Alternatives to Truxton

Compare Truxton alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Truxton in 2026. Compare features, ratings, user reviews, pricing, and more from Truxton competitors and alternatives in order to make an informed decision for your business.

  • 1
    Magnet AXIOM Cyber

    Magnet AXIOM Cyber

    Magnet Forensics

    Enterprise organizations large and small use Magnet Forensics’ solutions to close cases quickly with powerful analytics that surface intelligence & insights while also being able to leverage automation and the cloud to reduce downtime and enable remote collaboration at scale. Some of the world’s largest corporations use Magnet Forensics to investigate IP theft, fraud, employee misconduct and incident response cases such as ransomware, business email compromise and phishing attacks. The benefits of hosting your applications in the cloud ranges from cost savings to more centralized operations. Deploy AXIOM Cyber in Azure or AWS to leverage the benefits of cloud computing plus the ability to perform off-network remote collections of Mac, Windows and Linux endpoints.
  • 2
    Case Closed Software

    Case Closed Software

    Crime Tech Solutions

    Case Closed Software is the leading CJIS-Compliant case management software for specialized and multi-jurisdictional investigative units. With the most adaptable and powerful feature set on the market. CASE CLOSED SOFTWARE™ is the best investigation management system available. Case Closed Software is powerful web-based investigative case management software designed for specialized, multi-jurisdictional investigation units. Case Closed Software is CJIS-Compliant and is available both on our über-secure cloud or on your own servers. The software is the gold standard for international agencies, specialized task forces, state bureaus of investigation, gang and organized crime units, and other more specialized investigative agencies. Manage and track cases from start to finish, including court status, disposition, charges, images, defendants and much more. A couple of clicks and you can email your entire case file. All case documents will automatically attach to the email and ready.
  • 3
    FTK Forensic Toolkit
    Zero in on relevant evidence quickly, conduct faster searches and dramatically increase analysis speed with FTK®, the purpose-built solution that interoperates with mobile device and e-discovery technology. Powerful and proven, FTK processes and indexes data upfront, eliminating wasted time waiting for searches to execute. No matter how many different data sources you’re dealing with or the amount of data you have to cull through, FTK gets you there quicker and better than anything else. FTK uses distributed processing and is the only forensics solution to fully leverage multi-thread/multi-core computers. While other forensics tools waste the potential of modern hardware solutions, FTK uses 100 percent of its hardware resources, helping investigators find relevant evidence faster. Since indexing is done up front, filtering and searching are completed more efficiently than with any other solution.
  • 4
    EnCase Forensic
    The Gold Standard in Forensic Investigations – including Mobile Acquisition. Improve investigation efficiency with the release of optical character recognition (OCR) support that seamlessly extracts embedded text from scanned images, documents and PDFs as part of the evidence collection workflow. 21.2 also expands social media artifact support and includes an enhanced workflow with a new summary view that allows users to cross-reference disparate artifact types, significantly improving evidence processing workflows. OpenText Security (formerly Guidance Software) created the category for digital investigation software with EnCase Forensic in 1998. EnCase has maintained its reputation as the gold standard in criminal investigations and was named the Best Computer Forensic Solution for eight consecutive years by SC Magazine. No other solution offers the same level of functionality, flexibility, and has the track record of court-acceptance as EnCase Forensic.
  • 5
    Qintel CrossLink
    When users first open CrossLink they are met with the words “Know More.” This ethos powers CrossLink. How can we help everyone, be it a SOC analyst, an investigator, or an incident responder, tell a better story around their own data? Search results from six synergistic verticals of network and actor-centric data quickly provide key information that can be assembled and shared across an organization with the click of a button. CrossLink was designed to address the deficiencies in the current marketplace by a team of analysts who have decades of hands-on experience investigating a full range of threats. Data verticals include an unparalleled range of actor profiles, communications, historical Internet registration records, IP reputation, digital currency records, and passive DNS telemetry that jump-start investigations into actors and incidents. CrossLink provides users with the ability to create alerts and lightweight management functions via shareable case folders.
  • 6
    Quin-C

