Introducing G2.ai, the future of software buying.Try now

Best Digital Forensics Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Digital forensics software is used to investigate and examine IT systems after security incidents or for security-related preventive maintenance. These tools help businesses perform in-depth analysis of IT systems to identify the cause of security incidents, outline vulnerabilities, and assist security teams in facilitating incident response processes. These tools aggregate security information from hardware, network logs, and files to present security professionals with a full picture of the likely causes of security incidents. From there, many tools identify the steps necessary to remediate the vulnerability and update policies and configurations to prevent the situation from arising again.

Companies use these tools after security incidents to identify the cause and root out any flaws or bugs that would allow a repeat scenario. They also use these tools to investigate systems, networks, and software to identify risks and remediate them before an incident occurs. Many of the tools in this category align with incident response software; however, those tools do not have the same in-depth investigative functionality and typically focus more on immediate remediation than granular investigation and preventive maintenance.

To qualify for inclusion in the Digital Forensics category, a product must:

Perform file, internet, email, memory, and hardware security analysis
Index aggregated security information for analysis
Outline and/or automate security investigation workflows
Produce investigative reports outlining security vulnerabilities

Best Digital Forensics Software At A Glance

Highest Performer:
Easiest to Use:
Best Free Software:
Show LessShow More
Easiest to Use:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
52 Listings in Digital Forensics Available
(474)4.3 out of 5
3rd Easiest To Use in Digital Forensics software
View top Consulting Services for Palo Alto Cortex XSIAM
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Palo Alto Cortex XSIAM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    49
    Threat Detection
    38
    Integrations
    29
    Cybersecurity
    26
    Easy Integrations
    25
    Cons
    Expensive
    27
    Difficult Learning
    17
    Integration Issues
    16
    Complexity
    13
    UX Improvement
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Cortex XSIAM features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 8.9
    8.7
    Continuous Analysis
    Average: 8.1
    8.8
    Incident Alerts
    Average: 8.1
    8.6
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,221 employees on LinkedIn®
    Ownership
    NYSE: PANW
Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 29% Mid-Market
Palo Alto Cortex XSIAM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
49
Threat Detection
38
Integrations
29
Cybersecurity
26
Easy Integrations
25
Cons
Expensive
27
Difficult Learning
17
Integration Issues
16
Complexity
13
UX Improvement
12
Palo Alto Cortex XSIAM features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 8.9
8.7
Continuous Analysis
Average: 8.1
8.8
Incident Alerts
Average: 8.1
8.6
Anomaly Detection
Average: 8.1
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,221 employees on LinkedIn®
Ownership
NYSE: PANW
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Belkasoft X is a complete digital forensic and incident response solution for conducting in-depth investigations on all types of digital media devices and data sources, including computers, mobile dev

    Users
    No information available
    Industries
    • Law Enforcement
    • Computer & Network Security
    Market Segment
    • 75% Small-Business
    • 15% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Belkasoft X is a digital forensics and incident response tool that consolidates vital incident response data in one location and offers features for data collection, analysis, and visualization.
    • Reviewers like the user-friendly interface, the ease of implementation and integration with other devices, the prompt customer service, and the comprehensive training offered by Belkasoft.
    • Users mentioned difficulties in finding some features, occasional slow response times, issues with mobile extractions, high pricing for some, and the lack of an overall search option.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Belkasoft Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    23
    Features
    18
    Training
    9
    Customer Support
    8
    Performance Efficiency
    7
    Cons
    Expensive
    6
    Slow Performance
    3
    Difficult Setup
    2
    Not User-Friendly
    2
    Poor Navigation
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Belkasoft features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 8.9
    7.8
    Continuous Analysis
    Average: 8.1
    7.9
    Incident Alerts
    Average: 8.1
    7.5
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Belkasoft
    Year Founded
    2002
    HQ Location
    Sunnyvale, California
    Twitter
    @Belkasoft
    11,095 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    37 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Belkasoft X is a complete digital forensic and incident response solution for conducting in-depth investigations on all types of digital media devices and data sources, including computers, mobile dev

Users
No information available
Industries
  • Law Enforcement
  • Computer & Network Security
Market Segment
  • 75% Small-Business
  • 15% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Belkasoft X is a digital forensics and incident response tool that consolidates vital incident response data in one location and offers features for data collection, analysis, and visualization.
  • Reviewers like the user-friendly interface, the ease of implementation and integration with other devices, the prompt customer service, and the comprehensive training offered by Belkasoft.
  • Users mentioned difficulties in finding some features, occasional slow response times, issues with mobile extractions, high pricing for some, and the lack of an overall search option.
Belkasoft Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
23
Features
18
Training
9
Customer Support
8
Performance Efficiency
7
Cons
Expensive
6
Slow Performance
3
Difficult Setup
2
Not User-Friendly
2
Poor Navigation
2
Belkasoft features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 8.9
7.8
Continuous Analysis
Average: 8.1
7.9
Incident Alerts
Average: 8.1
7.5
Anomaly Detection
Average: 8.1
Seller Details
Seller
Belkasoft
Year Founded
2002
HQ Location
Sunnyvale, California
Twitter
@Belkasoft
11,095 Twitter followers
LinkedIn® Page
www.linkedin.com
37 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Efficiently respond to legal matters or internal investigations with intelligent capabilities that reduce data to only what’s relevant. Discover data where it lives: Discover and collect data in pla

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 42% Small-Business
    • 31% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Purview Audit features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 8.9
    7.5
    Continuous Analysis
    Average: 8.1
    8.3
    Incident Alerts
    Average: 8.1
    8.3
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    237,523 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Efficiently respond to legal matters or internal investigations with intelligent capabilities that reduce data to only what’s relevant. Discover data where it lives: Discover and collect data in pla

Users
No information available
Industries
No information available
Market Segment
  • 42% Small-Business
  • 31% Enterprise
Microsoft Purview Audit features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 8.9
7.5
Continuous Analysis
Average: 8.1
8.3
Incident Alerts
Average: 8.1
8.3
Anomaly Detection
Average: 8.1
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,464 Twitter followers
LinkedIn® Page
www.linkedin.com
237,523 employees on LinkedIn®
Ownership
MSFT
(68)4.8 out of 5
1st Easiest To Use in Digital Forensics software
View top Consulting Services for Magnet Forensics
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Magnet Forensics solutions are designed for public safety, enterprise, federal, and military users. Public Sector - Magnet Graykey, which can provide same-day access to the latest iOS and Androi

    Users
    No information available
    Industries
    • Law Enforcement
    Market Segment
    • 41% Small-Business
    • 34% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Magnet is a system that is used for law enforcement and investigations, with a user-friendly interface and a suite of tools for evidence collection and processing.
    • Users frequently mention the system's user-friendliness, the robustness of the tool, the quality of customer service, and the company's receptiveness to customer needs and quick problem-solving.
    • Users experienced issues such as the system being overwhelming due to the amount of tools, long processing times, lack of transparency when there are no current solutions to issues, and the cost being high for small police departments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Magnet Forensics features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 8.9
    7.9
    Continuous Analysis
    Average: 8.1
    8.5
    Incident Alerts
    Average: 8.1
    6.9
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2009
    HQ Location
    Waterloo, Ontario
    Twitter
    @MagnetForensics
    16,527 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    768 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Magnet Forensics solutions are designed for public safety, enterprise, federal, and military users. Public Sector - Magnet Graykey, which can provide same-day access to the latest iOS and Androi

Users
No information available
Industries
  • Law Enforcement
Market Segment
  • 41% Small-Business
  • 34% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Magnet is a system that is used for law enforcement and investigations, with a user-friendly interface and a suite of tools for evidence collection and processing.
  • Users frequently mention the system's user-friendliness, the robustness of the tool, the quality of customer service, and the company's receptiveness to customer needs and quick problem-solving.
  • Users experienced issues such as the system being overwhelming due to the amount of tools, long processing times, lack of transparency when there are no current solutions to issues, and the cost being high for small police departments.
Magnet Forensics features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 8.9
7.9
Continuous Analysis
Average: 8.1
8.5
Incident Alerts
Average: 8.1
6.9
Anomaly Detection
Average: 8.1
Seller Details
Company Website
Year Founded
2009
HQ Location
Waterloo, Ontario
Twitter
@MagnetForensics
16,527 Twitter followers
LinkedIn® Page
www.linkedin.com
768 employees on LinkedIn®
(67)4.6 out of 5
2nd Easiest To Use in Digital Forensics software
Save to My Lists
Entry Level Price:$5.04 HOUR
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ExtraHop is the cybersecurity partner enterprises trust to reveal cyber risk and build business resilience. The ExtraHop RevealX platform for network detection and response and network performance man

    Users
    No information available
    Industries
    • Hospital & Health Care
    • Transportation/Trucking/Railroad
    Market Segment
    • 70% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ExtraHop Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Reliability
    5
    Visibility
    5
    Customer Support
    3
    Features
    3
    Cons
    False Positives
    3
    Expensive
    2
    Inadequate Monitoring
    2
    Missing Features
    2
    Alert Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ExtraHop features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    9.6
    Continuous Analysis
    Average: 8.1
    9.6
    Incident Alerts
    Average: 8.1
    9.6
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2007
    HQ Location
    Seattle, Washington
    Twitter
    @ExtraHop
    10,915 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    725 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ExtraHop is the cybersecurity partner enterprises trust to reveal cyber risk and build business resilience. The ExtraHop RevealX platform for network detection and response and network performance man

Users
No information available
Industries
  • Hospital & Health Care
  • Transportation/Trucking/Railroad
Market Segment
  • 70% Enterprise
  • 25% Mid-Market
ExtraHop Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Reliability
5
Visibility
5
Customer Support
3
Features
3
Cons
False Positives
3
Expensive
2
Inadequate Monitoring
2
Missing Features
2
Alert Issues
1
ExtraHop features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
9.6
Continuous Analysis
Average: 8.1
9.6
Incident Alerts
Average: 8.1
9.6
Anomaly Detection
Average: 8.1
Seller Details
Company Website
Year Founded
2007
HQ Location
Seattle, Washington
Twitter
@ExtraHop
10,915 Twitter followers
LinkedIn® Page
www.linkedin.com
725 employees on LinkedIn®
(37)4.4 out of 5
5th Easiest To Use in Digital Forensics software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    This scalable software is court-approved. It includes a decryption and a password cracking program. Customizable interface.

    Users
    No information available
    Industries
    • Law Enforcement
    • Computer & Network Security
    Market Segment
    • 46% Small-Business
    • 35% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FTK Forensic Toolkit features and usability ratings that predict user satisfaction
    8.2
    Has the product been a good partner in doing business?
    Average: 8.9
    7.1
    Continuous Analysis
    Average: 8.1
    7.5
    Incident Alerts
    Average: 8.1
    7.1
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Exterro
    Year Founded
    2004
    HQ Location
    Portland, OR
    Twitter
    @Exterro
    3,548 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    622 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

This scalable software is court-approved. It includes a decryption and a password cracking program. Customizable interface.

Users
No information available
Industries
  • Law Enforcement
  • Computer & Network Security
Market Segment
  • 46% Small-Business
  • 35% Enterprise
FTK Forensic Toolkit features and usability ratings that predict user satisfaction
8.2
Has the product been a good partner in doing business?
Average: 8.9
7.1
Continuous Analysis
Average: 8.1
7.5
Incident Alerts
Average: 8.1
7.1
Anomaly Detection
Average: 8.1
Seller Details
Seller
Exterro
Year Founded
2004
HQ Location
Portland, OR
Twitter
@Exterro
3,548 Twitter followers
LinkedIn® Page
www.linkedin.com
622 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trellix NDR delivers extended visibility, multi-layered threat detection and accelerated investigation and response into network traffic across each stage of the MITRE ATT&CK framework – spanning

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 36% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trellix Network Detection and Response (NDR) features and usability ratings that predict user satisfaction
    8.2
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trellix
    Year Founded
    2004
    HQ Location
    Milpitas, CA
    Twitter
    @Trellix
    250,269 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    826 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trellix NDR delivers extended visibility, multi-layered threat detection and accelerated investigation and response into network traffic across each stage of the MITRE ATT&CK framework – spanning

Users
No information available
Industries
No information available
Market Segment
  • 36% Mid-Market
  • 33% Small-Business
Trellix Network Detection and Response (NDR) features and usability ratings that predict user satisfaction
8.2
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Trellix
Year Founded
2004
HQ Location
Milpitas, CA
Twitter
@Trellix
250,269 Twitter followers
LinkedIn® Page
www.linkedin.com
826 employees on LinkedIn®
(11)4.0 out of 5
6th Easiest To Use in Digital Forensics software
View top Consulting Services for SentinelOne Singularity RemoteOps Forensics
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity RemoteOps is a solution that enables security teams to remotely investigate and manage multiple endpoints at once. RemoteOps easily executes action scripts and collects data and artifacts

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 82% Mid-Market
    • 18% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity RemoteOps Forensics features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 8.9
    8.9
    Continuous Analysis
    Average: 8.1
    8.0
    Incident Alerts
    Average: 8.1
    8.0
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    55,508 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,888 employees on LinkedIn®
    Ownership
    NASDAQ: S
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity RemoteOps is a solution that enables security teams to remotely investigate and manage multiple endpoints at once. RemoteOps easily executes action scripts and collects data and artifacts

Users
No information available
Industries
No information available
Market Segment
  • 82% Mid-Market
  • 18% Enterprise
SentinelOne Singularity RemoteOps Forensics features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 8.9
8.9
Continuous Analysis
Average: 8.1
8.0
Incident Alerts
Average: 8.1
8.0
Anomaly Detection
Average: 8.1
Seller Details
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
55,508 Twitter followers
LinkedIn® Page
www.linkedin.com
2,888 employees on LinkedIn®
Ownership
NASDAQ: S
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cellebrite is the leader in digital intelligence and investigative analytics, partnering with public and private organizations to transform how they manage data in investigations to accelerate justice

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cellebrite features and usability ratings that predict user satisfaction
    7.0
    Has the product been a good partner in doing business?
    Average: 8.9
    6.3
    Continuous Analysis
    Average: 8.1
    7.1
    Incident Alerts
    Average: 8.1
    7.0
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1999
    HQ Location
    Vienna, VA
    Twitter
    @cellebrite
    18,148 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,177 employees on LinkedIn®
    Ownership
    Nasdaq: CLBT
Product Description
How are these determined?Information
This description is provided by the seller.

