Best Digital Forensics Software

Products Buyer's Guide
9.2
SandBlast Threat Extraction
★★★★★

SandBlast Threat Extraction

As part of the Check Point Zero-Day Protection SandBlast solution, the Threat Extraction capability removes exploitable content, including active content and embedded objects, reconstructs files to eliminate potential threats, and promptly delivers sanitized content to users to maintain business flow.

Fast files convertion into the safe types - Oleg P.

Ease of use
Support
Ease of Setup
9.6
X-Ways Forensics
★★★★★

X-Ways Forensics

X-Ways Forensics is an advanced work environment for computer forensic examiners and our flagship product. Runs under Windows XP/2003/Vista/2008/7/8/8.1/2012/10*, 32 Bit/64 Bit, standard/PE/FE. (Windows FE is described here, here and here.) Compared to its competitors, X-Ways Forensics is more efficient to use after a while, by far not as resource-hungry, often runs much faster, finds deleted files and search hits that the competitors will miss, ...

The best forensic software - User in Law Enforcement

Ease of use
Support
Ease of Setup
9.6
SmartEvent Event Management
★★★★★

SmartEvent Event Management

SmartEvent event management provides full threat visibility with a single view into security risks. Take control and command the security event through real-time forensic and event investigation, compliance, and reporting. Respond to security incidents immediately and gain network true insights.

Logs and events correlation for your NGFWs - Aleh P.

Ease of use
Support
Ease of Setup
8.6
DomainTools
★★★★★

DomainTools

DomainTools' data and products work in harmony to enable security teams to start getting ahead of attacks, gain context and visibility into potential threats, and lower the skills barrier.

Love Their WhoIs Lookup - User in Internet

Ease of use
Support
Ease of Setup
8.6
IBM Security QRadar
★★★★★

IBM Security QRadar

IBM QRadar is designed to collect logs, events, network flows and user behavior across your entire enterprise, correlates that against threat intelligence and vulnerability data to detect known threats, and applies advanced analytics to identify anomalies that may signal unknown threats. The solution then uniquely connects the end-to-end chain of activity associated with a single potential incident, and provides prioritized alerts based on ...

Excellent SIEM - Jonathan S.

Ease of use
8.2
Support
8.7
Ease of Setup
8.3

Languages supported: German, English, French, Italian, Japanese, Korean, Portuguese, Russian, Spanish, Chinese (Simplified)

8.6
Parrot Security OS
★★★★★

Parrot Security OS

Parrot Security (ParrotSec) is a Security GNU/Linux distribution designed for the Cyber-Security (InfoSec) field. It includes a full portable laboratory for security and digital forensics experts.

Parrot Security OS is better than Kali Linux in many ways. - Utsav K.

Ease of use
8.1
Support
8.7
Ease of Setup
0.0
8.8
Cyber Triage
★★★★★

Cyber Triage

Cyber Triage is an automated incident response software any company can use to investigate their alerts.

Manager IT - Consultant in Information Technology and Services

Ease of use
9.0
Support
8.9
Ease of Setup
7.0
7.6
FireEye Network Security and Forensics
★★★★★

FireEye Network Security and Forensics

FireEye Network Security (NX) solutions protect against known and unknown advanced attacks with the signature-less Multi-Vector Virtual Execution (MVX) engine, conventional intrusion prevention system (IPS) and intelligence-driven detection.

Have users who want to be able to do everything, then you need FireEye Network Security - Administrator in Primary/Secondary Education

Ease of use
8.0
Support
7.4
Ease of Setup
7.9
9.4
Forensic Toolkit
★★★★★

Forensic Toolkit

This scalable software is court-approved. It includes a decryption and a password cracking program. Customizable interface.

Greate experience. Nice support. - YOGESH K.

Ease of use
8.9
Support
9.5
Ease of Setup
8.9
7.0
EnCase Forensic
★★★★★

EnCase Forensic

EnCase Forensic enables you to quickly search, identify, and prioritize potential evidence, in computers and mobile devices, to determine whether further investigation is warranted.

Still good, but not any more the flagship of forensics Software - User in Information Technology and Services

Ease of use
Support
Ease of Setup
10.0
Belkasoft Evidence Center
★★★★★

Belkasoft Evidence Center

Belkasoft Evidence Center makes it easy for an investigator to acquire, search, analyze, store and share digital evidence found inside computer and mobile devices.

Excellent software for Digital Forensics Analysis - Chaitanya T.

Ease of use
Support
Ease of Setup
10.0
Magnet Forensics
★★★★★

Magnet Forensics

Magnet Forensics finds, analyzes and reports on the digital evidence from computers, smartphones and tablets.

Excellent GUI for Digital Forensic Analysis - Chaitanya T.

Ease of use
Support
Ease of Setup
0.0
Change Auditor
★★★★★

Change Auditor

With Change Auditor, you get complete, real-time IT auditing, in-depth forensics and comprehensive security monitoring on all key configuration, user and administrator changes for Microsoft Active Directory, Azure AD, Exchange, Office 365, Exchange Online, file servers and more.

Software for the application of IT area audit in real time. - Exson M.

Ease of use
Support
Ease of Setup
0.0
Autopsy
★★★★★

Autopsy

Autopsy is an easy to use, GUI-based program that allows you to efficiently analyze hard drives and smart phones. It has a plug-in architecture that allows you to find add-on modules or develop custom modules in Java or Python.

Such a Dark Name for a VERY BRIGHT software application! - User in Legal Services

Ease of use
Support
Ease of Setup
B2B Software Guide