    Quin-C

    AccessData

    AccessData® is reimagining digital forensics and legal review to help you uncover critical evidence faster, make more meaningful connections across data and build stronger cases. With Quin-C™, a pioneering technology from AccessData, you can empower forensic & legal teams at every skill level to conduct and close more accurate, advanced investigations faster than ever before. Quin-C works seamlessly with the AccessData solutions you already know and trust, to give you maximum control over the way you collect, process, review, analyze and report on key pieces of data. Feature-rich and easy to use, Quin-C delivers groundbreaking technology to maximize the output of investigative, forensic, IT and legal teams alike. In combination with AccessData core products, Quin-C is the fastest, most scalable solution on the market today. Quin-C dramatically improves efficiency and throughput with next-generation features that guide current and future investigations.
  • 7
    Cognitech Video Investigator
    Part of the Tri-Suite64 software package, Video Investigator® 64 is designed to process video files and still images alike, including enhancing CCTV footage. There are a variety of methods that can be used in either scenario, which is what makes Video Investigator® 64 such a powerful video and image enhancement software package. No other software will offer the vast array of filters and features to enhance video and images like Video Investigator offers its users. Get everything other image enhancement software, video deblurring software, and video resolution enhancement software has all in one package and one software with even more features. Video Investigator is the best forensic video enhancement software available. To enhance CCTV footage it is important to be able to select and play the frame sequences that may or may not be connected on a time-line. The Movie Controller provides advanced video playback with audio support allowing the end-user to adjust which frames of video.
  • 8
    Belkasoft Remote Acquisition
    Belkasoft Remote Acquisition (Belkasoft R) is a new digital forensic and incident response tool developed specifically for remote extraction of hard and removable drives, RAM, connected mobile devices, and even specific types of data. Belkasoft R will be useful in cases when an incident response analyst or a digital forensic investigator needs to gather evidence quickly and the devices in question are situated in geographically distributed locations. With Belkasoft R, there is no longer need to interrupt an employees' daily routine or draw excessive attention to your investigation. Belkasoft R saves your time and money doing a forensically sound remote acquisitions: no more excessive costs and extra time for travels. No more geographical challenges and expensive trips. No need in having trained specialists in all locations of your organization’s offices.
  • 9
    Cellebrite

    Cellebrite

    Cellebrite

    All the functionality you need to conduct in-depth analysis and generate custom reports to reveal the truth. With advanced searching and filtering capabilities, and built-in AI media categorization, investigators easily find Internet History, Downloads, Locations, Recent searches, and more. Obtain user activity from Windows memory, and get registry artifacts including jump list, Windows 10 timeline activity, shellbags, SRUM, and more. Review device history from Windows Volume Shadow Copies. Review history in APFS Snapshots and Time Machine backups, display and search Spotlight metadata and KnowledgeC data, review network connections, recent documents, user activity, and more. Ingest data into Cellebrite Pathfinder, Berla, APOLLO and, ICAC tools such as Project Vic and PhotoDNA. Share your case findings with other stakeholders using customized reporting capabilities. The most complete workstation designed to handle the most rigorous datasets for digital intelligence and eDiscovery.
  • 10
    ProDiscover

    ProDiscover

    ProDiscover

    ProDiscover forensics suite addresses a wide range of cybercrime scenarios encountered by law enforcement and corporate internal security investigators. ProDiscover is widely used in Computer Forensics and Incident Response. The product suite is also equipped with diagnostic and evidence collection tools for corporate policy compliance investigations and electronic discovery. ProDiscover helps in efficiently uncovering files and data of interest. Wizards, dashboards and timeline views help in speedily discovering vital information. Investigators are provided with a wide range of tools and integrated viewers to explore the evidence disks and extract artifacts relevant to the investigation. ProDiscover combines speed and accuracy, with ease of use and is available at an affordable price. Launched in 2001, ProDiscover has a rich history. It was one of the first products to support remote forensic capabilities.
  • 11
    OSForensics

