17 results
Why Capterra is free
Enables you to detect and block malware providing real-time threat intelligence and complete web, device, and data control.
Sophos Intercept X is the worlds most comprehensive next-generation endpoint protection solution built to stop the widest range of attacks. Intercept X combines multiple techniques including signatureless exploit prevention, deep learning malware detection, anti-ransomware capabilities, root cause analysis, and more. Learn more about Intercept X Endpoint

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
Electronic evidence examination and digital data processing solution that provides IoT, mobile/smartphone, and hard drive forensics.
Electronic evidence examination and digital data processing solution that provides IoT, mobile/smartphone, and hard drive forensics.

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
Network Investigation and Post-Breach Analysis
Enterprise provides deep visibility into live data directly at the endpoint, helping you conduct faster, more targeted enterprise-wide post-breach, HR and compliance investigations in a single, robust solution. With Enterprise, you can respond quickly, remotely and discreetly while maintaining chain of custody, and facilitate focused forensic investigations and post-breach analysis, without interruption to business operations. Learn more about Forensic Toolkit (FTK)

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
MailXaminer - A Forensic Tool Designed with the Intent to Recover, Read & Analysis Various facets of Email File Format.
MailXaminer is primarily designed using advanced technology for analysis of email files. The tool assists cyber experts in resolving Digital Crime cases using a semantic approach. This utility is attuned with desktop based & web based/cloud email file formats. MailXaminer allows investigators to analyze data through various view options like HTML, MIME, HEX, Message Header, etc. Software also provides various Search Mechanisms, Export Options as well as Team Collaboration feature. Learn more about MailXaminer

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
Fully integrated security for every communication channel in your organization
Fully integrated security for every communication channel in your organization

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
D3 SOAR is a platform with a fully embedded MITRE ATT&CK Module, for better Threat Intelligence, Monitoring, and Hunting.
D3 SOAR is a platform with a fully embedded MITRE ATT&CK Module, D3 Security helps SOC teams become Threat Hunters with streamlined workflows and $$$,$$$ in cost savings per year. With D3 SOAR, you can unify teams across borders and job functions: Easily manage all Incidents and Cases, collaborate on complex security and legal investigations, conduct post-incident analyses, derive actionable analytics, and automatically report on progress to continually improve your security posture. Learn more about D3 SOAR

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
Digital Forensic Case Management solution covering evidence management, notes, asset tracking and ISO compliance.
Digital Forensic Case Management solution covering evidence management, notes, asset tracking and ISO compliance.

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
On Demand By-the-Hour Forensic Analysis & Remote Remediation
Companies need digital tools to help detect and respond to a cyber incident. Many traditional solutions are simply too expensive. Even worse, traditional solutions often have restrictive tool architectures that prevent investigators from moving quickly when an attack happens. With worldwide availability and by-the-hour pricing, CyFIR Investigator is an endpoint detection and response solution that is affordable and scalable so companies can get the best protection and only pay for what they need Learn more about CyFIR Investigator

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
Digital forensics solution that helps businesses recover & analyze evidence-related data from multiple sources on a unified interface.
Digital forensics solution that helps businesses recover & analyze evidence-related data from multiple sources on a unified interface.

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
Email security solution that enables businesses to proactively identify, analyze and respond to email attacks in real-time.
Email security solution that enables businesses to proactively identify, analyze and respond to email attacks in real-time.

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
It is a digital forensics solution that helps businesses rebuild data, retrace actions, manage investigations, and more.
It is a digital forensics solution that helps businesses rebuild data, retrace actions, manage investigations, and more.

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
An all-in-one Digital Forensics platform that enables organisations to extract and analyse data from a multitude of devices.
An all-in-one Digital Forensics platform that enables organizations to extract and analyse data from a range of devices including PCs, mobile phones, removable media, and smart devices.

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
Cloud-based and on-premise endpoint protection solution that helps businesses protect devices from malware or phishing attacks.
Cloud-based and on-premise endpoint protection solution that helps businesses protect devices from malware or phishing attacks.

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
Cyber threat intelligence platform that helps streamline risk assessments, map cyber activities and facilitate fraud investigations.
Cyber threat intelligence platform that helps streamline risk assessments, map cyber activities, facilitate online fraud investigations, and more.

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
Digital forensics solution that offers automated incident response, orchestration, endpoint visibility, and more.
Digital forensics solution that offers automated incident response, orchestration, endpoint visibility, and more.

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
EnCase Forensic is designed to help investigators search and identify potential evidence across computers, laptops, and mobile devices.
EnCase Forensic is designed to help investigators search and identify potential evidence across computers, laptops, and mobile devices.

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
Aware is the only comprehensive AI solution for governance, risk, compliance and people insights for leading collaboration platforms.
Your all-in-one governance, e-Discovery, DLP and intelligence platform, Aware enables collaboration for the enterprise by removing risk, enabling legal workflows, analyzing organization sentiment, and delivering authentic, continuous insights. Aware adopts the latest advancements in cognitive computing, artificial intelligence, and behavioral analytics to amplify enterprise value by monitoring the social graph for Slack, Yammer, Microsoft Teams, Workplace by Facebook, Zoom, and more. Learn more about Aware

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications