AD Enterprise

AD Enterprise

AccessData
+
+

Related Products

  • Securden Endpoint Privilege Manager
    6 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,683 Ratings
    Visit Website
  • NinjaOne
    4,573 Ratings
    Visit Website
  • Graylog
    405 Ratings
    Visit Website
  • LegalEdge
    17 Ratings
    Visit Website
  • Iru
    1,488 Ratings
    Visit Website
  • TeleRay
    6 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,249 Ratings
    Visit Website
  • Polonious
    2 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website

About

Today’s digital forensics teams face many challenges in a world filled with an overwhelming amount of data. From multiple office locations, to massive employee pools and remote workers, AD Enterprise provides deep visibility into live data directly at the endpoint, helping you conduct faster, more targeted enterprise-wide post-breach, HR and compliance investigations in a single, robust solution. With AD Enterprise, you can respond quickly, remotely and covertly while maintaining chain of custody, and facilitate focused forensic investigations and post-breach analysis, without interruption to business operations. Preview live data at the endpoint, then filter on any attributes and choose to retrieve only the data that matters to your investigation, saving time and cost. Perform collections from endpoints in multiple locations by deploying our remote Enterprise Agent to a broad range of operating systems, including Windows, Mac, Linux and more.

About

CyFIR digital security and forensic analysis solutions provide unparalleled endpoint visibility, scalability, and speed to resolution. Cyber resilient organizations suffer little to no damage in the event of a breach. CyFIR cyber risk solutions identify, analyze, and resolve active or potential threats 31x faster than traditional EDR tools. We live in a post-breach world where data breaches are more frequent and more aggressive in their capacity to do harm. Attack surfaces are expanding beyond the walls of an organization to encompass thousands of connected devices and computer endpoints located throughout remote facilities, cloud and SaaS providers, controlled foreign assets, and other locations.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Digital forensics teams searching for a forensics system solution that provides deep visibility into live data directly at the endpoint

Audience

Companies of all sizes searching for a Cyber Risk Management solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

AccessData
Founded: 1987
United States
accessdata.com/products-services/ad-enterprise

Company Information

CyFIR
Founded: 2010
United States
www.cyfir.com

Alternatives

Magnet AXIOM Cyber

Magnet AXIOM Cyber

Magnet Forensics

Alternatives

AD Enterprise

AD Enterprise

AccessData
Cyber Triage

Cyber Triage

Sleuth Kit Labs
Cyber Triage

Cyber Triage

Sleuth Kit Labs
Fidelis Elevate

Fidelis Elevate

Fidelis Security
Binalyze AIR

Binalyze AIR

Binalyze

Categories

Categories

Endpoint Detection and Response (EDR) Features

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Integrations

AD Lab
Amazon Web Services (AWS)
Azure Firewall
Brainspace
Check Point CloudGuard
Intelligent Management Center
Jamf Now
KLD Analytics
KLDiscovery
MOBILedit!
Microsoft 365
Microsoft Defender Antivirus
Microsoft Exchange
Microsoft OneDrive
Microsoft SharePoint
Quin-C
Relativity
SecureDoc CloudVM
Trellix Data Encryption

Integrations

AD Lab
Amazon Web Services (AWS)
Azure Firewall
Brainspace
Check Point CloudGuard
Intelligent Management Center
Jamf Now
KLD Analytics
KLDiscovery
MOBILedit!
Microsoft 365
Microsoft Defender Antivirus
Microsoft Exchange
Microsoft OneDrive
Microsoft SharePoint
Quin-C
Relativity
SecureDoc CloudVM
Trellix Data Encryption
Claim AD Enterprise and update features and information
Claim AD Enterprise and update features and information
Claim CyFIR Investigator and update features and information
Claim CyFIR Investigator and update features and information