Best Quest IT Security Search Alternatives in 2024

Find the top alternatives to Quest IT Security Search currently available. Compare ratings, reviews, pricing, and features of Quest IT Security Search alternatives in 2024. Slashdot lists the best Quest IT Security Search alternatives on the market that offer competing products that are similar to Quest IT Security Search. Sort through Quest IT Security Search alternatives below to make the best choice for your needs

  • 1
    Kroll Cyber Risk Reviews
    See Software
    Learn More
    Compare Both
    We are the #1 incident response provider in the world. We protect, detect, and respond to cyberattacks by combining complete response capabilities and frontline threat information from over 3000 incidents per year with end-to-end expertise. Contact us immediately via our 24-hour cyber incident hotlines. Kroll's Cyber Risk specialists can help you tackle the threats of today and tomorrow. Kroll's protection solutions, detection and response are enriched with frontline threat intelligence from 3000+ incident cases each year. It is important to take proactive measures to protect your organization, as the attack surface is constantly increasing in scope and complexity. Enter Kroll's Threat Lifecycle Management. Our end-to-end solutions for cyber risk help uncover vulnerabilities, validate the effectiveness your defenses, update controls, fine-tune detectors and confidently respond any threat.
  • 2
    Aid4Mail Reviews
    Top Pick
    Aid4Mail is a leading email processing tool from Switzerland. It comes in three editions: 1. Use Converter to collect and convert emails accurately, fast, and reliably. It supports all popular mail services (e.g. Office 365, Gmail, Yahoo! Mail) and mailbox file formats (e.g. PST, OST, OLM, mbox). It’s also a popular solution for preparing mail ingestion into archival, eDiscovery and forensics platforms. 2. Investigator adds powerful search queries based on Gmail and Microsoft 365 syntax, native pre-acquisition filters and Python scripting. Use its forensic features to recover deleted and hidden email, and process corrupt or unknown mail formats. 3. Enterprise adds support for Google Vault, Mimecast, and Proofpoint exports. Use it to migrate your company mail to live accounts (IMAP, Microsoft 365, Gmail). You can integrate its CLI seamlessly with your own tools. Enterprise offers flexible licensing options including installation on a server or on a shareable flash drive. Aid4Mail is used by Fortune 500 companies, government agencies and legal professionals around the world.
  • 3
    Magnet AXIOM Cyber Reviews
    Magnet Forensics' solutions are used by large and small enterprises to quickly close cases. They use powerful analytics to surface intelligence and insights. They can also leverage automation and the cloud to reduce downtime, and enable remote collaboration at scale. Magnet Forensics is used by some of the largest corporations in the world to investigate IP theft, fraud and employee misconduct.
  • 4
    FTK Forensic Toolkit Reviews
    FTK® is a purpose-built solution that works with mobile devices and e-discovery technology. It allows you to quickly find relevant evidence, perform faster searches, and dramatically improve your analysis speed. FTK is powerful and proven. FTK indexes and processes data immediately, eliminating the need to wait for searches to complete. FTK can help you get there faster and better than any other data source, no matter how many you have or how much data you need to cull. FTK uses distributed processing and is the only forensics solution to fully leverage multi-thread/multi-core computers. FTK makes use of all of its hardware resources. This allows investigators to find relevant evidence more quickly than other forensics tools. Indexing is done upfront, so searching and filtering are faster than any other solution.
  • 5
    SentinelOne Singularity Reviews