Cellebrite is the leader in digital intelligence and investigative analytics, partnering with public and private organizations to transform how they manage data in investigations to accelerate justice

Users
No information available
Industries
No information available
Market Segment
  • 40% Mid-Market
  • 33% Enterprise
Cellebrite features and usability ratings that predict user satisfaction
7.0
Has the product been a good partner in doing business?
Average: 8.9
6.3
Continuous Analysis
Average: 8.1
7.1
Incident Alerts
Average: 8.1
7.0
Anomaly Detection
Average: 8.1
Seller Details
Year Founded
1999
HQ Location
Vienna, VA
Twitter
@cellebrite
18,148 Twitter followers
LinkedIn® Page
www.linkedin.com
1,177 employees on LinkedIn®
Ownership
Nasdaq: CLBT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    As part of the Check Point Zero-Day Protection SandBlast solution, the Threat Extraction capability removes exploitable content, including active content and embedded objects, reconstructs files to el

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 36% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SandBlast Threat Extraction features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    9.0
    Continuous Analysis
    Average: 8.1
    9.3
    Incident Alerts
    Average: 8.1
    9.3
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

As part of the Check Point Zero-Day Protection SandBlast solution, the Threat Extraction capability removes exploitable content, including active content and embedded objects, reconstructs files to el

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 36% Mid-Market
SandBlast Threat Extraction features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
9.0
Continuous Analysis
Average: 8.1
9.3
Incident Alerts
Average: 8.1
9.3
Anomaly Detection
Average: 8.1
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
(53)4.5 out of 5
4th Easiest To Use in Digital Forensics software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Parrot Security (ParrotSec) is a Security GNU/Linux distribution designed for the Cyber-Security (InfoSec) field. It includes a full portable laboratory for security and digital forensics experts.

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 72% Small-Business
    • 17% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Parrot Security OS Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Lightweight Size
    4
    Powerful Features
    4
    New Features
    3
    Speed/Performance
    3
    Linux/Ubuntu OS
    2
    Cons
    Hardware Limitations
    1
    Installation Difficulties
    1
    Lack of Support
    1
    Limited Apps/Store
    1
    OS Incompatibility
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Parrot Security OS features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 8.9
    8.9
    Continuous Analysis
    Average: 8.1
    8.7
    Incident Alerts
    Average: 8.1
    8.3
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Palermo, Italy
    Twitter
    @ParrotSec
    23,785 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    20 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Parrot Security (ParrotSec) is a Security GNU/Linux distribution designed for the Cyber-Security (InfoSec) field. It includes a full portable laboratory for security and digital forensics experts.

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 72% Small-Business
  • 17% Enterprise
Parrot Security OS Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Lightweight Size
4
Powerful Features
4
New Features
3
Speed/Performance
3
Linux/Ubuntu OS
2
Cons
Hardware Limitations
1
Installation Difficulties
1
Lack of Support
1
Limited Apps/Store
1
OS Incompatibility
1
Parrot Security OS features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 8.9
8.9
Continuous Analysis
Average: 8.1
8.7
Incident Alerts
Average: 8.1
8.3
Anomaly Detection
Average: 8.1
Seller Details
Year Founded
2013
HQ Location
Palermo, Italy
Twitter
@ParrotSec
23,785 Twitter followers
LinkedIn® Page
www.linkedin.com
20 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    EnCase Forensic enables you to quickly search, identify, and prioritize potential evidence, in computers and mobile devices, to determine whether further investigation is warranted.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 54% Small-Business
    • 31% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenText EnCase Forensic features and usability ratings that predict user satisfaction
    7.5
    Has the product been a good partner in doing business?
    Average: 8.9
    8.1
    Continuous Analysis
    Average: 8.1
    6.7
    Incident Alerts
    Average: 8.1
    6.4
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenText
    Year Founded
    1991
    HQ Location
    Waterloo, ON
    Twitter
    @OpenText
    21,716 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22,403 employees on LinkedIn®
    Ownership
    NASDAQ:OTEX
Product Description
How are these determined?Information
This description is provided by the seller.

EnCase Forensic enables you to quickly search, identify, and prioritize potential evidence, in computers and mobile devices, to determine whether further investigation is warranted.

Users
No information available
Industries
No information available
Market Segment
  • 54% Small-Business
  • 31% Mid-Market
OpenText EnCase Forensic features and usability ratings that predict user satisfaction
7.5
Has the product been a good partner in doing business?
Average: 8.9
8.1
Continuous Analysis
Average: 8.1
6.7
Incident Alerts
Average: 8.1
6.4
Anomaly Detection
Average: 8.1
Seller Details
Seller
OpenText
Year Founded
1991
HQ Location
Waterloo, ON
Twitter
@OpenText
21,716 Twitter followers
LinkedIn® Page
www.linkedin.com
22,403 employees on LinkedIn®
Ownership
NASDAQ:OTEX
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Imperva Attack Analytics correlates and distills thousands of security events into a few readable security narratives. The solution employs artificial intelligence and machine learning to simplify app

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Enterprise
    • 18% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Imperva Attack Analytics features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 8.9
    8.0
    Continuous Analysis
    Average: 8.1
    8.3
    Incident Alerts
    Average: 8.1
    8.0
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Imperva
    Year Founded
    2002
    HQ Location
    Redwood Shores, CA
    Twitter
    @Imperva
    84,603 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,590 employees on LinkedIn®
    Ownership
    NASDAQ: IMPV
Product Description
How are these determined?Information
This description is provided by the seller.

Imperva Attack Analytics correlates and distills thousands of security events into a few readable security narratives. The solution employs artificial intelligence and machine learning to simplify app

Users
No information available
Industries
No information available
Market Segment
  • 64% Enterprise
  • 18% Mid-Market
Imperva Attack Analytics features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 8.9
8.0
Continuous Analysis
Average: 8.1
8.3
Incident Alerts
Average: 8.1
8.0
Anomaly Detection
Average: 8.1
Seller Details
Seller
Imperva
Year Founded
2002
HQ Location
Redwood Shores, CA
Twitter
@Imperva
84,603 Twitter followers
LinkedIn® Page
www.linkedin.com
1,590 employees on LinkedIn®
Ownership
NASDAQ: IMPV
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DomainTools is the global leader for internet intelligence and the first place security practitioners go when they need to know. The world's most advanced security teams use our solutions to identify

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 62% Small-Business
    • 31% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • DomainTools Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    1
    Detailed Analysis
    1
    Ease of Use
    1
    Easy Integrations
    1
    Features
    1
    Cons
    False Positives
    2
    Complexity
    1
    Data Management
    1
    Expensive
    1
    Incomplete Information
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DomainTools features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.9
    6.3
    Continuous Analysis
    Average: 8.1
    6.7
    Incident Alerts
    Average: 8.1
    5.6
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2004
    HQ Location
    Seattle, WA, Washington
    Twitter
    @DomainTools
    13,238 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    149 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DomainTools is the global leader for internet intelligence and the first place security practitioners go when they need to know. The world's most advanced security teams use our solutions to identify

Users
No information available
Industries
No information available
Market Segment
  • 62% Small-Business
  • 31% Enterprise
DomainTools Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
1
Detailed Analysis
1
Ease of Use
1
Easy Integrations
1
Features
1
Cons
False Positives
2
Complexity
1
Data Management
1
Expensive
1
Incomplete Information
1
DomainTools features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.9
6.3
Continuous Analysis
Average: 8.1
6.7
Incident Alerts
Average: 8.1
5.6
Anomaly Detection
Average: 8.1
Seller Details
Year Founded
2004
HQ Location
Seattle, WA, Washington
Twitter
@DomainTools
13,238 Twitter followers
LinkedIn® Page
www.linkedin.com
149 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Autopsy is an easy to use, GUI-based program that allows you to efficiently analyze hard drives and smart phones. It has a plug-in architecture that allows you to find add-on modules or develop custom

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Enterprise
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Autopsy features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    7.9
    Continuous Analysis
    Average: 8.1
    7.3
    Incident Alerts
    Average: 8.1
    8.0
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
    Twitter
    @sleuthkit
    6,293 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Autopsy is an easy to use, GUI-based program that allows you to efficiently analyze hard drives and smart phones. It has a plug-in architecture that allows you to find add-on modules or develop custom

Users
No information available
Industries
No information available
Market Segment
  • 40% Enterprise
  • 40% Small-Business
Autopsy features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
7.9
Continuous Analysis
Average: 8.1
7.3
Incident Alerts
Average: 8.1
8.0
Anomaly Detection
Average: 8.1
Seller Details
HQ Location
N/A
Twitter
@sleuthkit
6,293 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyber Triage™ is an automated incident response software any organization can use to rapidly investigate its endpoints. Cyber Triage investigates the endpoint by pushing the collection tool over the

