Suggested Categories:

Digital Forensics Software
Digital forensics software is a type of tool used by cybersecurity professionals and law enforcement to investigate and analyze digital devices, networks, and data following a security breach or criminal activity. These tools help recover, preserve, and examine evidence from electronic devices such as computers, smartphones, servers, and storage devices. Digital forensics software typically includes features like data recovery, file carving, network traffic analysis, timeline creation, and forensic image creation to ensure that evidence remains unaltered. It also helps in tracking digital footprints, identifying malicious activity, and gathering critical information for legal purposes. By providing detailed insights into digital activities, these tools are essential for investigating cybercrimes, data breaches, and compliance violations.
Video Forensic Analysis Software
Video forensic analysis software is a type of digital media technology designed to help users identify discrepancies in, or enhance video and image files. It provides accurate measurements for color, contrast, focus and motion, allowing the user to manipulate the details of their footage for forensic investigation. The software often comes with tools such as magnifying loupes, brightness adjusters, color scales and waveform monitors that allow for further granular control over the image data. Video forensic analysis software can be used by law enforcement agencies to authenticate video evidence or by film professionals in post-production.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.
  • 1
    Virtual Forensic Computing
    We are the creators of Virtual Forensic Computing (VFC). This world-renowned software enables Digital Forensic Investigators to view a suspect’s machine in its native environment without turning the original device on, therefore preserving crucial metadata. Widely used by various law enforcement agencies all over the world, VFC is ‘an essential tool’ in every Computer Forensic Investigator’s toolbox. Founded in 2003 by a former Head of the Digital Forensics Unit of the National Crime Squad, MD5...
    Starting Price: $1000 per year
  • 2
    Forensic Email Collector
    Expertly preserve email evidence without breaking a sweat. Get plug & play output for digital forensic investigations and eDiscovery. We all run into cases where collecting a mailbox as a whole is not an option, often due to privacy or timeframe concerns. On the other hand, eDiscovery and digital forensics workflows often involve a full collection, followed by post-acquisition searches. Forensic Email Collector solves this problem in a creative way. You can perform instant in-place searches...
    Starting Price: $499 one-time payment
  • 3
    Cryoserver

    Cryoserver

    Forensic and Compliance Systems

    Cryoserver is an email archiving solution delivered either on-premises or in the cloud. It stores copies of every email sent and received by an organization in a secure archive. It then turns this data into a valuable resource for everyday use. You can be safe in the knowledge that any business-critical information contained in email or IM is safe in Cryoserver, where it is instantly retrievable. Cryoserver solutions are distributed to an international audience covering more than 27+...
    Starting Price: $1.00 per user per month
  • 4
    SendForensics

    SendForensics

    SendForensics

    On average, 30% of emails fail to reach their target by dropping straight into customers' spam folders. Reclaim this lost revenue with the most advanced email deliverability system available. The SendForensics Deliverability Score is a unique, predictive modeling of an email's ability to reach any given inbox. To put it simply, it is a measure of an email's 'quality' in terms of how it will be perceived by global filtering-systems/ISPs and even human recipients themselves. Truly the Missing...
    Starting Price: $49 per user per month
  • 5
    Velociraptor
    At the press of a (few) buttons, perform targeted collection of digital forensic evidence simultaneously across your endpoints, with speed and precision. Continuously collect endpoint events such as event logs, file modifications and process execution. Centrally store events indefinitely for historical review and analysis. Actively search for suspicious activities using our library of forensic artifacts, then customize to your specific threat-hunting needs. It was developed by Digital Forensic...
  • 6
    Santoku

    Santoku

    Santoku

    Santoku is dedicated to mobile forensics, analysis, and security, and packaged in an easy to use, Open Source platform. Scripts to automate decrypting binaries, deploying apps, enumerating app details, and more. Scripts to detect common issues in mobile applications. Utilities to simulate network services for dynamic analysis. Useful scripts and utilities specifically designed for mobile forensics. Firmware flashing tools for multiple manufacturers. GUI tools for easy deployment and control...
  • 7
    Parrot OS

    Parrot OS

    Parrot Security

    Parrot is a worldwide community of developers and security specialists that work together to build a shared framework of tools to make their job easier, standardized and more reliable and secure. Parrot OS, the flagship product of Parrot Security is a GNU/Linux distribution based on Debian and designed with Security and Privacy in mind. It includes a full portable laboratory for all kinds of cyber security operations, from pentesting to digital forensics and reverse engineering, but it also...
  • 8
    MailArchiva