    SentinelOne Singularity

    SentinelOne

    $45 per user per year
    One intelligent platform. Unprecedented speeds Infinite scale. Singularity™, enables unrestricted visibility, industry-leading detection and autonomous response. Discover the power of AI powered enterprise-wide security. Singularity is used by the world's largest enterprises to detect, prevent, and respond to cyberattacks at machine speed, greater scale, with higher accuracy, across endpoints, cloud, and identities. SentinelOne's platform offers cutting-edge security by providing protection against malware, scripts, and exploits. SentinelOne's cloud-based platform is innovative, compliant with industry standards and high-performance, whether you are using Windows, Mac, or Linux. The platform is prepared for any threat thanks to constant updates, threat hunting and behavior AI.
  • 6
    CyFIR Investigator Reviews
    CyFIR digital security solutions and forensic analysis solutions offer unparalleled endpoint visibility, scaleability, and speed of resolution. Cyber resilient organizations are often spared from any damage caused by a breach. CyFIR cyber risk solutions detect, analyze, and solve active or potential threats 31x quicker than traditional EDR tools. Data breaches are becoming more frequent and more dangerous in today's post-breach world. Attack surfaces are expanding beyond the organization's walls to include thousands of connected devices and computer endspoints located in remote facilities, cloud and SaaS provider locations, and other locations.
  • 7
    Change Auditor Reviews
    Access logging and change reporting for Active Directory (AD), and enterprise applications can be cumbersome, time-consuming, and sometimes impossible to use native IT auditing tools. This can lead to data breaches and insider threats that go unnoticed without proper protections. Change Auditor is available. Change Auditor provides complete, real-time IT auditing and in-depth forensics as well as security threat monitoring. It tracks all administrator, key configuration, user, and administrator changes for Microsoft Active Directory. Change Auditor tracks user activity across all enterprises, including logons, authentications, and other key services to improve threat detection and security monitoring. One central console eliminates the complexity and need for multiple IT audit solutions.
  • 8
    SmartEvent Reviews

    SmartEvent

    Check Point Software Technologies

    SmartEvent event management gives you full threat visibility and a single view of security risks. You can take control of the security event and manage compliance and reporting. You can respond immediately to security incidents and gain real insights from your network. SmartEvent gives you a single view of security risks. Take control of your security and learn about trends. You can respond immediately to security incidents and gain real insights from your network. You are always up-to-date with the most recent security management. You can seamlessly add more gateways with on-demand expansion. Your environments are more secure, manageable, and compliant with zero maintenance.
  • 9
    Falcon Forensics Reviews
    Falcon Forensics provides comprehensive data collection and triage analysis during investigations. Forensic security can often require lengthy searches using multiple tools. Reduce the time it takes to collect and analyze data. Incident responders can respond quicker to investigations, conduct compromise assessment and monitor with Falcon Forensics. Analysts can quickly search large amounts of data using pre-built dashboards, easy searches, and view data capabilities. Falcon Forensics automates data collection, and provides detailed information about an incident. Responders can access full threat context without long queries or full disk images. This provides incident responders with a single solution that allows them to analyze large amounts of data in real-time and historical to find vital information that can be used to triage an emergency.
  • 10
    Cyber Triage Reviews
    Forensics to Respond to Incidents Fast and Affordable Automated incident response software allows for quick, thorough, and simple intrusion investigations. An alert is generated by SIEM or IDS. SOAR is used to initiate an endpoint investigation. Cyber Triage is used to collect data at the endpoint. Cyber Triage data is used by analysts to locate evidence and make decisions. The manual incident response process is slow and leaves the entire organization vulnerable to the intruder. Cyber Triage automates every step of the endpoint investigation process. This ensures high-quality remediation speed. Cyber threats change constantly, so manual incident response can be inconsistent or incomplete. Cyber Triage is always up-to-date with the latest threat intelligence and scours every corner of compromised endpoints. Cyber Triage's forensic tools can be confusing and lack features that are necessary to detect intrusions. Cyber Triage's intuitive interface makes it easy for junior staff to analyze data, and create reports.