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 47% Enterprise
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cyber Triage Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    1
    Cybersecurity
    1
    Incident Management
    1
    Response Time
    1
    Support
    1
    Cons
    Poor Customer Support
    1
    System Errors
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyber Triage features and usability ratings that predict user satisfaction
    7.8
    Has the product been a good partner in doing business?
    Average: 8.9
    8.3
    Continuous Analysis
    Average: 8.1
    8.3
    Incident Alerts
    Average: 8.1
    6.7
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1995
    HQ Location
    Somerville, US
    Twitter
    @basistechnology
    2,892 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    57 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyber Triage™ is an automated incident response software any organization can use to rapidly investigate its endpoints. Cyber Triage investigates the endpoint by pushing the collection tool over the

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 47% Enterprise
  • 35% Small-Business
Cyber Triage Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
1
Cybersecurity
1
Incident Management
1
Response Time
1
Support
1
Cons
Poor Customer Support
1
System Errors
1
Cyber Triage features and usability ratings that predict user satisfaction
7.8
Has the product been a good partner in doing business?
Average: 8.9
8.3
Continuous Analysis
Average: 8.1
8.3
Incident Alerts
Average: 8.1
6.7
Anomaly Detection
Average: 8.1
Seller Details
Year Founded
1995
HQ Location
Somerville, US
Twitter
@basistechnology
2,892 Twitter followers
LinkedIn® Page
www.linkedin.com
57 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Here’s an updated description for the "What is Binalyze AIR?" section on G2: Binalyze AIR is a category-defining, automated investigation and response platform that streamlines incident response wo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 44% Enterprise
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Binalyze AIR features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    9.6
    Continuous Analysis
    Average: 8.1
    8.9
    Incident Alerts
    Average: 8.1
    9.0
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Binalyze
    Year Founded
    2018
    HQ Location
    Tallinn, Estonia, EE
    Twitter
    @binalyze
    3,546 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    71 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Here’s an updated description for the "What is Binalyze AIR?" section on G2: Binalyze AIR is a category-defining, automated investigation and response platform that streamlines incident response wo

Users
No information available
Industries
No information available
Market Segment
  • 44% Enterprise
  • 33% Small-Business
Binalyze AIR features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
9.6
Continuous Analysis
Average: 8.1
8.9
Incident Alerts
Average: 8.1
9.0
Anomaly Detection
Average: 8.1
Seller Details
Seller
Binalyze
Year Founded
2018
HQ Location
Tallinn, Estonia, EE
Twitter
@binalyze
3,546 Twitter followers
LinkedIn® Page
www.linkedin.com
71 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 47% Mid-Market
    • 41% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Falcon Security and IT operations Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    2
    Ease of Use
    2
    Easy Integrations
    2
    Implementation Ease
    2
    Response Time
    2
    Cons
    Expensive
    3
    Bugs
    1
    Installation Problems
    1
    Insufficient Training
    1
    Poor Documentation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Falcon Security and IT operations features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 8.9
    8.9
    Continuous Analysis
    Average: 8.1
    9.0
    Incident Alerts
    Average: 8.1
    8.8
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    107,168 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,101 employees on LinkedIn®
    Ownership
    NASDAQ: CRWD
Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 47% Mid-Market
  • 41% Enterprise
Falcon Security and IT operations Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
2
Ease of Use
2
Easy Integrations
2
Implementation Ease
2
Response Time
2
Cons
Expensive
3
Bugs
1
Installation Problems
1
Insufficient Training
1
Poor Documentation
1
Falcon Security and IT operations features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 8.9
8.9
Continuous Analysis
Average: 8.1
9.0
Incident Alerts
Average: 8.1
8.8
Anomaly Detection
Average: 8.1
Seller Details
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
107,168 Twitter followers
LinkedIn® Page
www.linkedin.com
10,101 employees on LinkedIn®
Ownership
NASDAQ: CRWD
Entry Level Price:$59.95
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Aid4Mail is a fast, reliable, and highly accurate tool to recover, collect, search, and convert emails. It supports most mailbox file formats (e.g. PST, OST, OLM, mbox), IMAP accounts and popular mail

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Aid4Mail Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Transfer
    1
    Ease of Use
    1
    User Interface
    1
    Cons
    Expensive
    1
    Limited Customization
    1
    Missing Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Aid4Mail features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1996
    HQ Location
    Charmey, Fribourg
    Twitter
    @FookesSoftware
    476 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Aid4Mail is a fast, reliable, and highly accurate tool to recover, collect, search, and convert emails. It supports most mailbox file formats (e.g. PST, OST, OLM, mbox), IMAP accounts and popular mail

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
Aid4Mail Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Transfer
1
Ease of Use
1
User Interface
1
Cons
Expensive
1
Limited Customization
1
Missing Features
1
Aid4Mail features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1996
HQ Location
Charmey, Fribourg
Twitter
@FookesSoftware
476 Twitter followers
LinkedIn® Page
www.linkedin.com
3 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ACI Case Manager helps banks manage enterprise-wide cases more efficiently; track, control and recover losses; detect patterns; gather intelligence to reduce losses from fraud; and provide peace of mi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Case Manager features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    6.7
    Continuous Analysis
    Average: 8.1
    7.5
    Incident Alerts
    Average: 8.1
    5.8
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1975
    HQ Location
    Coral Gables, US
    Twitter
    @ACI_Worldwide
    8,524 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,749 employees on LinkedIn®
    Ownership
    NASDAQ: ACIW
Product Description
How are these determined?Information
This description is provided by the seller.

ACI Case Manager helps banks manage enterprise-wide cases more efficiently; track, control and recover losses; detect patterns; gather intelligence to reduce losses from fraud; and provide peace of mi

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Small-Business
Case Manager features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
6.7
Continuous Analysis
Average: 8.1
7.5
Incident Alerts
Average: 8.1
5.8
Anomaly Detection
Average: 8.1
Seller Details
Year Founded
1975
HQ Location
Coral Gables, US
Twitter
@ACI_Worldwide
8,524 Twitter followers
LinkedIn® Page
www.linkedin.com
4,749 employees on LinkedIn®
Ownership
NASDAQ: ACIW
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With Change Auditor, you get complete, real-time IT auditing, in-depth forensics and comprehensive security monitoring on all key configuration, user and administrator changes for Microsoft Active Dir

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Change Auditor features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    8.3
    Continuous Analysis
    Average: 8.1
    7.8
    Incident Alerts
    Average: 8.1
    8.9
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1987
    HQ Location
    Aliso Viejo, CA
    Twitter
    @Quest
    17,410 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,665 employees on LinkedIn®
    Ownership
    NYSE: DGX
Product Description
How are these determined?Information
This description is provided by the seller.