    MailArchiva

    Stimulus Software

    MailArchiva is a professional enterprise grade email archiving, e-discovery, forensics and compliance solution. Since 2006, MailArchiva has been deployed in some of the most demanding IT environments on the planet. The server designed to make the storage and retrieval of long-term email data as convenient as possible and is ideal for companies needing to satisfy e-Discovery records requests in a timely and accurate manner. MailArchiva offer tight integration (includfing full calendar, contact...
    Starting Price: $34.56 / user
  • 9
    drie

    drie

    drie

    Our assessments (usually ranging from four days to one month, depending on the size of your infrastructure estate) will quantify the time, effort, and cost required to make the move to the cloud. At the end you’ll get a custom report giving you all the information you need to decide if you want to migrate to public cloud. One of our senior cloud experts will meet your team and conduct the cloud readiness assessment. This is a forensic piece of work where we will ask a ton of questions to better...
  • 10
    SQL Compliance Manager

    SQL Compliance Manager

    IDERA, an Idera, Inc. company

    SQL Compliance Manager helps database administrators to monitor, audit, and alert on SQL Server user activity and data changes. Unlike its competition, it provides quick configuration of audit settings, a broad list of regulatory guideline templates for audit settings and reports, before and after data values for both regulatory compliance and forensic data investigations, differentiation of data access and between regular and privileged users and applications, easy specification...
    Starting Price: $3,036.00 per instance
  • 11
    Asset Vision

    Asset Vision

    Scalable Software

    ... Workstation is the ultimate in software usage metering technology. It delivers forensic-level usage analysis of traditional and virtual applications, applications running on virtual desktops and web applications.
  • 12
    R-Studio

    R-Studio

    R-Tools Technology

    Intended for digital forensic labs, data recovery businesses, or individuals, it provides them with a first-class professional data recovery tool set that can solve most of the challenges they could ever face. Besides powerful data recovery features, it includes a versatile file previewer that helps you estimate the chances for a successful data recovery, a flexible RAID reconstruction module with custom-defined RAID configurations, modules for data recovery over a network, and a professional...
    Starting Price: $80 one-time payment
  • 13
    DataCurrent

    DataCurrent

    Smart City Water

    ... rainfall records to develop rainfall intensity-duration curves for comparing with the area’s design intensity-duration-frequency curves and define the return periods of observed events (forensic analysis). Develop new intensity-duration-frequency curves for designing drainage system infrastructure (sewers, channels, storage facilities). Flow monitoring and data analysis to develop rainfall versus stormwater runoff response curves for calibrating drainage system models.
  • 14
    Spamhaus

    Spamhaus

    The Spamhaus Project

    ... by a dedicated staff of 38 investigators, forensics specialists and network engineers located in 10 nations. Spamhaus realtime threat and reputation blocklists currently protect over 3 Billion user mailboxes* and are responsible for blocking the vast majority of spam and malware sent out on the Internet. Spamhaus data is today used by the majority of the Internet's ISPs, email service providers, corporations, universities, governments and military networks.
  • 15
    Security Onion

    Security Onion

    Security Onion

    ... and analysis of network traffic, security alerts, and system logs. It also includes built-in tools for threat hunting, alert triage, and forensic analysis, helping users identify potential security incidents quickly. Security Onion is designed for scalability, making it suitable for environments of all sizes, from small businesses to large enterprises.
    Starting Price: Free
  • 16
    ipapi

    ipapi

    ipapi.co

    ipapi (ipapi.co) is owned and operated by Kloudend, Inc. a company incorporated in Delaware, USA. It has rapidly grown from a niche IP intelligence service, started in 2016 to a leading IP Address Location service and Geolocation API provider. We are trusted by thousands of businesses that rely on us for IP address analytics & location intelligence round the clock. Our client base includes fortune 500 companies, market leaders in e-commerce, startups, SaaS providers, payment gateways, forensic...
    Starting Price: $12 per month
  • 17
    Acronis Cyber Protect
    Managing cyber protection in a constantly evolving threat landscape is a challenge. Safeguard your data from any threat with Acronis Cyber Protect (includes all features of Acronis Cyber Backup) – the only cyber protection solution that natively integrates data protection and cybersecurity. - Eliminate gaps in your defenses with integrated backup and anti-ransomware technologies. - Safeguard every bit of data against new and evolving cyberthreats with advanced MI-based protection...
    Starting Price: $85
  • 18
    ReclaiMe Pro

    ReclaiMe Pro

    ReclaiMe Data Recovery

    Following is the complete list of ReclaiMe Pro features and capabilities. Reads common Windows, Linux, and MacOS partitions: MBR, GPT, APM Reads complex partitions: Windows Dynamic Disks (LDM), MD-RAID (all levels), LVM (stripe/span only, no LVM RAID5). Automatic sector size detection on disk images and clones where sector size of the copy does not match the sector size of the original. Detect blank disks by measuring the ratio of non-zero data on disks, partitions, regions, RAIDs, and...
    Starting Price: $799 per year
  • 19
    Webroot Advanced Email Threat Protection
    Webroot Advanced Email Threat Protection provides multi-layered filtering to secure both inbound and outbound email communications. It defends businesses against phishing, ransomware, Business Email Compromise (BEC), impersonation, and other malicious email-borne threats. The solution includes attachment quarantine with forensic analysis in a secure cloud sandbox and link protection that rewrites URLs and performs time-of-click analysis. It also supports secure delivery features like message...
  • 20
    Kentik

