15 years helping Israeli businesses
choose better software

Digital Forensics Software

Digital Forensics software streamlines investigation and examination of security incidents through email analysis, network forensics, disk and data capture, mobile device analysis, and file analysis.

Israel Show local products
Enables you to detect and block malware providing real-time threat intelligence and complete web, device, and data control.
Sophos Intercept X is the worlds most comprehensive next-generation endpoint protection solution built to stop the widest range of attacks. Intercept X combines multiple techniques including signatureless exploit prevention, deep learning malware detection, anti-ransomware capabilities, root cause analysis, and more. Learn more about Intercept X Endpoint

Features

  • Threat Intelligence Software
  • Endpoint Protection Software
  • Anomaly/Malware Detection
  • Alerts/Notifications
  • Reporting/Analytics
  • Prioritization
  • Incident Management Software
  • Investigation Management Software
  • Search/Filter
Caseboard is an integratable intelligence suite for visual data analysis, database integration, for investigating and preventing fraud.
Caseboard is an integratable intelligence suite for visual data analysis, database integration, for investigating and preventing fraud. With Caseboard, the tools available for users include link analysis, georeferncing, facial recognition, temporal pattern analysis, data enrichment, graphic representation of data analysis, and more. Learn more about Caseboard

Features

  • Threat Intelligence Software
  • Endpoint Protection Software
  • Anomaly/Malware Detection
  • Alerts/Notifications
  • Reporting/Analytics
  • Prioritization
  • Incident Management Software
  • Investigation Management Software
  • Search/Filter
Exterro provides e-discovery, data governance, and cybersecurity solutions for legal and IT professionals to manage data risks.
Exterro Data Risk Management is a comprehensive platform that integrates e-discovery, data governance, privacy, digital forensics, and cybersecurity compliance. It streamlines processes like legal hold notices and document review, ensuring efficient management of data risks. Exterro also offers solutions for defensible global data retention schedules to minimize data risk, with tools designed to help companies adhere to data privacy regulations effectively. Additionally, Exterro provides advanced AI assistance specifically tailored for cybersecurity professionals, enhancing their capabilities in managing data risks and ensuring compliance with industry standards. Learn more about Exterro E-Discovery Software Suite

Features

  • Threat Intelligence Software
  • Endpoint Protection Software
  • Anomaly/Malware Detection
  • Alerts/Notifications
  • Reporting/Analytics
  • Prioritization
  • Incident Management Software
  • Investigation Management Software
  • Search/Filter
Digital forensics solution for Law Enforcement that recovers, processes & analyzes digital evidence from multiple sources on a unified.
Magnet AXIOM is a digital forensics solution that helps Law Enforcement recover, process & analyze evidence-related data from computers, cloud and mobile devices on a unified interface. AXIOM provides easy reporting that presents data in a clear and direct manner. Some of the built-in analytics features such as Connections, Timeline and Magnet.AI can lead to breakthroughs in your examinations. Learn more about Magnet AXIOM

Features

  • Threat Intelligence Software
  • Endpoint Protection Software
  • Anomaly/Malware Detection
  • Alerts/Notifications
  • Reporting/Analytics
  • Prioritization
  • Incident Management Software
  • Investigation Management Software
  • Search/Filter
Electronic evidence examination and digital data processing solution that provides IoT, mobile/smartphone, and hard drive forensics.
Electronic evidence examination and digital data processing solution that provides IoT, mobile/smartphone, and hard drive forensics. Learn more about E3:Universal

Features

  • Threat Intelligence Software
  • Endpoint Protection Software
  • Anomaly/Malware Detection
  • Alerts/Notifications
  • Reporting/Analytics
  • Prioritization
  • Incident Management Software
  • Investigation Management Software
  • Search/Filter
Network Investigation and Post-Breach Analysis
Enterprise provides deep visibility into live data directly at the endpoint, helping you conduct faster, more targeted enterprise-wide post-breach, HR and compliance investigations in a single, robust solution. With Enterprise, you can respond quickly, remotely and discreetly while maintaining chain of custody, and facilitate focused forensic investigations and post-breach analysis, without interruption to business operations. Learn more about Forensic Toolkit (FTK)