With Change Auditor, you get complete, real-time IT auditing, in-depth forensics and comprehensive security monitoring on all key configuration, user and administrator changes for Microsoft Active Dir

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 33% Enterprise
Change Auditor features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
8.3
Continuous Analysis
Average: 8.1
7.8
Incident Alerts
Average: 8.1
8.9
Anomaly Detection
Average: 8.1
Seller Details
Year Founded
1987
HQ Location
Aliso Viejo, CA
Twitter
@Quest
17,410 Twitter followers
LinkedIn® Page
www.linkedin.com
3,665 employees on LinkedIn®
Ownership
NYSE: DGX
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Social Links is a global OSINT (Open Source Intelligence) vendor that empowers investigators and security professionals with ground-breaking AI-powered products. We assemble massive volumes of data

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 73% Small-Business
    • 18% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SL Professional features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    10.0
    Continuous Analysis
    Average: 8.1
    10.0
    Incident Alerts
    Average: 8.1
    8.3
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    New York, US
    Twitter
    @_SocialLinks_
    13,811 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    90 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Social Links is a global OSINT (Open Source Intelligence) vendor that empowers investigators and security professionals with ground-breaking AI-powered products. We assemble massive volumes of data

Users
No information available
Industries
No information available
Market Segment
  • 73% Small-Business
  • 18% Mid-Market
SL Professional features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
10.0
Continuous Analysis
Average: 8.1
10.0
Incident Alerts
Average: 8.1
8.3
Anomaly Detection
Average: 8.1
Seller Details
Year Founded
2015
HQ Location
New York, US
Twitter
@_SocialLinks_
13,811 Twitter followers
LinkedIn® Page
www.linkedin.com
90 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Basis Technology provides software for companies that want to establish multilingual Web sites, products, and sales channels

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Autopsy - Digital Forensics features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    6.7
    Continuous Analysis
    Average: 8.1
    5.6
    Incident Alerts
    Average: 8.1
    4.4
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1995
    HQ Location
    Somerville, US
    Twitter
    @basistechnology
    2,892 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    57 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Basis Technology provides software for companies that want to establish multilingual Web sites, products, and sales channels

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Enterprise
Autopsy - Digital Forensics features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
6.7
Continuous Analysis
Average: 8.1
5.6
Incident Alerts
Average: 8.1
4.4
Anomaly Detection
Average: 8.1
Seller Details
Year Founded
1995
HQ Location
Somerville, US
Twitter
@basistechnology
2,892 Twitter followers
LinkedIn® Page
www.linkedin.com
57 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Corelight's Open Network Detection and Response (NDR) Platform improves network detection coverage, accelerates incident response, and reduces operational costs by consolidating NDR, intrusion detecti

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 52% Mid-Market
    • 48% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Corelight Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Threat Detection
    3
    Cybersecurity
    2
    Data Analytics
    2
    Detection
    2
    Cons
    Complexity
    3
    Complex Coding
    2
    Learning Curve
    2
    Training Deficiency
    2
    Complex Configuration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Corelight features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 8.9
    9.4
    Continuous Analysis
    Average: 8.1
    8.9
    Incident Alerts
    Average: 8.1
    8.9
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Corelight
    Company Website
    Year Founded
    2013
    HQ Location
    San Francisco, CA
    Twitter
    @corelight_inc
    4,205 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    344 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Corelight's Open Network Detection and Response (NDR) Platform improves network detection coverage, accelerates incident response, and reduces operational costs by consolidating NDR, intrusion detecti

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 52% Mid-Market
  • 48% Enterprise
Corelight Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Threat Detection
3
Cybersecurity
2
Data Analytics
2
Detection
2
Cons
Complexity
3
Complex Coding
2
Learning Curve
2
Training Deficiency
2
Complex Configuration
1
Corelight features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 8.9
9.4
Continuous Analysis
Average: 8.1
8.9
Incident Alerts
Average: 8.1
8.9
Anomaly Detection
Average: 8.1
Seller Details
Seller
Corelight
Company Website
Year Founded
2013
HQ Location
San Francisco, CA
Twitter
@corelight_inc
4,205 Twitter followers
LinkedIn® Page
www.linkedin.com
344 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SmartEvent event management provides full threat visibility with a single view into security risks. Take control and command the security event through real-time forensic and event investigation, comp

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 17% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SmartEvent Event Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Reporting
    2
    Reporting Ease
    2
    Threat Detection
    2
    Customization
    1
    Features
    1
    Cons
    Difficult Learning
    2
    Deployment Difficulties
    1
    Learning Curve
    1
    Licensing Cost
    1
    Licensing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SmartEvent Event Management features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 8.9
    10.0
    Continuous Analysis
    Average: 8.1
    10.0
    Incident Alerts
    Average: 8.1
    10.0
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

SmartEvent event management provides full threat visibility with a single view into security risks. Take control and command the security event through real-time forensic and event investigation, comp

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 17% Mid-Market
SmartEvent Event Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Reporting
2
Reporting Ease
2
Threat Detection
2
Customization
1
Features
1
Cons
Difficult Learning
2
Deployment Difficulties
1
Learning Curve
1
Licensing Cost
1
Licensing Issues
1
SmartEvent Event Management features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 8.9
10.0
Continuous Analysis
Average: 8.1
10.0
Incident Alerts
Average: 8.1
10.0
Anomaly Detection
Average: 8.1
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Splunk Synthetic Monitoring helps you measure and improve uptime and performance for your critical apps and services. Splunk Synthetic Monitoring offers best-in class web performance optimization to d

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 48% Enterprise
    • 43% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Splunk Synthetic Monitoring Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    14
    Monitoring
    8
    Easy Integrations
    5
    Performance Efficiency
    5
    Real-time Monitoring
    5
    Cons
    Expensive
    7
    Learning Difficulty
    4
    Learning Curve
    3
    Limited Features
    2
    Log Management Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Splunk Synthetic Monitoring features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 8.9
    10.0
    Continuous Analysis
    Average: 8.1
    9.2
    Incident Alerts
    Average: 8.1
    10.0
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Splunk Synthetic Monitoring helps you measure and improve uptime and performance for your critical apps and services. Splunk Synthetic Monitoring offers best-in class web performance optimization to d

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 48% Enterprise
  • 43% Small-Business
Splunk Synthetic Monitoring Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
14
Monitoring
8
Easy Integrations
5
Performance Efficiency
5
Real-time Monitoring
5
Cons
Expensive
7
Learning Difficulty
4
Learning Curve
3
Limited Features
2
Log Management Issues
2
Splunk Synthetic Monitoring features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 8.9
10.0
Continuous Analysis
Average: 8.1
9.2
Incident Alerts
Average: 8.1
10.0
Anomaly Detection
Average: 8.1
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A Key Part of Fortra (the new face of HelpSystems) Agari is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bringing co

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Agari Phishing Response Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    1
    Email Security
    1
    Features
    1
    Phishing Prevention
    1
    Reporting Ease
    1
    Cons
    Poor Analysis
    1
    Poor Reporting
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Agari Phishing Response features and usability ratings that predict user satisfaction
    0.0
    No information available
    6.7
    Continuous Analysis
    Average: 8.1
    8.3
    Incident Alerts
    Average: 8.1
    8.3
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,461 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,643 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A Key Part of Fortra (the new face of HelpSystems) Agari is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bringing co

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Agari Phishing Response Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
1
Email Security
1
Features
1
Phishing Prevention
1
Reporting Ease
1
Cons
Poor Analysis
1
Poor Reporting
1
Agari Phishing Response features and usability ratings that predict user satisfaction
0.0
No information available
6.7
Continuous Analysis
Average: 8.1
8.3
Incident Alerts
Average: 8.1
8.3
Anomaly Detection
Average: 8.1
Seller Details
Seller
Fortra
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,461 Twitter followers
LinkedIn® Page
www.linkedin.com
1,643 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Maltego is the world’s most widely used cyber investigation platform, offering an all-in-one solution for both quick OSINT investigations and complex link analysis of large datasets with seamless data

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 27% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Maltego Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    2
    Artificial Intelligence
    1
    Data Protection
    1
    Detailed Analysis
    1
    Easy Integrations
    1
    Cons
    Access Limitations
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Maltego features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Maltego
    Year Founded
    2017
    HQ Location
    Munich, DE
    Twitter
    @MaltegoHQ
    13,804 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    152 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Maltego is the world’s most widely used cyber investigation platform, offering an all-in-one solution for both quick OSINT investigations and complex link analysis of large datasets with seamless data