  • 11
    Cado Response Reviews
    Responding quickly can reduce the legal and financial risks associated with security breaches. Cado Response automatically raises business risks and issues to an analyst. This allows them to escalate quickly to management and ensure that you meet the mandatory breach notification deadlines. Our patent-pending, cloud-based response platform helps you to focus on the most important things. Your analysts can use our platform to identify the root cause of security incidents. Cado Response provides detailed detection for malicious files, suspicious events, PII, and financial information. To speed up analysis, every file and log you capture on disk is indexed and inspected. Analysts of all levels can use the human-readable timeline to help them pivot faster and dig deeper. Cloud systems disappear quickly. Automated data collection makes it possible to protect incident data before it is lost.
  • 12
    ProDiscover Reviews
    The ProDiscover forensics suite covers a wide range cybercrime scenarios that are encountered by law enforcement officers and corporate internal security investigators. ProDiscover is used extensively in Computer Forensics and Incident Response. The product suite also includes tools for electronic discovery and diagnostics. ProDiscover is a tool that helps you quickly find files and data. Dashboards, timeline views, and wizards are all useful in quickly locating vital information. Investigators have access to a variety of tools and integrated viewers that allow them to examine the evidence disks and extract relevant artifacts. ProDiscover offers speed, accuracy, and ease-of-use at a reasonable price. ProDiscover was launched in 2001. It has a rich history. ProDiscover was the first product to support remote forensic capabilities.
  • 13
    4n6 DBX Forensics Wizard Reviews
    DBX Forensics Software allows investigators to examine and analyze DBX files in detail without Outlook Express. DBX File Forensics Software allows you to extract DBX data into several popular file formats, and email services. The software allows you to preview DBX files in four different modes: Content (including message headers), Attributes (including attributes), and Hexadecimal View. The software GUI provides two modules to explore DBX files: Folder Selection, and File Selection. Select File allows you search a single DBX file, while Select Folder lets you search a folder containing many DBX files. This DBX Forensics Software allows you to save evidence from DBX Files in multiple destinations, such as email files (DBX can be preserved in PST files, EML files, and MBOX), document files (DBX can be preserved in PDFs and HTML text), and emails. It helps in extracting, preserving and converting.
  • 14
    Xplico Reviews
    Xplico can be found in the following distributions of digital forensics or penetration testing: Kali Linix (BackTrack, DEFT), Security Onion (Matriux), Security Onion (BackBox), CERT Forensics Tools Pentoo, CERT-Toolkit, DEFT, Security Onion and Security Onion). Multiple users can simultaneously access Xplico. Each user can manage one or several Cases. The UI is a Web User Interface. Its backend DB can either be SQLite or MySQL. Xplico can also be used as a Cloud Network Forensic Analysis tool. Xplico's goal is to extract from internet traffic the applications data. Xplico can extract each email (POP and SMTP protocols), each HTTP content, each VoIP call (SIP), FTP and TFTP) from a pcap. Xplico doesn't perform network protocol analysis. Xplico (an open-source Network Forensic Analysis Tool, NFAT) is a network protocol analyzer. Each data reassembled with Xplico is associated with an XML file which uniquely identifies the flows as well as the pcap containing that data.
  • 15
    Belkasoft Triage Reviews
    Belkasoft Triage, a digital forensic and incident response tool, is a new digital forensic tool that allows for quick analysis of live computers and partial images of important data. Belkasoft T is designed for situations where an investigator or first responder is on the scene of an incident and must quickly identify and obtain digital evidence stored on a Windows computer. In situations of urgency, the product is invaluable when it is necessary to quickly detect specific data and obtain investigative leads rather than conducting an in-depth analysis.
  • 16
    OSForensics Reviews

