UK Digital forensics and eDiscovery services. Our digital investigation services can be used by many organizations, including law enforcement agencies, government agencies, the legal industry, forensic accountants and insolvency practitioners. The MD5 forensic laboratory continues to examine the ever-changing digital environment in business. -
43
Velociraptor
Rapid7
With the click of (a few) buttons, collect digital forensic evidence across all your endpoints simultaneously, and with speed and accuracy. Collect endpoint events, such as file modifications, event logs and process executions. Archive events centrally indefinitely to allow historical review and analysis. Search for suspicious activity using our library of artifacts. Then customize it to meet your specific threat-hunting requirements. It was created by Digital Forensic and Incident Response professionals who needed a powerful and effective way to hunt for artifacts and track activities across fleets. Velociraptor allows you to respond more effectively to a variety of digital forensic investigations, cyber incident response investigations, and data breaches. -
44
Animetrics
Animetrics
Advanced facial recognition technology for law enforcement and forensic analysts. Convert 2D images to 3D avatars for facial feature supraimposition. FaceR Identity Management Solution is a centralized storage system and management system for advanced 3D facial identification powered by Animetrics' FaceR technology. Police officers, forensic investigators, and security personnel all have a pressing need for suspects' identities. This includes any photographic evidence that captures a suspect's face, including video surveillance cameras. ForensicaGPS is a new biometric solution by Animetrics that allows officers to identify individuals using low-resolution images or video. ForensicaGPS uses advanced facial recognition technology to speed up and improve the accuracy of criminal investigation. ForensicaGPS' accuracy lies in its ability to convert two-dimensional facial pictures into three-dimensional avatars. -
45
AssureID
Acuant
Software for Multi-Factor Identity Verification in Real Time AssureID provides fast multi-factor authentication to enhance customer experiences, increase conversion rates, and reduce fraud. Patented technology authenticates IDs using 50+ biometric and forensic tests in just seconds. It also uses the largest industry-wide document library. Acuant's library uses human-assisted machine learning to ensure the highest accuracy. AssureID eliminates manual errors and speeds up document inspection. It also reduces employee training. Solutions can be integrated into any industry environment and can read IDs from more than 196 countries as well as all 50 US states. -
46
The Respond Analyst
Respond
XDR Cybersecurity Solutions can accelerate investigations and increase analyst productivity. The Respond Analyst™, an XDR Engine automates the detection of security incidents. It transforms resource-intensive monitoring into consistent investigations. The Respond Analyst connects disparate evidence with probabilistic mathematics and integrated reasoning, determining whether events are malicious and possible actionable. The Respond Analyst enhances security operations teams by significantly reducing false positives, allowing for more time for threat hunting. The Respond Analyst lets you choose the best-of-breed controls for modernizing your sensor grid. The Respond Analyst integrates seamlessly with leading security vendors across key categories, including EDR, IPS Web Filtering and EPP, Vulnerability Scanning, Authentication and more. -
47
Mitek Mobile Verify
Mitek
Mitek's Mobile Verify® can help you create certainty even as identity fraud increases in today's digital age. It combines linked and layered automated technology with the top forensic experts around the world to quickly detect identity fraud and verify customers accurately. This increases approval rates and security. Mobile Verify®, is also flexible. It integrates easily with existing systems, delivering an intuitive and simple customer experience. Mobile Verify®, makes life easy for everyone, except fraudsters. Integrating it with your existing tech stack will allow you to onboard customers who matter more seamlessly and increase their brand loyalty and brand confidence. All this while reducing costs associated with common attacks and friction points. Ensure that the user captures a high quality image on the first attempt. Verify that the identity document is authentic and unaltered. Connect the user to the identity file to establish a trusted identity profile. -
48
Mideo CaseWorks
Mideo Systems
CaseWorks for the Lab, a DEMS application, is designed to manage and visually document case evidence within a forensic laboratory. A LIMS may not be able to handle the more complex image management requirements of agencies, particularly for comparative science applications such as latent prints, firearms/tool markings, and questioned documents. This includes auditing all image-related records including access, enhancement, and output. Caseworks for Lab unifies all departments under one platform and allows them to share information with LIMS. The configuration of our solution is designed so that the documentation and comparisons of case evidence can be transformed from a paper-based process to almost paperless. From the initial documentation of incoming evidence, to the final case notes that are submitted to LIMS. -
49
Forcepoint Insider Threat
Forcepoint
Collect behavior data from channels like the web, keyboards, file operations and email. A powerful dashboard designed by analysts for analysts allows you to explore meaningful data. With powerful analytics, you can gain insight and respond quickly to potentially harmful behaviors before they occur. Video recording and playback can help speed up the investigation and allow for attribution of intent. It is admissible as evidence in a court. Monitor a wide range of data sources and activity to identify patterns of insider risks rather than single events. Use detailed forensics in order to quickly understand intent and exonerate staff of wrongdoing. Monitoring and enforcement that are always on, highly customizable, and allow for prioritization allows you to prioritize the most risky users in order to prevent breaches from occurring. Control, monitor, and audit investigators to prevent overreach. Anonymized data can be used to eliminate biases and ensure investigation integrity. -
50
Forevid
Forevid
FreeForevid Video Analyzer allows you to record video screens for forensic analysis. Monitor the entire activity in file format, to prevent any alteration during collection and examination. Change the "frame rate", and save the recording in.avi. The bookmark option added information to a specific video frame for editing. This resulted in an efficient and faster investigation. With Forevid Forensic Video Analyzer, you can bookmark the frame in PDF format or copy it into the clipboard for editing with Image Editor. Video Encoding option converts Video into a format compatible with other video player devices. Choose the encoding settings to change the video quality while converting the file into lossless MP4, FLV, MKV and SFX player format (exe).