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 27% Mid-Market
Maltego Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
2
Artificial Intelligence
1
Data Protection
1
Detailed Analysis
1
Easy Integrations
1
Cons
Access Limitations
1
Maltego features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Maltego
Year Founded
2017
HQ Location
Munich, DE
Twitter
@MaltegoHQ
13,804 Twitter followers
LinkedIn® Page
www.linkedin.com
152 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Oxygen Forensics is the leader in digital forensics and incident response. We provide digital forensic solutions to law enforcement, government agencies, organizations, and enterprises around the glob

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Oxygen Forensics features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    Alexandria, VA, USA
    Twitter
    @oxygenforensic
    10,749 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    51 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Oxygen Forensics is the leader in digital forensics and incident response. We provide digital forensic solutions to law enforcement, government agencies, organizations, and enterprises around the glob

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Oxygen Forensics features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2000
HQ Location
Alexandria, VA, USA
Twitter
@oxygenforensic
10,749 Twitter followers
LinkedIn® Page
www.linkedin.com
51 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Splunk Intelligence Management helps security professionals analyze notable events and leverage intelligence to quickly understand threat context and prioritize and accelerate triage. With Splunk Inte

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Enterprise
    • 18% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Splunk Intelligence Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Insights
    4
    Detailed Analysis
    3
    Features
    3
    Accuracy of Information
    2
    Cons
    Difficult Learning
    3
    Difficult Learning Curve
    3
    Expensive
    3
    Learning Curve
    3
    Additional Costs
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Splunk Intelligence Management features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Continuous Analysis
    Average: 8.1
    6.7
    Incident Alerts
    Average: 8.1
    9.2
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Splunk Intelligence Management helps security professionals analyze notable events and leverage intelligence to quickly understand threat context and prioritize and accelerate triage. With Splunk Inte

Users
No information available
Industries
No information available
Market Segment
  • 64% Enterprise
  • 18% Mid-Market
Splunk Intelligence Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Insights
4
Detailed Analysis
3
Features
3
Accuracy of Information
2
Cons
Difficult Learning
3
Difficult Learning Curve
3
Expensive
3
Learning Curve
3
Additional Costs
1
Splunk Intelligence Management features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 8.9
9.2
Continuous Analysis
Average: 8.1
6.7
Incident Alerts
Average: 8.1
9.2
Anomaly Detection
Average: 8.1
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    X-Ways Forensics is an advanced work environment for computer forensic examiners and our flagship product. Runs under Windows XP/2003/Vista/2008/7/8/8.1/2012/10*, 32 Bit/64 Bit, standard/PE/FE. (Windo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • X-Ways Forensics features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
    Twitter
    @XWaysSoftware
    3,848 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

X-Ways Forensics is an advanced work environment for computer forensic examiners and our flagship product. Runs under Windows XP/2003/Vista/2008/7/8/8.1/2012/10*, 32 Bit/64 Bit, standard/PE/FE. (Windo

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
X-Ways Forensics features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
N/A
Twitter
@XWaysSoftware
3,848 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cado Cloud Collector features and usability ratings that predict user satisfaction
    0.0
    No information available
    6.7
    Continuous Analysis
    Average: 8.1
    8.3
    Incident Alerts
    Average: 8.1
    8.3
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @CadoSecurity
    975 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Cado Cloud Collector features and usability ratings that predict user satisfaction
0.0
No information available
6.7
Continuous Analysis
Average: 8.1
8.3
Incident Alerts
Average: 8.1
8.3
Anomaly Detection
Average: 8.1
Seller Details
Twitter
@CadoSecurity
975 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cado is a Cloud Detection & Response platform that empowers security teams to get to the bottom of security incidents in the cloud faster. With Cado, what used to take analysts days, now takes mi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cado Response Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Analytics
    1
    Cloud Security
    1
    Efficiency
    1
    Cons
    Integration Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cado Response features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @CadoSecurity
    975 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Cado is a Cloud Detection & Response platform that empowers security teams to get to the bottom of security incidents in the cloud faster. With Cado, what used to take analysts days, now takes mi

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
Cado Response Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Analytics
1
Cloud Security
1
Efficiency
1
Cons
Integration Issues
1
Cado Response features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Twitter
@CadoSecurity
975 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    We specialise in all types of data recovery, including file restoration, hard drive rescue and forensic computer investigations.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Computer Forensics NZ features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    8.3
    Continuous Analysis
    Average: 8.1
    10.0
    Incident Alerts
    Average: 8.1
    10.0
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Auckland , NZ
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

We specialise in all types of data recovery, including file restoration, hard drive rescue and forensic computer investigations.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Computer Forensics NZ features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
8.3
Continuous Analysis
Average: 8.1
10.0
Incident Alerts
Average: 8.1
10.0
Anomaly Detection
Average: 8.1
Seller Details
HQ Location
Auckland , NZ
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Protecting Patient Privacy in Electronic Health Records

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FairWarning features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    Pasadena, US
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Protecting Patient Privacy in Electronic Health Records

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
FairWarning features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2009
HQ Location
Pasadena, US
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OpenText™ EnCase™ Mobile Investigator allows organizations to intuitively view, analyze and report on the critical mobile evidence relevant to their case. With mobile-first workflows, in-depth evidenc

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenText EnCase Mobile Investigator features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    10.0
    Continuous Analysis
    Average: 8.1
    10.0
    Incident Alerts
    Average: 8.1
    10.0
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenText
    Year Founded
    1991
    HQ Location
    Waterloo, ON
    Twitter
    @OpenText
    21,716 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22,403 employees on LinkedIn®
    Ownership
    NASDAQ:OTEX
Product Description
How are these determined?Information
This description is provided by the seller.

OpenText™ EnCase™ Mobile Investigator allows organizations to intuitively view, analyze and report on the critical mobile evidence relevant to their case. With mobile-first workflows, in-depth evidenc

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
OpenText EnCase Mobile Investigator features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
10.0
Continuous Analysis
Average: 8.1
10.0
Incident Alerts
Average: 8.1
10.0
Anomaly Detection
Average: 8.1
Seller Details
Seller
OpenText
Year Founded
1991
HQ Location
Waterloo, ON
Twitter
@OpenText
21,716 Twitter followers
LinkedIn® Page
www.linkedin.com
22,403 employees on LinkedIn®
Ownership
NASDAQ:OTEX
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Phonexia Voice Inspector is an out-of-the-box solution that enables police forces and forensic experts with a highly accurate forensic voice comparison tool to support effective criminal investigation

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Phonexia Voice Inspector features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    8.3
    Continuous Analysis
    Average: 8.1
    8.3
    Incident Alerts
    Average: 8.1
    10.0
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Phonexia
    Year Founded
    2006
    HQ Location
    Brno, CZ
    Twitter
    @Phonexia
    561 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    57 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Phonexia Voice Inspector is an out-of-the-box solution that enables police forces and forensic experts with a highly accurate forensic voice comparison tool to support effective criminal investigation

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Phonexia Voice Inspector features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
8.3
Continuous Analysis
Average: 8.1
8.3
Incident Alerts
Average: 8.1
10.0
Anomaly Detection
Average: 8.1
Seller Details
Seller
Phonexia
Year Founded
2006
HQ Location
Brno, CZ
Twitter
@Phonexia
561 Twitter followers
LinkedIn® Page
www.linkedin.com
57 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IT Security Search is a Google-like, IT search engine that enables IT administrators and security teams to quickly respond to security incidents and analyze event forensics. The tool's web-based inter

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Quest IT Security Search features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    8.3
    Continuous Analysis
    Average: 8.1
    6.7
    Incident Alerts
    Average: 8.1
    8.3
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1987
    HQ Location
    Aliso Viejo, CA
    Twitter
    @Quest
    17,410 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,665 employees on LinkedIn®
    Ownership
    NYSE: DGX
Product Description
How are these determined?Information
This description is provided by the seller.

