2026 Best Software Awards are here!See the list
It's been two months since this profile received a new review
Leave a Review

Oxygen Forensics Reviews & Product Details

Profile Status

This profile is currently managed by Oxygen Forensics but has limited features.

Are you part of the Oxygen Forensics team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Product Avatar Image

Have you used Oxygen Forensics before?

Answer a few questions to help the Oxygen Forensics community

Oxygen Forensics Reviews (2)

Reviews

Oxygen Forensics Reviews (2)

5.0
2 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
konstantinos d.
KD
Small-Business (50 or fewer emp.)
"Swiss Army knife of forensics tools"
What do you like best about Oxygen Forensics?

As a lead instructor and course developer for the state departments Global Anti Terrorism Program I always taught mobile forensics using Oxygen Detective making my like as an instructor effortless. Additionally, as an expert in international, federal and state courts Detective is my primary tool of choice and it's analytics and graphics make presenting to jurors enjoyable and easy. Review collected by and hosted on G2.com.

What do you dislike about Oxygen Forensics?

Nothing. Every time I think Oxygen Detective would be better if... they come out with the solution I was looking for. Review collected by and hosted on G2.com.

Karan S.
KS
DF
Small-Business (50 or fewer emp.)
"Oxygen Forensics the Expert Software"
What do you like best about Oxygen Forensics?

Oxygen Forensic is a good piece of software through which we can do forensics on Android. We can do analysis and make reports, and it helps a lot. Because its graphical user interface is very good. It is user-friendly and does not take much time, and different Android devices are arranged in different ways, which helps a lot in Android data extraction and making reports.

The Oxygen Forensics feature, which I like for Android extraction Oxygen Forensics provides options like Adb, Android OxyAgent Extraction, Android Manual OxyAgent, Android OxyAgent Over Wifi, MTK Anroid Dump, LG Android Dump, Spreadtum Android Dump, Samsung Android Dump, Samsung Exynos Dump, Motorola Anroid Dump, and Hwawei Android Dump. I like this structure in terms of Android extraction from different Android devices. Review collected by and hosted on G2.com.

What do you dislike about Oxygen Forensics?

There is only one thing I don't like about oxygen forensics, and that is that the license for the process is quite costly. Sometimes, when you do an analysis, you need to go to a certain date. Sometimes you don't get some tagging system there, which is available in other software. Review collected by and hosted on G2.com.