Features

  • Threat Intelligence Software
  • Endpoint Protection Software
  • Anomaly/Malware Detection
  • Alerts/Notifications
  • Reporting/Analytics
  • Prioritization
  • Incident Management Software
  • Investigation Management Software
  • Search/Filter
Aware enables federated search of collaboration data from a defensible archive that captures a full record of workplace communications.
Aware accelerates time to discovery when conducting forensic search, investigations, and eDiscovery in data sets from collaboration tools like Slack, Teams, and Zoom. Use AI-powered federated search to search multiple platforms from a single, defensible archive that includes a full record of images, attachments, and modifications. Refine results by custodian, keyword, date, message type and more for precise analysis, reducing the burden of manual reviews in time-sensitive investigations. Learn more about Aware

Features

  • Threat Intelligence Software
  • Endpoint Protection Software
  • Anomaly/Malware Detection
  • Alerts/Notifications
  • Reporting/Analytics
  • Prioritization
  • Incident Management Software
  • Investigation Management Software
  • Search/Filter
MailXaminer - A Forensic Tool Designed with the Intent to Recover, Read & Analysis Various facets of Email File Format.
MailXaminer is primarily designed using advanced technology for analysis of email files. The tool assists cyber experts in resolving Digital Crime cases using a semantic approach. This utility is attuned with desktop based & web based/cloud email file formats. MailXaminer allows investigators to analyze data through various view options like HTML, MIME, HEX, Message Header, etc. Software also provides various Search Mechanisms, Export Options as well as Team Collaboration feature. Learn more about MailXaminer

Features

  • Threat Intelligence Software
  • Endpoint Protection Software
  • Anomaly/Malware Detection
  • Alerts/Notifications
  • Reporting/Analytics
  • Prioritization
  • Incident Management Software
  • Investigation Management Software
  • Search/Filter
Trellix Network Security uses behavior analysis and machine learning to detect and block advanced cyberattacks across networks.
Trellix Network Security is a network detection and response solution that helps organizations detect, block, and respond to advanced targeted and other evasive attacks. The software leverages signatureless threat detection, machine learning and artificial intelligence, and correlation engines to identify known and unknown threats in real time while enabling back-in-time detection. Trellix Network Security provides visibility across diverse network environments to protect against zero-day, polymorphic, and ransomware attacks. The solution maps detected threats and can be deployed in-line, out of band, on-premises, in the cloud, and in hybrid environments. Learn more about Trellix Network Security

Features

  • Threat Intelligence Software
  • Endpoint Protection Software
  • Anomaly/Malware Detection
  • Alerts/Notifications
  • Reporting/Analytics
  • Prioritization
  • Incident Management Software
  • Investigation Management Software
  • Search/Filter
It is a digital forensics solution that helps businesses rebuild data, retrace actions, manage investigations, and more.
It is a digital forensics solution that helps businesses rebuild data, retrace actions, manage investigations, and more. Learn more about IBM QRadar Incident Forensics

Features

  • Threat Intelligence Software
  • Endpoint Protection Software
  • Anomaly/Malware Detection
  • Alerts/Notifications
  • Reporting/Analytics
  • Prioritization
  • Incident Management Software
  • Investigation Management Software
  • Search/Filter
A central platform to rapidly Extract, Analyse and Report on data from 1,000s of digital devices.
An all-in-one Digital Forensics platform that enables organisations to extract, analyse and create court-ready reports on data from a range of devices including PCs, laptops, mobile phones, removable media, and smart devices. Learn more about Detego Digital Forensics

Features

  • Threat Intelligence Software
  • Endpoint Protection Software
  • Anomaly/Malware Detection
  • Alerts/Notifications
  • Reporting/Analytics
  • Prioritization
  • Incident Management Software
  • Investigation Management Software
  • Search/Filter
Israel Local product
Harmony Endpoint Protection is an endpoint security solution that protects against malware, ransomware, phishing, and other threats.
Harmony Endpoint Protection is an endpoint security solution that provides comprehensive protection for remote workforces and organizations against modern threats like ransomware, phishing, malware, and data breaches. The unified platform integrates advanced threat prevention, fastest recovery, and optimized total cost of ownership in a single, efficient solution that is easy to deploy, manage, and integrate across networks, clouds, and devices. Learn more about Harmony Endpoint