    OSForensics

    PassMark Software

    $799 per user per year
    It's faster and easier than ever to extract forensic data from computers. Find everything hidden in a computer. High performance file searching and indexing make it easier to find the right data faster. Quickly and automatically extract passwords, decrypt files, and recover deleted files from Windows, Mac, and Linux file systems. Our hash matching and drive-signature analysis tools can help you identify evidence and suspicious activity. You can automatically create a timeline of user activity and identify and analyze all files. 360deg Case Management Solution. OSF's new reporting tools make it easy to manage your entire digital investigation. You can create custom reports, add narratives, and attach other tools' reports to your OSF report.
  • 17
    Quin-C Reviews
    AccessData®, a digital forensics and legal review company, is reinventing digital forensics and law review. It helps you find critical evidence faster, make meaningful connections across data, and build stronger cases. AccessData's Quin-C™ technology is a revolutionary tool that empowers forensic and legal teams of all levels to conduct more precise, advanced investigations and close them faster than ever. Quin-C integrates seamlessly with AccessData solutions that you already trust and know. This gives you full control over how you collect, review, analyze, and report on key pieces. Quin-C is feature-rich and simple to use. It can be used to increase the output of IT, legal, and forensic teams. Quin-C, when combined with AccessData core products is the most efficient and scalable solution available today. Quin-C dramatically increases efficiency and throughput by incorporating next-generation features that guide future and current investigations.
  • 18
    TIBCO LogLogic Reviews
    TIBCO LogLogic®, the industry's premier enterprise-class, end-to–end log management solution, is available. LogLogic log management solutions allow IT organizations to analyze and archive network log data in order to comply with legal protection, support network security remediation and improve network performance. Log data and machine log data can contain critical information. Your system administrators will find it easier to analyze data, perform root cause analysis, manage alerts, and visualize using dashboards. Learn and share about TIBCO LogLogic®. Find help articles and how-to's to jump-start your LogLogic®.
  • 19
    Parrot OS Reviews
    Parrot is a global community of security specialists and developers that works together to create a common framework of tools to make their jobs easier, more reliable, and more secure. Parrot OS, Parrot Security's flagship product, is a GNU/Linux distribution that is based on Debian and designed with Security and Privacy as its primary focus. It provides a portable lab for all types of cyber security operations. This includes reverse engineering, pentesting, digital forensics, and reverse engineering. However, it also contains everything you need to create your own software. It is constantly updated and has many sandboxing and hardening options. You have complete control over everything. You can download the system, share it with anyone, and even read the source code. You can also make any changes you wish. This system was created to respect your freedom and will continue to be so.
  • 20
    AD Enterprise Reviews
    Digital forensics teams today face many challenges in an environment that is flooded with data. AD Enterprise gives you deep insight into live data at the endpoint. This allows you to conduct more targeted, faster enterprise-wide compliance, HR, and post-breach investigations using a single, robust solution. AD Enterprise allows you to respond quickly, remotely, and covertly, while still maintaining chain of custody. It also facilitates forensic investigations and post breach analysis, without interrupting business operations. You can view live data at the endpoint and filter on any attributes to select the data that is relevant to your investigation. This saves time and money. Remote Enterprise Agent can be deployed to multiple locations to perform endpoint collection. It supports Windows, Mac, Linux, and many other operating systems.
  • 21
    Binalyze AIR Reviews
    Binalyze AIR, a market-leading Digital Forensics and Incident Response Platform, allows enterprises and MSSP security operations teams collect full forensic evidence at scale and speed. Our incident response capabilities, such as remote shell, timeline, and triage, help to close down DFIR investigation investigations in record time.
  • 22
    EnCase Forensic Reviews
    The Gold Standard in Forensic Investigations, including Mobile Acquisition. Enhance investigation efficiency by releasing optical character recognition (OCR), which seamlessly extracts embedded text from scanned documents, images, and PDFs as part the evidence collection workflow. 21.2 adds social media artifact support. It also includes an enhanced workflow that allows users cross-reference different artifact types. This greatly improves evidence processing workflows. OpenText Security, formerly Guidance Software, created the digital investigation software category with EnCase Forensic back in 1998. EnCase Forensic has been the standard in criminal investigations, and SC Magazine named it the Best Computer Forensic Software for eight consecutive years. EnCase Forensic is the only solution that offers the same level in functionality, flexibility, and court acceptance.
  • 23
    Belkasoft X Reviews