IT Security Search is a Google-like, IT search engine that enables IT administrators and security teams to quickly respond to security incidents and analyze event forensics. The tool's web-based inter

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Quest IT Security Search features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
8.3
Continuous Analysis
Average: 8.1
6.7
Incident Alerts
Average: 8.1
8.3
Anomaly Detection
Average: 8.1
Seller Details
Year Founded
1987
HQ Location
Aliso Viejo, CA
Twitter
@Quest
17,410 Twitter followers
LinkedIn® Page
www.linkedin.com
3,665 employees on LinkedIn®
Ownership
NYSE: DGX
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP conte

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Xplico features and usability ratings that predict user satisfaction
    0.0
    No information available
    3.3
    Continuous Analysis
    Average: 8.1
    3.3
    Incident Alerts
    Average: 8.1
    6.7
    Anomaly Detection
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Xplico
    Twitter
    @xplico
    243 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP conte

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Xplico features and usability ratings that predict user satisfaction
0.0
No information available
3.3
Continuous Analysis
Average: 8.1
3.3
Incident Alerts
Average: 8.1
6.7
Anomaly Detection
Average: 8.1
Seller Details
Seller
Xplico
Twitter
@xplico
243 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BloxOne™ Threat Defense extends security and visibility across even the most globally dispersed network to proactively protect users, data and infrastructure wherever they are.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Mid-Market
    • 40% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BloxOne Threat Defense Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Ease of Use
    1
    Internet Security
    1
    Protection
    1
    Security
    1
    Cons
    Complex Setup
    1
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BloxOne Threat Defense features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Infoblox
    Year Founded
    1999
    HQ Location
    Santa Clara, California
    Twitter
    @Infoblox
    11,117 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,618 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BloxOne™ Threat Defense extends security and visibility across even the most globally dispersed network to proactively protect users, data and infrastructure wherever they are.

Users
No information available
Industries
No information available
Market Segment
  • 40% Mid-Market
  • 40% Small-Business
BloxOne Threat Defense Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Ease of Use
1
Internet Security
1
Protection
1
Security
1
Cons
Complex Setup
1
Expensive
1
BloxOne Threat Defense features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Infoblox
Year Founded
1999
HQ Location
Santa Clara, California
Twitter
@Infoblox
11,117 Twitter followers
LinkedIn® Page
www.linkedin.com
2,618 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ChipJuice is a software suite created by Texplained for reverse engineering integrated circuits. It enables detailed analysis of IC internal structures, supporting tasks like digital forensics, securi

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ChipJuice features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

ChipJuice is a software suite created by Texplained for reverse engineering integrated circuits. It enables detailed analysis of IC internal structures, supporting tasks like digital forensics, securi

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
ChipJuice features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cognitech FiA64is a comprehensive software with analysis tools designed for forensic analysis and authentication of digital images. This extensive toolkit will allow the user to investigate the eviden

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cognitech Forensic Image Authentication FiA64 features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cognitech
    Year Founded
    1988
    HQ Location
    California, California
    Twitter
    @cognitechusa
    133 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cognitech FiA64is a comprehensive software with analysis tools designed for forensic analysis and authentication of digital images. This extensive toolkit will allow the user to investigate the eviden

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Cognitech Forensic Image Authentication FiA64 features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Cognitech
Year Founded
1988
HQ Location
California, California
Twitter
@cognitechusa
133 Twitter followers
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Combo Binder is a cybersecurity tool developed by StealthMole that specializes in detecting and identifying user credentials leaked as combo lists on the dark web. By scanning hacker forums, Telegram

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Combo Binder features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Singapore, SG
    Twitter
    @stealthmole_int
    123,439 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Combo Binder is a cybersecurity tool developed by StealthMole that specializes in detecting and identifying user credentials leaked as combo lists on the dark web. By scanning hacker forums, Telegram

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Combo Binder features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Singapore, SG
Twitter
@stealthmole_int
123,439 Twitter followers
LinkedIn® Page
www.linkedin.com
17 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Command Zero is an autonomous and user-led cyber investigation platform designed to transform security operations in complex enterprise environments. By integrating expert investigative content, advan

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Command Zero features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    Austin, US
    LinkedIn® Page
    www.linkedin.com
    27 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Command Zero is an autonomous and user-led cyber investigation platform designed to transform security operations in complex enterprise environments. By integrating expert investigative content, advan

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Command Zero features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2022
HQ Location
Austin, US
LinkedIn® Page
www.linkedin.com
27 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Constella Hunter features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Los Altos, California
    Twitter
    @ConstellaIntel
    473 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    97 employees on LinkedIn®
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Constella Hunter features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Los Altos, California
Twitter
@ConstellaIntel
473 Twitter followers
LinkedIn® Page
www.linkedin.com
97 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • New Zealand Forensics features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1999
    HQ Location
    Christchurch, NZ
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
New Zealand Forensics features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1999
HQ Location
Christchurch, NZ
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Nuix Neo Investigations is a solution that enables investigators, data analysts, and data scientists to handle large, complex, and time-intensive investigations. Nuix Neo Investigations allows you

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Nuix Neo Investigations features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Nuix
    Year Founded
    2000
    HQ Location
    Sydney, Australia
    Twitter
    @nuix
    5,338 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    484 employees on LinkedIn®
    Ownership
    ASX: NXL
Product Description
How are these determined?Information
This description is provided by the seller.

Nuix Neo Investigations is a solution that enables investigators, data analysts, and data scientists to handle large, complex, and time-intensive investigations. Nuix Neo Investigations allows you

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Nuix Neo Investigations features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Nuix
Year Founded
2000
HQ Location
Sydney, Australia
Twitter
@nuix
5,338 Twitter followers
LinkedIn® Page
www.linkedin.com
484 employees on LinkedIn®
Ownership
ASX: NXL
  • Overview
    Expand/Collapse Overview
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Seller Details
    Expand/Collapse Seller Details
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    StealthMole's Telegram Tracker is a specialized tool designed to detect and investigate cybercriminal activities within Telegram's rapidly expanding ecosystem. By analyzing data from chat logs, groups

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Telegram Tracker features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Singapore, SG
    Twitter
    @stealthmole_int
    123,439 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

StealthMole's Telegram Tracker is a specialized tool designed to detect and investigate cybercriminal activities within Telegram's rapidly expanding ecosystem. By analyzing data from chat logs, groups

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Telegram Tracker features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Singapore, SG
Twitter
@stealthmole_int
123,439 Twitter followers
LinkedIn® Page
www.linkedin.com
17 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The 4n6 Analyst is Jamaica’s trusted Digital Forensics and Incident Response (DFIR) leader with global expertise spanning Jamaica, Canada, and the United States. We empower organizations to preven

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • The 4n6 Analyst Limited features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2023
    HQ Location
    60 KNUTSFORD BOULEVARD, 9TH FLOOR, PANJAM BUILDING, Kingston 5, Jamaica
    LinkedIn® Page
    www.linkedin.com
    Phone
    +1 (876) 891-1582
Product Description
How are these determined?Information
This description is provided by the seller.

The 4n6 Analyst is Jamaica’s trusted Digital Forensics and Incident Response (DFIR) leader with global expertise spanning Jamaica, Canada, and the United States. We empower organizations to preven

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
The 4n6 Analyst Limited features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2023
HQ Location
60 KNUTSFORD BOULEVARD, 9TH FLOOR, PANJAM BUILDING, Kingston 5, Jamaica
LinkedIn® Page
www.linkedin.com
Phone
+1 (876) 891-1582
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LogLogic Log Management Intelligence helps unlock value from all this data whether it's generated physically, virtually, on-site, or in the cloud. You can store all your log data in a centralized and

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • TIBCO LogLogic features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    TIBCO
    Year Founded
    1997
    HQ Location
    Santa Clara, CA
    Twitter
    @TIBCO
    20,741 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,652 employees on LinkedIn®
    Phone
    1 650 846 1000
Product Description
How are these determined?Information
This description is provided by the seller.