There are not enough reviews of Oxygen Forensics for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Palo Alto Cortex XSIAM Logo
Palo Alto Cortex XSIAM
4.3
(475)
Product Description: Palo Alto Networks' Cortex XSIAM is an AI-driven security operations platform designed to transform traditional Security Operations Centers by integrating and automating key functions such as data centralization, threat detection, and incident response. By leveraging machine learning and automation, it enables organizations to detect and respond to threats more efficiently, reducing manual workloads and improving overall security posture. Key Features and Functionality: - Data Centralization: Aggregates data from various sources into a unified platform, providing comprehensive visibility across the enterprise. - AI-Powered Threat Detection: Utilizes machine learning algorithms to identify anomalies and potential threats in real-time. - Automated Incident Response: Streamlines response processes through automation, enabling rapid mitigation of security incidents. - Integrated SOC Capabilities: Combines functions such as Extended Detection and Response , Security Orchestration, Automation, and Response , Attack Surface Management , and Security Information and Event Management into a cohesive platform, eliminating the need for multiple disparate tools. - Scalability: Designed to handle large volumes of data and adapt to the evolving needs of modern enterprises. Primary Value and Problem Solved: Cortex XSIAM addresses the challenges of disjointed data, weak threat defense, and heavy reliance on manual work in traditional SOCs. By centralizing data and automating security operations, it simplifies processes, enhances threat detection accuracy, and accelerates incident response times. This transformation enables organizations to proactively outpace threats, reduce operational costs, and achieve a more robust security posture.
2
Check Point Harmony Endpoint Logo
Check Point Harmony Endpoint
4.5
(286)
Check Point Endpoint Security combines data security, network security, threat prevention technologies and remote access VPN into one package for complete Windows and Mac OS X protection.
3
Belkasoft Logo
Belkasoft
4.7
(132)
Belkasoft X is a complete digital forensic and incident response solution for conducting in-depth investigations on all types of digital media devices and data sources, including computers, mobile devices, RAM, and the cloud. Designed for government and commercial organizations with in-house DFIR teams or those providing DFIR services, it ensures fast and reliable evidence collection, examination, and analysis.
4
Magnet Forensics Logo
Magnet Forensics
4.8
(72)
Magnet Forensics provides digital investigation solutions that acquire, analyze, report on, and manage evidence from digital sources, including mobile devices, computers, IoT devices and cloud services.
5
ExtraHop Logo
ExtraHop
4.6
(68)
ExtraHop Reveal(x) provides cloud-native visibility, detection, and response for the hybrid enterprise.
6
Trellix Network Detection and Response (NDR) Logo
Trellix Network Detection and Response (NDR)
4.1
(66)
FireEye Network Security (NX) solutions protect against known and unknown advanced attacks with the signature-less Multi-Vector Virtual Execution (MVX) engine, conventional intrusion prevention system (IPS) and intelligence-driven detection.
7
Cellebrite Logo
Cellebrite
4.2
(16)
Cellebrite is a global leader in digital intelligence solutions, providing tools and services that empower organizations to access, manage, and analyze digital data effectively. Their comprehensive suite of products supports the entire digital investigation lifecycle, enabling law enforcement agencies, enterprises, and service providers to transform complex data into actionable intelligence. This capability is crucial for solving crimes, ensuring public safety, and addressing various security challenges. Key Features and Functionality: - Comprehensive Digital Forensics Suite: Cellebrite's platform offers an all-inclusive suite that includes advanced extraction tools, data analysis applications, and lab automation solutions. - Advanced Data Extraction: The Universal Forensic Extraction Device (UFED) enables the extraction of data from a wide range of mobile devices, including encrypted content, ensuring comprehensive data retrieval. - In-Depth Data Analysis: Tools like the Physical Analyzer allow for the examination of digital data, uncovering actionable intelligence through advanced decoding, visual event timelines, and customizable reports. - Cloud Data Collection: Cellebrite's solutions facilitate the collection and review of cloud-based evidence from numerous data sources, expanding the scope of investigations. - Artificial Intelligence Integration: The platform harnesses AI to automate tasks, surface insights, and enhance the efficiency of digital investigations. Primary Value and Solutions Provided: Cellebrite's solutions address the critical need for efficient and thorough digital investigations in an era where digital data is pivotal. By offering tools that can access and analyze data from a multitude of devices and platforms, Cellebrite enables organizations to accelerate justice, protect communities, and ensure data privacy. Their technology aids in convicting offenders and bringing justice to victims of various crimes, including child exploitation, homicides, sexual assault, mass violence, drug and human trafficking, fraud, and financial crimes. By transforming complex digital data into clear, actionable intelligence, Cellebrite empowers organizations to navigate the challenges of modern investigations effectively.
8
Parrot Security OS Logo
Parrot Security OS
4.4
(59)
Parrot Security OS is a free and open-source GNU/Linux distribution based on Debian, tailored for security experts, developers, and privacy-conscious users. It offers a comprehensive suite of tools for penetration testing, digital forensics, reverse engineering, and software development, all within a lightweight and flexible environment. Key Features and Functionality: - Extensive Toolset: Parrot Security OS includes over 600 tools for various cybersecurity operations, such as penetration testing, vulnerability assessment, and digital forensics. - Multiple Editions: The distribution offers several editions to cater to different user needs: - Security Edition: Designed for penetration testing and red team operations, providing a full arsenal of ready-to-use tools. - Home Edition: Aimed at daily use, privacy, and software development, with the option to manually install security tools as needed. - IoT Edition: Compatible with Raspberry Pi devices, suitable for embedded systems. - Docker Images: Pre-packaged Docker images for easy deployment in containerized environments. - Lightweight and Modular: Parrot Security OS is efficient even on older hardware, allowing users to select and install only the components they need. - Rolling Release Model: The system follows a rolling release model, ensuring users have access to the latest updates and features. - Privacy and Anonymity Tools: Built-in tools like AnonSurf, Tor, and I2P facilitate anonymous web browsing and enhance user privacy. Primary Value and User Solutions: Parrot Security OS provides a robust and versatile platform for cybersecurity professionals and enthusiasts. Its extensive toolset and modular design allow users to conduct comprehensive security assessments, develop software, and maintain privacy without the need for additional installations. The lightweight nature of the OS ensures optimal performance across a wide range of hardware, making it accessible to a broad user base. By integrating privacy-focused tools, Parrot Security OS addresses the growing need for secure and anonymous computing environments.
9
FTK Forensic Toolkit Logo
FTK Forensic Toolkit
4.4
(37)
FTK Forensic Toolkit (FTK) is a comprehensive digital investigations solution designed to facilitate efficient and thorough forensic analysis. Renowned for its speed, stability, and user-friendly interface, FTK enables investigators to process and analyze digital evidence swiftly, ensuring that critical information is uncovered and cases are resolved promptly. Key Features and Functionality: - Mobile Extraction Processing: FTK offers rapid and collaborative mobile data review capabilities. After imaging Android or iOS devices with a preferred tool, users can ingest the data into FTK for unified analysis alongside related computer evidence. - Entity Management and Social Analyzer: The software automatically identifies known aliases and reveals hidden communication patterns among device users, allowing investigators to visually pinpoint the most communicative entities and frequently used chat applications. - Advanced Multimedia Review: FTK streamlines the examination of multimedia evidence by providing advanced image and facial recognition, as well as similar face matching across datasets. This functionality reduces manual video review time by leveraging artificial intelligence to highlight key elements. - Comprehensive Reporting: Investigators can embed chats, files, emails, multimedia, and timelines directly into reports, facilitating clear and concise presentation of findings. - Timeline Analysis: FTK allows users to view evidence in a timeline format, helping to reveal patterns or events that occurred before or after key artifacts were created. Primary Value and User Solutions: FTK addresses the critical need for a reliable and efficient digital forensic tool that can handle complex investigations involving both mobile and computer data. By integrating advanced processing capabilities with intuitive analysis tools, FTK empowers law enforcement agencies, corporate security teams, and legal professionals to uncover crucial intelligence, establish connections between entities, and present findings effectively. This comprehensive approach ensures that users can conduct thorough investigations, maintain data integrity, and achieve faster case resolutions.
10
Microsoft Purview Audit Logo
Microsoft Purview Audit
4.3
(34)
Secure your environment with multicloud identity and access management
Show More

No Discussions for This Product Yet

Be the first to ask a question and get answers from real users and experts.

Start a discussion
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Oxygen Forensics