Filerev
Filerev is a powerful tool that helps you easily find and manage hidden files, duplicate files, large files, and oversized folders, ensuring a streamlined and clutter-free digital workspace.
Key features include advanced scanning technology that identifies the unorganized files taking up the most space and cluttering your Google Drive. Filerev enhances productivity by saving time and reducing the frustration of manual file organization. The custom filters and bulk delete tool give you complete control over finding and removing unwanted files in your account. The storage analyzer lets you browse your folders by size to see where the space is being used in your Google Drive.
Whether you're an individual, a small business, or a large enterprise, Filerev offers robust solutions tailored to your needs. Visit filerev.com to discover how Filerev can transform your Google Drive experience and boost efficiency.
Learn more
Curtain LogTrace File Activity Monitoring
In the daily work environment, companies often need to authorize their employees to access and use sensitive company data. However, most companies lack visibility into how their employees are actually utilizing this data, and whether any misuse is occurring. At the same time, companies have to meet internal audit requirements and comply with various data security regulations and policies. This creates a need for the IT department to find ways to effectively monitor and record how employees are accessing and using the company’s data resources.
Curtain LogTrace provides enterprise-wide file activity monitoring. It tracks user actions: create, copy, move, delete, rename, print, open, close, save. Includes source/destination paths and disk type. Perfect for monitoring user file activities.
Key Features:
- File log (create & delete file)
- File log (copy & move file)
- File log (print & rename file)
- App log (save, open & close file)
- Support MySQL & MS SQL
- Watermark for printout
- Central administration
- Integration with Active Directory
- Uninstall password for client
- Password management
- Admin delegation
- Self protection for the software
Learn more
SAS Law Enforcement Intelligence
Transform law enforcement and enhance public safety through a cloud-enabled structured framework designed for the effective collection, management, and analysis of intelligence data. This approach allows for rapid access to superior intelligence quality, crucial for deterring threats, fighting crime, and safeguarding national security. By streamlining investigative processes, it facilitates everything from minor crime investigations to intricate responses to major incidents. The creation of investigative workspaces promotes collaboration, adherence to regulations, and overall efficiency. With advanced interactive visualization tools and agile search functionalities, analysts and investigators can construct, gather, examine, and visualize data relevant to their cases, yielding immediate insights from the latest information available. Moreover, documenting findings becomes effortless as users can capture views of search visualizations to create comprehensive narratives through maps, timelines, networks, and other relevant content, thus delivering a holistic understanding of all information related to a particular subject while enhancing communication among stakeholders involved in the investigation.
Learn more
LLIMAGER
LLIMAGER was created to meet the need for a simple, low-cost "live" forensic image solution for Mac computers. It is capable of capturing an entire synthesized disk including the volume unallocated, as macOS views the disk with its partitions installed.
The application was designed to be easy-to-use and intuitive for digital forensics examiners at the entry level. The application uses built-in Mac utilities to provide a versatile solution that is compatible with a variety of macOS versions both old and new. This ensures the tool is functional across a wide range of system configurations and upgrades.
FEATURES INCLUDE
Powerful and fast "Live" imaging CLI-based application
Supports Intel, Apple Silicone, T2 Chips and APFS File Systems.
Full Acquisition Log
Hashed DMG images using MD5 or SHA-256
Choose between Encrypted and Decrypted DMGs to be used in commercial forensics software
Unlimited Technical Support
Learn more