    Belkasoft X Forensic is a flagship product from Belkasoft that can be used for computer, mobile and cloud forensics. It allows you to analyze and acquire a wide variety of mobile and computer devices. You can also perform various analytical tasks, run case-wide searches and bookmark artifacts. Belkasoft X Forensic is a forensically sound software that collects, examines and analyzes digital evidence from a variety of sources, including computers, mobile devices, memory, cars, drones and cloud services. Use a portable Evidence Reader to share case details with colleagues. Belkasoft X Forensic is ready to use and can be easily incorporated into customer workflows. The software interface is so easy to use that you can begin working on your cases immediately after Belkasoft X Forensic's deployment.
  • 24
    Belkasoft Remote Acquisition Reviews
    Belkasoft Remote Acquisition (Belkasoft R), a new digital forensic tool, is designed to remote extract data from hard and removable drives, RAM, mobile devices, and other types. Belkasoft R is useful for cases where an incident response analyst or digital forensic investigator must quickly gather evidence and the devices are located in geographically dispersed locations.
  • 25
    4n6 Outlook Forensics Wizard Reviews
    4n6 Outlook Forensics Wizard provides the fastest, most reliable and easiest-to-use software for opening and analyzing Outlook email data files. Forensics investigator is an application designed to collect evidence directly from Outlook data files. This advanced Outlook Forensics Software allows you to view Outlook data files in different modes. This software is easy to use and will not cause any problems. The app offers a number of premium features: 1. Open, view and analyze an unlimited number of Outlook Data Files. 2. No need to install Outlook to analyze email data. 3. Outlook Forensics wizard is completely free of any type or risk. 4. Supports all versions of Outlook, including Outlook 2019. 5. Use multiple methods to analyze Outlook email data.
  • 26
    Trellix Malware Analysis Reviews
    Malware analysis is an important part in preventing and detecting future attacks. Cyber security experts can use malware analysis tools to analyze the attack lifecycle and extract important forensic details that will enhance their threat intelligence. The AX series products for malware analysis provide a secure environment in which to test, replay and characterize advanced malicious activities. Malware Analysis shows the entire cyber attack lifecycle, starting with the initial exploit and malware execution path and ending at callback destinations and subsequent binary download attempts. This information will help you to plan future prevention strategies. Stop attacks spreading using auto-generated local attack profile, which can be instantly shared throughout the Trellix ecosystem. A simple interface allows you to load suspicious files and file sets.
  • 27
    E3:Universal Reviews
    Top Pick
    Do not get lost in unmanageable tools. The E3 Platform allows you to quickly process all types of digital evidence with an easy interface, efficient engines, and an effective workflow. E3:UNIVERSAL version is designed to handle all data types, including hard drive data, smartphones and IoT data. No more need to adjust your tool according to the type of digital data that you have. The E3 Forensic Platform seamlessly integrates a wide range of evidence into one interface. It allows you to search, analyze, review, and report on digital data from all digital sources. Computer forensics is focused on bits and bytes in a file system. This can contain valuable data that could be crucial to your investigation. The E3 Forensic Platform can be used to break down data from old FAT file systems to newer file systems such as Xboxes.
  • 28
    Qintel CrossLink Reviews
    CrossLink's first users are greeted with the words "Know more" when they open it. This ethos powers CrossLink. How can we help everyone, whether they are an investigator, a SOC analyst, or an incident responder, tell better stories about their data? Search results from six verticals of actor-centric and network data quickly provide key information that can easily be assembled and shared within an organization. CrossLink was created by an experienced team of analysts with decades of experience in investigating a wide range of threats. Data verticals include a vast array of information about actors, communications, historical Internet registration records and IP reputation. Passive DNS telemetry is also available to jump-start investigations into incidents and actors. CrossLink allows users to create alerts, lightweight management functions and shareable case folders.
  • 29
    Imperva Attack Analytics Reviews
    Imperva Analytics detects non-compliant, risky or malicious data access behavior across all your databases, enterprise-wide. Employees are often responsible for security incidents. Human error can lead to compromised accounts that are able to bypass access controls and encryption. Imperva automatically detects data access behavior, whether it is accidental, bad practice, or maliciously malicious. Anomaly-based analytics drown teams with alerts. How can you speed up remediation and ensure that every security incident is worth investigating? Imperva Analytics gives you visibility into a wide range of risks, from accidental exposures to persistent exploits that evade detection. This allows you to see what's happening and take action before it's too late. Imperva Data Risk Analytics significantly reduced the number of security alerts, sped up incident resolution and increased staff effectiveness by spotting critical information access issues.
  • 30
    SalvationDATA Reviews

