AD Enterprise

AD Enterprise

AccessData
Magnet AXIOM Cyber

Magnet AXIOM Cyber

Magnet Forensics
+
+

Related Products

  • Securden Endpoint Privilege Manager
    6 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,683 Ratings
    Visit Website
  • NinjaOne
    4,573 Ratings
    Visit Website
  • Graylog
    405 Ratings
    Visit Website
  • LegalEdge
    17 Ratings
    Visit Website
  • Iru
    1,488 Ratings
    Visit Website
  • TeleRay
    6 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,249 Ratings
    Visit Website
  • Polonious
    2 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website

About

Today’s digital forensics teams face many challenges in a world filled with an overwhelming amount of data. From multiple office locations, to massive employee pools and remote workers, AD Enterprise provides deep visibility into live data directly at the endpoint, helping you conduct faster, more targeted enterprise-wide post-breach, HR and compliance investigations in a single, robust solution. With AD Enterprise, you can respond quickly, remotely and covertly while maintaining chain of custody, and facilitate focused forensic investigations and post-breach analysis, without interruption to business operations. Preview live data at the endpoint, then filter on any attributes and choose to retrieve only the data that matters to your investigation, saving time and cost. Perform collections from endpoints in multiple locations by deploying our remote Enterprise Agent to a broad range of operating systems, including Windows, Mac, Linux and more.

About

Enterprise organizations large and small use Magnet Forensics’ solutions to close cases quickly with powerful analytics that surface intelligence & insights while also being able to leverage automation and the cloud to reduce downtime and enable remote collaboration at scale. Some of the world’s largest corporations use Magnet Forensics to investigate IP theft, fraud, employee misconduct and incident response cases such as ransomware, business email compromise and phishing attacks. The benefits of hosting your applications in the cloud ranges from cost savings to more centralized operations. Deploy AXIOM Cyber in Azure or AWS to leverage the benefits of cloud computing plus the ability to perform off-network remote collections of Mac, Windows and Linux endpoints.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Digital forensics teams searching for a forensics system solution that provides deep visibility into live data directly at the endpoint

Audience

Enterprises of all sizes that conduct threat investigations looking for a powerful Investigation Management solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 5.0 / 5
ease 4.0 / 5
features 5.0 / 5
design 5.0 / 5
support 4.0 / 5

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

AccessData
Founded: 1987
United States
accessdata.com/products-services/ad-enterprise

Company Information

Magnet Forensics
Founded: 2009
Canada
www.magnetforensics.com/products/magnet-axiom-cyber/

Alternatives

Magnet AXIOM Cyber

Magnet AXIOM Cyber

Magnet Forensics

Alternatives

Belkasoft X

Belkasoft X

Belkasoft
Cyber Triage

Cyber Triage

Sleuth Kit Labs
SalvationDATA

SalvationDATA

SalvationDATA Technology
Binalyze AIR

Binalyze AIR

Binalyze

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Investigation Management Features

Contact Management
Data Management
Incident Management
Reporting & Statistics
Subject Profiles

eDiscovery Features

Case Analytics
Compliance Management
Discussion Threads
Document Indexing
Document Tracking
Full Text Extraction
Keyword Search
Metadata Extraction
Topic Clustering

Integrations

AD Lab
Amazon Web Services (AWS)
Azure Firewall
Check Point CloudGuard
Gmail
Google Drive
Intelligent Management Center
Jamf Now
KLD Analytics
KLDiscovery
LTU Visual Search API
MOBILedit!
Microsoft 365
Microsoft OneDrive
Microsoft SharePoint
Microsoft Teams
Quin-C
SecureDoc CloudVM
Trellix Data Encryption

Integrations

AD Lab
Amazon Web Services (AWS)
Azure Firewall
Check Point CloudGuard
Gmail
Google Drive
Intelligent Management Center
Jamf Now
KLD Analytics
KLDiscovery
LTU Visual Search API
MOBILedit!
Microsoft 365
Microsoft OneDrive
Microsoft SharePoint
Microsoft Teams
Quin-C
SecureDoc CloudVM
Trellix Data Encryption
Claim AD Enterprise and update features and information
Claim AD Enterprise and update features and information
Claim Magnet AXIOM Cyber and update features and information
Claim Magnet AXIOM Cyber and update features and information