Choose a language
You’re seeing this ad based on the product’s relevance to this page. Sponsored content does not receive preferential treatment in any of G2’s ratings.
By Cellebrite
How would you rate your experience with Cellebrite?
File Analysis
Based on 12 Cellebrite reviews.
Identifies potentially malicious files and applications for threats files and applications for abnormalities and threats.
Memory Analysis
This feature was mentioned in 12 Cellebrite reviews.
Analyzes infortmation from a computer or other endpoint's memory dump for information removed from hard drive.
Registry Analysis
10 reviewers of Cellebrite have provided feedback on this feature.
Identifies recently accessed files and applications for abnormalities and threats.
Email Analysis
This feature was mentioned in 11 Cellebrite reviews.
Parses and/or extracts emails and associated content for malware, phishing, other data that can be used in investigations.
Linux Analysis
Based on 11 Cellebrite reviews.
Allows for parsing and/or extraction of artifacts native to Linux OS including but not limited to system logs, SSH activity, and user accounts.
Incident Alerts
Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.
Anomaly Detection
This feature was mentioned in 10 Cellebrite reviews.
Constantly monitors activity related to user behavior and compares activity to benchmarked patterns.
Continuous Analysis
Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Decryption
11 reviewers of Cellebrite have provided feedback on this feature.
Facilitates the decryption of files and data stored using cryptographic algorithms.
Incident Reports
Produces reports detailing trends and vulnerabilities related to their network and infrastructure.
Remediation Suggestions
As reported in 10 Cellebrite reviews.
Provides relevant and helpful suggestions for vulnerability remediation upon detection.
Response Automation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
AI Text Generation
Allows users to generate text based on a text prompt.
AI Text Summarization
Condenses long documents or text into a brief summary.