Features

  • Threat Intelligence Software
  • Endpoint Protection Software
  • Anomaly/Malware Detection
  • Alerts/Notifications
  • Reporting/Analytics
  • Prioritization
  • Incident Management Software
  • Investigation Management Software
  • Search/Filter
D3 SOAR is a platform with a fully embedded MITRE ATT&CK Module, for better Threat Intelligence, Monitoring, and Hunting.
D3 SOAR is a platform with a fully embedded MITRE ATT&CK Module, D3 Security helps SOC teams become Threat Hunters with streamlined workflows and $$$,$$$ in cost savings per year. With D3 SOAR, you can unify teams across borders and job functions: Easily manage all Incidents and Cases, collaborate on complex security and legal investigations, conduct post-incident analyses, derive actionable analytics, and automatically report on progress to continually improve your security posture. Learn more about D3 SOAR

Features

  • Threat Intelligence Software
  • Endpoint Protection Software
  • Anomaly/Malware Detection
  • Alerts/Notifications
  • Reporting/Analytics
  • Prioritization
  • Incident Management Software
  • Investigation Management Software
  • Search/Filter
On-premise platform for Windows that enables you to recover, collect, search, and convert email data.
Software for Email Forensics, eDiscovery & Conversion Leverage the same email processing tool as Fortune 500 companies, government agencies and legal professionals around the globe. Quality software from Switzerland. Learn more about Aid4Mail

Features

  • Threat Intelligence Software
  • Endpoint Protection Software
  • Anomaly/Malware Detection
  • Alerts/Notifications
  • Reporting/Analytics
  • Prioritization
  • Incident Management Software
  • Investigation Management Software
  • Search/Filter
Tool for the analysis of electronic evidence by are law enforcement, corporate investigators.
Tool for the analysis of electronic evidence by are law enforcement, corporate investigators. Learn more about Forensic Explorer

Features

  • Threat Intelligence Software
  • Endpoint Protection Software
  • Anomaly/Malware Detection
  • Alerts/Notifications
  • Reporting/Analytics
  • Prioritization
  • Incident Management Software
  • Investigation Management Software
  • Search/Filter
Tech solution to deter document leaks: can detect the leaker with just a photo of the compromised confidential document.
The state-of-the-art ITM technology, LeaksID, is designed to protect sensitive documents from insider threats. It offers a comprehensive solution for managing and preventing data and document leaks through its integration features. By utilizing a steganographic technique to embed undetectable and distinctive marks into confidential documents, LeaksID is an efficient deterrent against data breaches. Learn more about LeaksID

Features

  • Threat Intelligence Software
  • Endpoint Protection Software
  • Anomaly/Malware Detection
  • Alerts/Notifications
  • Reporting/Analytics
  • Prioritization
  • Incident Management Software
  • Investigation Management Software
  • Search/Filter
Email security solution that enables businesses to proactively identify, analyze and respond to email attacks in real-time.
Email security solution that enables businesses to proactively identify, analyze and respond to email attacks in real-time. Learn more about Barracuda Forensics and Incident Response

Features

  • Threat Intelligence Software
  • Endpoint Protection Software
  • Anomaly/Malware Detection
  • Alerts/Notifications
  • Reporting/Analytics
  • Prioritization
  • Incident Management Software
  • Investigation Management Software
  • Search/Filter
Cyber threat intelligence platform that helps streamline risk assessments, map cyber activities and facilitate fraud investigations.
Cyber threat intelligence platform that helps streamline risk assessments, map cyber activities, facilitate online fraud investigations, and more. Learn more about DomainTools

Features

  • Threat Intelligence Software
  • Endpoint Protection Software
  • Anomaly/Malware Detection
  • Alerts/Notifications
  • Reporting/Analytics
  • Prioritization
  • Incident Management Software
  • Investigation Management Software
  • Search/Filter
Allows crime scene documentation as well as 3D reconstruction of crime scenes, traffic accidents and fires
Allows crime scene documentation as well as 3D reconstruction of crime scenes, traffic accidents and fires Learn more about SceneWorks