    SalvationDATA

    SalvationDATA Technology

    Digital Forensic Lab Solution by SalvationDATA is the most sophisticated Lab Solution for many industries, including Law-Enforcement and IT & Finance Enterprises, as well as other companies that require Intelligent Work Cooperation. It includes advanced software such as Video Forensics and Mobile Forensics and Data Recovery and Database Forensics. Additionally, it has been used worldwide by Digital Forensics and eDiscovery for law enforcement and intelligence agencies. Your organization's situation can be improved with the help of advanced digital forensic laboratory solutions.
  • 31
    MailArchiva Reviews

    MailArchiva

    Stimulus Software

    $34.56 / user
    MailArchiva is an enterprise-grade email archiving, ediscovery, and compliance solution. MailArchiva has been used in some of the most challenging IT environments around the globe since 2006. MailArchiva is a server that makes it easy to retrieve and store long-term email data. It is ideal for companies who need to comply with e-Discovery records requests quickly and accurately. MailArchiva offers tight integration (including full calendar, contact & file synchronization) with a wide range of mail services including MS Exchange, Office 365, Microsoft 365 (Microsoft 365), and Google Suite. MailArchiva has many benefits. It reduces time to find information and fulfill discovery record requests. It also ensures that emails are preserved over the long-term. It also helps employees collaborate effectively. Sarbanes Oxley Act), which reduces storage costs up to 60%.
  • 32
    X-Ways Forensics Reviews
    X-Ways Forensics, our flagship product, is an advanced work environment designed for computer forensic examiners. Runs under Windows XP/2003/Vista/2008/7/8/8.1/2012/10/2016, 32 Bit/64 Bit, standard/PE/FE. Windows FE is described here. X-Ways Forensics runs faster than its competitors and is therefore more efficient after a while. It also finds deleted files and searches hits that competitors miss. X-Ways Forensics can be used on any Windows system from a USB stick. It takes only a few minutes to download and install (not GB). X-Ways Forensics uses the WinHex hex editor and disk editor as part of an efficient workflow model.
  • 33
    Phonexia Voice Inspector Reviews
    A speaker recognition solution specifically designed for forensic professionals and powered exclusively by state-of the-art deep neural network technology enables you to perform fast and accurate language-independent forensic vocal analysis. An advanced speaker identification tool automatically analyzes the subject's voice and supports your forensic expert with accurate, impartial voice analysis. Phonexia Voice Inspector is able to identify a speaker in recordings of any language. An automatically generated report that contains all the details necessary to support the claim will allow you to present the results of your forensic vocal analysis to a court. Phonexia Voice Inspector is a unique tool that provides police officers and forensic specialists with a highly accurate speaker recognition system to support criminal investigations and provide evidence in court.
  • 34
    Autopsy Reviews
    Autopsy®, the leading open-source digital forensics platform, is available to all users. Autopsy was built by Basis Technology and features the core features of commercial forensic tools. It is fast, thorough, efficient, and adapts to your needs. Autopsy is used by thousands of corporate cyber investigators and law enforcement personnel around the globe. Autopsy®, a digital forensics platform, is a graphical interface to The Sleuth Kit® and other digital tools. It is used by law enforcement and military personnel as well as corporate examiners to investigate what happened to a computer. It can also be used to recover photos from your camera’s memory card. Everyone wants immediate results. Autopsy performs background tasks using multiple cores simultaneously and gives you results as soon as they're found. Although it may take hours to search the entire drive, you will be able to see in minutes if your keywords have been found in the user’s home folder. For more information, see the fast results page.
  • 35
    ADF Cloud Platform Reviews
    ADF Solutions is the leader in digital forensics and media exploitation tools. These tools can be used to analyze Android/iOS smartphones, mobile devices and computers, as well as external drives, drive images and other media storage (USB flash sticks, memory cards, etc.). ADF triage software is about speed, scalability and ease-of-use. It also provides relevant results. These tools have a proven track-record in reducing forensic backlogs, streamlining investigations, and rapid access to intelligence and digital evidence. Our customers include federal, local, and state law enforcement agencies, military, defense agencies, Office of Inspector General office, Attorneys General, and other investigative professionals around the world.
  • 36
    Trellix Endpoint Forensics Reviews
    State-of-the-art signatureless detection and protection against advanced threats, including zero days, is what you can expect. Combine heuristics with code analysis, statistical analysis, machine learning, and emulation in one advanced sandboxing system. Frontline intelligence from the frontlines of the most serious breaches in the world can help you improve detection efficiency. High-fidelity alerts that trigger when it matters most are available to you, thereby saving time and resources. Trellix's top security professionals can help you increase threat awareness. Reduce alert volume and fatigue to improve analyst efficiency. You can choose from a variety of deployment options, including hybrid, in-line, out of band, hybrid, public, private, and virtual offerings. Integrate Dynamic Threat Intelligence and Intrusion Prevention System (IPS) to consolidate your network security technology stack.
  • 37
    Passware Kit Reviews

    Passware Kit

    Passware

    $1,195 one-time payment
    Passware Kit Forensic, an encrypted electronic evidence discovery tool that reports and decrypts all password protected items on a computer, is complete. The software can recognize over 340 file types and works in batch mode to recover passwords. The software analyzes live memory images and hibernation file types and extracts encryption keys for hard drives and passwords for Windows & Mac accounts. Passware Bootable memory imager is able to acquire the memory of Windows, Linux and Mac computers. After stopping the password recovery process, navigation issues can be resolved. Instant encryption of the most recent VeraCrypt versions by memory analysis. Accelerated password recovery using multiple computers, NVIDIA or AMD GPUs, as well as Rainbow Tables. Passware Kit Forensic Mac offers access to APFS disks via Mac computers equipped with Apple T2 chips.
  • 38
    Cognitech VideoActive Reviews
    VideoActive®, 64 is part of the Tri-Suite64 package. It is the first Real-Time forensic processing software. The Cognitech®, U.S. Patented software has the only fully automatic Real-Time Universal De-Multiplexing capability. It also includes Real-Time Track & cover, lidar crime scene reconstruction, and analysis. Real-Time Universal DVR Capture, Patented lossless video capture with encoding that doubles the video storage and a Video Search. cars and people. Cognitech VideoActive's modular design lets the end-user choose from a pre-defined configuration, or a user-definable signal processing chain. VideoActive®, modules can be combined to create a user-definable processing pipeline from either live sources or locally stored data, all in real time. Completely rewritten software code for 64-bit software architecture. This allows larger files such as 4K or 8K video to open, play, and save.
  • 39
    CloudNine Reviews