    OSForensics

    PassMark Software

    Extract forensic data from computers, quicker and easier than ever. Uncover everything hidden inside a PC. Discover relevant data faster through high performance file searching and indexing. Extract passwords, decrypt files and recover deleted files quickly and automatically from Windows, Mac and Linux file systems. Identify evidence and suspicious activity through our hash matching and drive signature analysis features. Identify and analyze all files and even automatically create a timeline of all user activity. 360° Case Management Solution. Manage your entire digital investigation with OSF’s new reporting features. Build custom reports, add narratives and even attach your other tools’ reports to the OSF report. Volatility Workbench is a graphical user interface (GUI) for the Volatility tool. OSForensics courses offered to suit a diverse range of users and skill sets. Write an image concurrently to multiple USB Flash Drives.
    Starting Price: $799 per user per year
  • 12
    CloudNine

    CloudNine

    CloudNine Discovery

    CloudNine is a cloud-based eDiscovery automation platform that streamlines the litigation discovery, audits, and investigations by allowing users to review, upload, and create documents in a central location. With its comprehensive suite of professional services that include discovery consulting, computer forensics, managed review, online hosting, information, governance, litigation support, and project management, CloudNine dramatically reduces the overall costs of eDiscovery processing. Law firms and corporations can save time and money by consolidating all of their data collection, processing, and review requirements by leveraging CloudNine’s self-service eDiscovery software.
    Starting Price: $35.00/month
  • 13
    LexisNexis Trail Tracker
    LexisNexis® Trail Tracker™ enables investigators to plan a course of action for each investigation, identify activities needed, document investigations, create reminders and manage records. The workflow enablers include tracking cases by status, tracking referral tips, assigning claims to specific departments for review, assigning cases to investigators and managing investigator workloads. LexisNexis® Trail Tracker™ allows for tracking cases by status, tracking referral tips, assigning claims to specific departments for review, assigning cases to investigators and managing investigator workloads. Trail Tracker™ also gives Special Investigations Unit (SIU) management an effective tool to measure investigator progress on files, trace recoveries and savings, and create reports on unit activities. Increased efficiency and consistency as the result of using a single system for storing all information relevant to a case.
  • 14
    Autopsy

    Autopsy

    Basis Technology

    Autopsy® is the premier end-to-end open source digital forensics platform. Built by Basis Technology with the core features you expect in commercial forensic tools, Autopsy is a fast, thorough, and efficient hard drive investigation solution that evolves with your needs. Tens of thousands of law enforcement and corporate cyber investigators around the world use Autopsy. Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It is used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recover photos from your camera's memory card. Everyone wants results yesterday. Autopsy runs background tasks in parallel using multiple cores and provides results to you as soon as they are found. It may take hours to fully search the drive, but you will know in minutes if your keywords were found in the user's home folder. See the fast results page for more details.
  • 15
    Falcon Forensics

    Falcon Forensics

    CrowdStrike

    Falcon Forensics offers comprehensive data collection while performing triage analysis during an investigation. Forensic security often entails lengthy searches with numerous tools. Simplify your collection and analysis to one solution to speed triage. Incident responders can respond faster to investigations, conduct compromise assessments along with threat hunting and monitoring with Falcon Forensics. Pre-built dashboards, easy search, and view data capabilities empower analysts to search vast amounts of data, including historical artifacts, quickly. Falcon Forensics automates data collection and provides detailed information around an incident. Responders can tap into full threat context without lengthy queries or full disk image collections. Provides incident responders a single solution to analyze large quantities of data both historically and in real-time to uncover vital information to triage an incident.
  • 16
    Binalyze AIR
    Binalyze AIR is a market-leading Digital Forensics and Incident Response platform that allows enterprise and MSSP security operations teams to collect full forensic evidence at speed and scale. Our incident response investigation capabilities such as triage, timeline and remote shell help to close down DFIR investigations in record time.
  • 17
    ADF Cloud Platform