    Kentik

    Kentik

    ... Monitoring - Capacity Planning - Container Networking - Service Provider Intelligence - Real Time Network Forensics - Network Costs Analytics All on One Platform for Visibility, Performance, and Security. Trusted by Pandora, Box, Cogent, Tata, Yelp, University of Washington, GTT and more! Free trial or demo!
  • 21
    Agari

    Agari

    Fortra

    Use Trusted Email Identity to protect workers and customers from advanced email attacks. Advanced email attacks target a major security vulnerability that legacy email security controls do not address. Agari gives employees, customers, and partners the confidence to trust their inbox. Unique AI with over 300m daily machine learning model updates understands the good to protect you from the bad. Global intelligence powered by trillions of global email messages provide deep insights into...
  • 22
    IBM QRadar SIEM
    Market-leading SIEM built to outpace the adversary with speed, scale and accuracy As digital threats loom large and cyber adversaries grow increasingly sophisticated, the roles of SOC analysts are more critical than ever. Going beyond threat detection and response, QRadar SIEM enables security teams face today’s threats proactively with advanced AI, powerful threat intelligence, and access to cutting-edge content to maximize analyst potential. Whether you need cloud-native architecture...
  • 23
    Disk Drill

    Disk Drill

    508 Software

    .... Empower all your students and faculty with the unlimited license for the most powerful data recovery software. Improve your data integrity. Make it a corporate benefit, let all your offices and employees access the most efficient data recovery solutions. Protect and recover your data like a pro, become a first-class service provider or forensic expert.
  • 24
    Imatag

    Imatag

    IMATAG

    IMATAG protects your visual content online, such as product images, brand visuals, licensed content, or sensitive files. Based on a patented technology of Invisible Watermark (or Forensic Watermark), it comes in two flavors: - IMATAG LEAKS, the first online solution for the identification of photo or video leaks, - and IMATAG MONITOR, the most reliable visual search solution to track the use of your content on the internet. How it works: The software discreetly places an imperceptible...
  • 25
    BloxOne Threat Defense
    BloxOne Threat Defense maximizes brand protection by working with your existing defenses to protect your network and automatically extend security to your digital imperatives, including SD-WAN, IoT and the cloud. It powers security orchestration, automation and response (SOAR) solutions, slashes the time to investigate and remediate cyberthreats, optimizes the performance of the entire security ecosystem and reduces the total cost of enterprise threat defense. The solution turns the core...
  • 26
     Acronis Cyber Protect Cloud
    ...-level backup, disaster recovery, and metadata collection for security forensics. MSP-ready protection management. URL filtering, vulnerability assessments, and patch management for greater control. The traditional stack of endpoint protection products lacks integration and requires much more time for management – maintaining licenses, installing updates and patches, verifying compatibility after updates, and managing multiple policies using a variety of different user interfaces.
  • 27
    iSecurity SIEM / DAM Support
    ...View, CA UniCenter and others. iSecurity supports Imperva SecureSphere DAM. Integration with SIEM products for forensic analysis of security-related events is an increasingly important requirement at companies worldwide; indeed, Raz-Lee’s iSecurity suite has supported Syslog-to-SIEM for numerous years. Proven integration with all SIEM products. Field-mode support for the 2 major standards – LEEF (IBM QRadar) and CEF (ArcSight). These standards are supported in many other SIEM products as well.
  • 28
    PhishProtection
    Make your smartest investment to reduce email security threats today, and get a comprehensive email security protection solution with small business pricing. Cybercriminals are targeting CEOs, CFOs, HR, Accounting Departments and regular employees across every industry. As you know Office 365 is extremely limited in the protection that you can configure to stop impersonations, email fraud and phishing. There are only so many custom transport rules you can build to constantly block domains...
    Starting Price: $100/month/user
  • 29
    Kali Linux
    Kali Linux is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering. You can take any Linux and install pentesting tools on it, but you have to set the tools up manually and configure them. Kali is optimized to reduce the amount of work, so a professional can just sit down and go. A version of Kali is always close to you, no matter where you need it. Mobile...
  • 30
    DMARC Report

    DMARC Report

    DuoCircle

    ... business and report on robust analytics from the intuitive dashboard. You can safeguard outbound mail to protect your sender reputation, as well as leverage strong filtering policies for inbound emails. The platform automatically generates aggregate and forensic data reports that track any DMARC failures for your domains. If suspicious activity is detected, DMARC Report will send threat alert notifications to any email address that needs to be in the loop.
    Leader badge
    Starting Price: $100/month/2 million emails
  • Previous
  • You're on page 1
  • 2
  • Next