Features

  • Threat Intelligence Software
  • Endpoint Protection Software
  • Anomaly/Malware Detection
  • Alerts/Notifications
  • Reporting/Analytics
  • Prioritization
  • Incident Management Software
  • Investigation Management Software
  • Search/Filter
Digital Forensic Case Management solution covering evidence management, notes, asset tracking and ISO compliance.
Digital Forensic Case Management solution covering evidence management, notes, asset tracking and ISO compliance. Learn more about Lima

Features

  • Threat Intelligence Software
  • Endpoint Protection Software
  • Anomaly/Malware Detection
  • Alerts/Notifications
  • Reporting/Analytics
  • Prioritization
  • Incident Management Software
  • Investigation Management Software
  • Search/Filter
Advanced digital forensics for thorough incident investigations and gathering actionable intelligence to respond to threats effectively
Fidelis Elevate is the only XDR Solution that delivers endpoint security, Network Security, Deception & active Directory protection in a single platform, making it the powerhouse of a cyber-resilient environment. Fidelis Elevate offers advanced digital forensics capabilities, enabling organizations to conduct thorough investigations and gather actionable insights to respond to security incidents effectively. By analyzing digital evidence, reconstructing attack scenarios, and identifying the root cause of security incidents, Fidelis Elevate helps organizations understand the scope and impact of security breaches. With Fidelis Elevate, organizations can accelerate incident response, minimize damage, and strengthen their overall security posture. Learn more about Fidelis Elevate

Features

  • Threat Intelligence Software
  • Endpoint Protection Software
  • Anomaly/Malware Detection
  • Alerts/Notifications
  • Reporting/Analytics
  • Prioritization
  • Incident Management Software
  • Investigation Management Software
  • Search/Filter
A tool that helps forensics investigators map crime scenes and collect data faster with guided workflows.
A tool that helps forensics investigators map crime scenes and collect data faster with guided workflows. Learn more about Trimble Forensics Capture

Features

  • Threat Intelligence Software
  • Endpoint Protection Software
  • Anomaly/Malware Detection
  • Alerts/Notifications
  • Reporting/Analytics
  • Prioritization
  • Incident Management Software
  • Investigation Management Software
  • Search/Filter
On Demand By-the-Hour Forensic Analysis & Remote Remediation
Companies need digital tools to help detect and respond to a cyber incident. Many traditional solutions are simply too expensive. Even worse, traditional solutions often have restrictive tool architectures that prevent investigators from moving quickly when an attack happens. With worldwide availability and by-the-hour pricing, CyFIR Investigator is an endpoint detection and response solution that is affordable and scalable so companies can get the best protection and only pay for what they need Learn more about CyFIR Investigator

Features

  • Threat Intelligence Software
  • Endpoint Protection Software
  • Anomaly/Malware Detection
  • Alerts/Notifications
  • Reporting/Analytics
  • Prioritization
  • Incident Management Software
  • Investigation Management Software
  • Search/Filter
Digital forensics solution that offers automated incident response, orchestration, endpoint visibility, and more.
Digital forensics solution that offers automated incident response, orchestration, endpoint visibility, and more. Learn more about Cyber Triage

Features

  • Threat Intelligence Software
  • Endpoint Protection Software
  • Anomaly/Malware Detection
  • Alerts/Notifications
  • Reporting/Analytics
  • Prioritization
  • Incident Management Software
  • Investigation Management Software
  • Search/Filter
EnCase Forensic is designed to help investigators search and identify potential evidence across computers, laptops, and mobile devices.
EnCase Forensic is designed to help investigators search and identify potential evidence across computers, laptops, and mobile devices. Learn more about EnCase Forensic

Features

  • Threat Intelligence Software
  • Endpoint Protection Software
  • Anomaly/Malware Detection
  • Alerts/Notifications
  • Reporting/Analytics
  • Prioritization
  • Incident Management Software
  • Investigation Management Software
  • Search/Filter