    CloudNine

    CloudNine Discovery

    $35.00/month
    CloudNine, a cloud-based eDiscovery platform, streamlines the process of litigation discovery, audits and investigations. Users can review, upload and create documents from a central location. CloudNine's comprehensive range of professional services, including computer forensics, managed reviews, online hosting, information governance, litigation support and project management, dramatically reduces the overall cost of eDiscovery processing. CloudNine's self service eDiscovery software can help law firms and corporations save time and money.
  • 40
    Omnis Cyber Investigator Reviews
    Omnis™, Cyber Investigator is an enterprise-wide network risk and threat investigation platform that allows security teams to quickly detect, validate, investigate, and respond to cyber threats. An analytics system that integrates with popular Security Information and Event Management platforms (SIEM) helps to reduce cyberthreats. Omnis Cyber Investigator's cloud first approach helps companies manage risks across increasingly complex digital infrastructures that have been affected by application cloud migrations to environments like Amazon AWS. Omnis Cyber Investigator's agentless, packet access can be combined with AWS-resident virtual instrumentsation to give enterprise users seamless access to AWS. Your cyber security team will be more productive with guided or unguided investigations. Cyber threat security is possible with visibility across both physical and hybrid-cloud infrastructure.
  • 41
    Cognitech Video Investigator Reviews
    Video Investigator®, 64 is part of the Tri-Suite64 software suite. It can process still images and video files alike, including improving CCTV footage. There are many ways to enhance video and images in both scenarios. Video Investigator®, 64 is a powerful video- and image enhancement software package. Video Investigator is the only software that offers such a wide range of features and filters to enhance video and images. All other image enhancement, video deblurring, and video resolution enhancement software are available in one package. You can also get additional features. Video Investigator is the best forensic enhancement software.
  • 42
    Cellebrite Reviews
    All the functionality you need for in-depth analysis. Investigators can easily locate Internet History, Downloads and Locations with advanced filtering and AI media categorization. Get registry artifacts such as jump list, Windows 10 timeline activity and shellbags, SRUM and more from Windows Memory. Windows Volume Shadow Copies allows you to review device history. Review device history from Windows Volume Shadow Copies. Display and search Spotlight metadata, KnowledgeC data, and Time Machine backups. Also, review network connections, recent documents and user activity. Data can be imported into Cellebrite Pathfinder and Berla, APOLLO, and ICAC tools like Project Vic and PhotoDNA. Use customized reporting capabilities to share your case findings with other stakeholders. This workstation is designed to handle the most complex datasets in digital intelligence and eDiscovery.
  • 43
    BloxOne Threat Defense Reviews
    BloxOne Threat Defense maximizes brand security by working with existing defenses to protect your network. It also automatically extends security to your digital imperatives including SD-WAN and IoT. It powers security orchestration automation and response (SOAR), which reduces time to investigate and respond to cyberthreats. It also optimizes security ecosystem performance and lowers total cost of enterprise threat defense. This solution transforms the core network services that you rely upon to run your business into your most valuable security asset. These services include DNS, DHCP, and IP address management (DDI) which play a central part in all IP-based communications. Infoblox makes them the common denominator, allowing your security stack to work together at Internet scale and in unison to detect and prevent threats earlier and to stop them from happening.
  • 44
    IBM Security QRadar SIEM Reviews
    The market-leading SIEM is built to outpace your adversary in terms of speed, scale, and accuracy SOC analysts' roles are more important than ever as digital threats grow and cyber adversaries become more sophisticated. QRadar SIEM goes beyond threat detection and reaction to help security teams face today’s threats proactively. It does this with advanced AI, powerful intelligence and access to cutting edge content. IBM has a SIEM that will meet your needs, whether you are looking for a cloud-native solution with hybrid scale and speed, or a solution that complements your on-premises architecture. IBM's enterprise-grade AI is designed to increase the efficiency and expertise for every security team. With QRadar SIEM analysts can reduce repetitive tasks such as case creation and risk priority to focus on critical investigations and remediation efforts.
  • 45
    Barracuda Forensics and Incident Response Reviews
    During this time, threats can spread freely throughout the network, causing increasing damage and increasing costs. With powerful delivered-email search, you can quickly delete all inboxes and respond to attacks. Based on analysis of previously sent email, identify anomalies that could indicate threats. To identify your most vulnerable users and block malicious actors from sending you future email, use intelligence from previous threat responses. Email-borne attacks can bypass security and reach your users' inboxes. You need to respond quickly to stop damage and limit the spread of the attack. It is inefficient and time-consuming to respond to attacks manually, which can lead to threats spreading and increased damages.
  • 46
    ISEEK Reviews
    ISEEK runs entirely in memory and is the embodiment of a patent process. It is an automated tool that can run concurrently on any number of computers. It operates invisibly according to an encrypted set of instructions. The results of ISEEK's processing can be encrypted and sent to a specified location in the set instructions. This location can be a local disk, network share, or cloud storage. You can also review and process the contents from encrypted results containers. Once ISEEK has been used in identifying the required data and reducing the volume for further review, it allows multiple encrypted result containers to have their contents extracted into a variety of formats (with optional XML meta-data) for ingesting with a review tool. These formats include generic load files as well as a Relativity-specific loading file.
  • 47
    EchoMark Reviews