LogLogic Log Management Intelligence helps unlock value from all this data whether it's generated physically, virtually, on-site, or in the cloud. You can store all your log data in a centralized and

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
TIBCO LogLogic features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
TIBCO
Year Founded
1997
HQ Location
Santa Clara, CA
Twitter
@TIBCO
20,741 Twitter followers
LinkedIn® Page
www.linkedin.com
2,652 employees on LinkedIn®
Phone
1 650 846 1000
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Truxton features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Herndon, US
    LinkedIn® Page
    www.linkedin.com
    2 employees on LinkedIn®
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Truxton features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2012
HQ Location
Herndon, US
LinkedIn® Page
www.linkedin.com
2 employees on LinkedIn®

Learn More About Digital Forensics Software

What is Digital Forensics Software?

Digital forensics is a branch of forensic science that focuses on recovering and investigating material found in digital devices related to cybercrime. Digital forensics software focuses on uncovering, interpreting, and preserving electronic data evidence while investigating security incidents.

What Types of Digital Forensics Software Exist?

Digital forensics software is part of digital forensic science. As electronic devices are taking a substantial space in modern lifestyles, knowingly or unknowingly, criminals or offenders use them in their malicious acts. This makes these devices solid pieces of evidence to support or refute an accused in criminal and civil courts. Various types of digital forensics software help investigate networks and devices.

Network forensics software

Network forensics software is related to monitoring and analyzing computer network traffic to collect important information and legal evidence. This software examines traffic across a network suspected of being involved in malicious activities, like spreading malware or stealing credentials.

Wireless forensics software

Wireless forensics software is a division of network forensics software. This software offers the tools needed to collect and analyze data from wireless network traffic that can be presented as valid digital evidence in a court of law.

Database forensics software

Database forensics software examines databases and their related metadata. Database forensics software applies investigative techniques such as analytic analysis to database contents and its metadata to find digital evidence.

Malware forensics software

Malware forensics software deals with identifying malicious code to study payload, viruses, worms, etc. Malware forensics software analyzes and investigates possible malware culprits and the source of the attack. It checks for malicious code and finds its entry, propagation method, and impact on the system.

Email forensics software

Email forensics software deals with the recovery and analysis of emails, including deleted emails, calendars, and contacts. Email forensics software also analyzes emails for content to determine the source, date, time, the actual sender, and recipients to find digital evidence. 

Memory forensics software

Memory forensics software collects data from system memory (system registers, cache, RAM) in raw form and then carves the data from the raw dump. Memory forensics software's primary application is the investigation of advanced computer attacks, which are stealthy enough to avoid leaving data on the computer's hard drive. In turn, the memory (RAM) must be analyzed for forensic information.

Mobile phone forensics software

Mobile phone forensic software examines and analyzes mobile devices. It retrieves phone and SIM contacts, call logs, incoming, and outgoing SMS/MMS, audio, videos, etc., from mobile phones. Most applications store their data in database files on a mobile phone.

Disk and data capture forensics software

Disk and data capture forensic software focuses on the core part of a computer system and extracts potential forensic artifacts such as files, emails, etc. Many times disk and data capture forensics software is used when a home or office environment is being investigated.

File analysis software

File analysis forensic software deals with files on media, deleted files, files in folders, or files in other files stored on or in some container. The goal of file analysis software is to identify, extract, and analyze these files and the file systems they lie upon to find data that might be valid evidence in a crime. 

Registry analysis software

Registry analysis forensics software automatically extracts crucial information from the live registry or the raw registry files found in digital evidence and displays it in user-understandable format. It performs time conversion and translation of binary and other non-ASCII data. 

What are the Common Features of Digital Forensics Software?

The following are features of digital forensics software:

Identification: Digital forensics software recognizes the devices and resources containing the data that could be part of a forensics investigation. This data can be found on devices such as computers or laptops or users’ personal devices like mobile phones and tablets.

As part of the process, these devices are seized to eliminate the possibility of tampering. If the data is on a server, network, or housed on the cloud, the investigator must ensure no other investigating team has access to it.

Extraction and preservation: After devices have been seized, they must be stored in a secure location so the digital forensics investigator can use digital forensics software to extract relevant data.

This phase involves the creation of a digital copy of the relevant data, known as a “forensic image.” The digital copy is used for analysis and evaluation. This prevents any tampering with the original data, even if the investigation is compromised.

Analysis: Once the devices involved have been identified and isolated, and the data has been duplicated and stored securely, digital forensic software uses various techniques to extract relevant data and examine it, searching for clues or evidence that points to wrongdoing. This often involves recovering and examining deleted, damaged, or encrypted files.

Documentation: Post analysis, the resulting data of the digital forensics software investigation is presented in a way that makes it easy to visualize the entire investigative process and its conclusions. Proper documentation data helps to formulate a timeline of the activities involved in wrongdoing, such as embezzlement, data leakage, or network breaches.

What are the Benefits of Digital Forensics Software?

Intellectual property (IP) and internal investigations are typical digital forensic software use cases. IP cases include theft, industrial espionage, IP misconduct, fraud, personal injury or death, or sexual harassment. Digital forensics software helps find evidence in such cases. Below are areas where digital forensics software is useful.

Data recovery: Data recovery is often the use of digital forensics software. It helps to recover stolen or lost information in devices people use. 

Damage analysis: Digital forensics software is used for damage analysis to discover vulnerabilities and remediate them to prevent cyber attacks.

Who Uses Digital Forensics Software?

Digital forensics software is used for criminal, lawbreaking, and civil cases with contractual disputes between commercial parties. Digital forensics software helps examine digital evidence in these cases.

Investigation agencies: Digital forensic software is important in private corporate investigations. Using digital forensics software for incidents like network intrusion, authorities can attribute evidence to suspects, confirm alibis, identify intent or authenticate documents. Many agencies leverage a company’s intrusion detection and prevention system to explore crimes and use digital forensics to collect and analyze digital evidence.

National security agencies: National security agencies use digital forensics software to investigate emails from suspected terrorists.

Challenges with Digital Forensics Software

Software solutions can come with their own set of challenges. 

Technical challenges: Digital forensics software may have challenges when identifying hidden data that may be encrypted on a device. While encryption ensures data privacy, attackers may also use it to hide their digital crimes. Cybercriminals can hide data inside storage and delete data from computer systems. Cyber attackers can also use a covert channel to conceal their connection to the compromised system. 

Below are some common challenges of digital forensics software:

  • Cloud storage can complicate the investigation or make it hard to find the required data.
  • The time it takes to archive data can cause delays in finding data relevant to an investigation.
  • The investigator can have a knowledge or skills gap.
  • Another challenge can be steganography or hiding information within a file while leaving its outer look the same.

Legal challenges: Legal challenges can be privacy concerns and data storage accessibility regulations. Some laws require corporations to delete personal information within a certain time frame after an incident, while other legal frameworks may not recognize every aspect of digital forensics software.

Below are some common legal challenges of digital forensics software:

  • Devices must be securely stored once data is collected.
  • Privacy rules prevent full access to data.
  • Forensic investigators must have the proper authority to gather digital evidence.
  • Some data may not be admissible or useful in court.

Resource challenges: As data flows across networks, it may increase in volume, making it difficult for digital forensics software to identify original and relevant data. 

Since technology is constantly changing, it may be challenging to read digital evidence since new versions of systems may not be compatible with old versions of software that don’t have backward compatibility support.