G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.
Cado Cloud Collector is a free tool designed to simplify the forensic imaging of AWS EC2 instances. By deploying a straightforward Amazon Machine Image , users can forensically image any instance with
Cado is a Cloud Detection & Response platform that empowers security teams to get to the bottom of security incidents in the cloud faster. With Cado, what used to take analysts days, now takes mi
We specialise in all types of data recovery, including file restoration, hard drive rescue and forensic computer investigations.
Protecting Patient Privacy in Electronic Health Records
OpenText™ EnCase™ Mobile Investigator allows organizations to intuitively view, analyze and report on the critical mobile evidence relevant to their case. With mobile-first workflows, in-depth evidenc
Phonexia Voice Inspector is powerful, standalone voice analysis software designed for forensic experts and law enforcement agencies to perform highly accurate, ENFSI-aligned voice comparisons, streaml
IT Security Search is a Google-like, IT search engine that enables IT administrators and security teams to quickly respond to security incidents and analyze event forensics. The tool's web-based inter
The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP conte
ACTFORE delivers AI-powered breach response and data mining solutions that help legal counsel, insurers, and corporations rapidly detect and extract sensitive data from compromised environments. Purpo
Argus is a digital forensic analytics platform that integrates data and uncovers hidden connections from forensic evidence with AI-driven insights. Leveraging a unique combination of AI and forensic d
BloxOne™ Threat Defense extends security and visibility across even the most globally dispersed network to proactively protect users, data and infrastructure wherever they are.
ChipJuice is a software suite created by Texplained for reverse engineering integrated circuits. It enables detailed analysis of IC internal structures, supporting tasks like digital forensics, securi
Cognitech FiA64is a comprehensive software with analysis tools designed for forensic analysis and authentication of digital images. This extensive toolkit will allow the user to investigate the eviden
Combo Binder is a cybersecurity tool developed by StealthMole that specializes in detecting and identifying user credentials leaked as combo lists on the dark web. By scanning hacker forums, Telegram
Command Zero is an autonomous and user-led cyber investigation platform designed to transform security operations in complex enterprise environments. By integrating expert investigative content, advan