    EchoMark

    EchoMark

    $ 19 per month
    Collaboration and communication meet privacy and security. Other companies try to prevent data leakage by limiting information flow, but we use invisible personalized watersmarks in emails and documents to allow seamless sharing while also being easily traceable. EchoMark's invisible solution allows you to track down the source of information, whether it is via email, photo, or printout. The use of advanced features such as computer vision detection and natural language versioning helps to ensure successful tracking. EchoMark will watermark your documents and emails automatically once you have set up the parameters. Upload the original document if you suspect that a leak occurred or have spotted a document on the internet. EchoMark uses computer vision to compare each marked copy with the leaked fragment.
  • 48
    LLIMAGER Reviews

    LLIMAGER

    e-Forensics Inc

    $425
    LLIMAGER was created to meet the need for a simple, low-cost "live" forensic image solution for Mac computers. It is capable of capturing an entire synthesized disk including the volume unallocated, as macOS views the disk with its partitions installed. The application was designed to be easy-to-use and intuitive for digital forensics examiners at the entry level. The application uses built-in Mac utilities to provide a versatile solution that is compatible with a variety of macOS versions both old and new. This ensures the tool is functional across a wide range of system configurations and upgrades. FEATURES INCLUDE Powerful and fast "Live" imaging CLI-based application Supports Intel, Apple Silicone, T2 Chips and APFS File Systems. Full Acquisition Log Hashed DMG images using MD5 or SHA-256 Choose between Encrypted and Decrypted DMGs to be used in commercial forensics software Unlimited Technical Support
  • 49
    DomainTools Reviews
    Connect indicators from your network to nearly every active domain or IP address on the Internet. This data can be used to inform risk assessments, profile attackers, guide online fraudulent investigations, and map cyber activity to the attacker infrastructure. Get the information you need to make an informed decision about the threat level to your organization. DomainTools Iris, a proprietary threat intelligence platform and investigation platform, combines enterprise-grade domain-based and DNS-based intelligence with a simple web interface.
  • 50
    Cognitech FiA 64 Reviews
    FiA is a software package that includes analysis tools and is designed to allow for the forensic analysis of digital images and their authentication. This comprehensive toolkit allows the user to examine the evidence and identify possible traces or inconsistencies. FiA is used for detecting forged/doctored digital image evidence. It can be used to authenticate and uncover any tampering or modification that has occurred in a doctored photo. This allows the expert to prepare all necessary reports for court. All results are based upon a forensic scientific methodology. FiA is a proven solution that has been tested over many years. Further research is underway to expand software authentication capabilities to include video authentication. FiA was created for Law Enforcement Agencies only. It is not possible to purchase this technology without completing the comprehensive training course.