    ADF Cloud Platform

    ADF Solutions

    ADF Solutions is the leading provider of digital forensic and media exploitation tools. These tools are used for processing and analyzing Android/iOS smartphones, mobile devices, computers, external drives, drive images, and other media storage (USB flash drives, memory cards, etc.) ADF triage software is all about speed, scalability, ease-of-use, and relevant results. The tools have a proven track record in reducing forensic backlogs, streamlining digital investigations and rapid access to digital evidence and intelligence. Our customers include federal, state and local law enforcement agencies, military and defense agencies, Office of Inspector General offices, Attorneys General, prosecutors, and other investigative professionals worldwide.
    Starting Price: $35000
  • 18
    Cyber Triage

    Cyber Triage

    Sleuth Kit Labs

    Fast & Affordable Forensics for Incident Response. Automated incident response software for fast, comprehensive, and easy intrusion investigations. An alert is generated from IDS or SIEM. An endpoint investigation is started from SOAR manually. Cyber Triage is deployed to the endpoint to collect data. Analyst uses Cyber Triage data to find evidence and make decisions. Manual incident response is slow, leaving the entire organization at the intruder’s mercy. By automating every phase of the endpoint forensics process, Cyber Triage ensures state-of-the-art remediation speed. Cyber threats are constantly evolving, and manual incident response can be inconsistent and incomplete. Always operating on the latest threat intelligence, Cyber Triage scours every relevant corner of a compromised endpoint. Forensic tools are often confusing, with features not needed for intrusions. Cyber Triage’s intuitive interface allows even junior staff to analyze data and assemble reports.
    Starting Price: $2,500
  • 19
    CROSStrax

    CROSStrax

    CROSStrax

    Regardless of size or specialty, CROSStrax meets the needs of professional investigators. Manage retainers, case info and leads in one place. Investigate, Document, Review and Prepare effectively. Meet and exceed the needs of insurance companies, insureds, TPA’s and defense attorneys. Be prepared to complete any case from a basic statewide search to complex due diligence. Tools for documenting and reporting your serves. Compile puzzle pieces such as data and reports. Investigators can obtain cases in their coverage area from other investigative companies. Most investigators are familiar with colleagues looking for help on association list serves or Yahoo Groups. The Investigator Alliance accomplishes the same task in a more efficient and secure manner. Improve client satisfaction and retention rates with our automated tools.
  • 20
    Cognitech FiA 64
    FiA is a comprehensive software with analysis tools designed for forensic analysis and authentication of digital images. This extensive toolkit will allow the user to investigate the evidence and detect possible traces of tampering or other types of inconsistencies. FiA is used to systematically detect forged/doctored file based digital image evidence is able to authenticate and uncover where tampering and modification has taken place in a doctored image. This solution allows the expert to prepare everything needed for official court ready reports and all results are based on a forensic scientific methodology. FiA is a proven solution based on years of research. More research is being conducted to further extend software authentication capabilities to video authentication. FiA was developed for Law Enforcement Agencies only. In addition it is not effective to purchase this technology without the associated comprehensive training course.
  • 21
    IBM QRadar SIEM
    Market-leading SIEM built to outpace the adversary with speed, scale and accuracy As digital threats loom large and cyber adversaries grow increasingly sophisticated, the roles of SOC analysts are more critical than ever. Going beyond threat detection and response, QRadar SIEM enables security teams face today’s threats proactively with advanced AI, powerful threat intelligence, and access to cutting-edge content to maximize analyst potential. Whether you need cloud-native architecture built for hybrid scale and speed or a solution to complement your on-premises infrastructure, IBM can provide you with a SIEM to meet your needs. Experience the power of IBM enterprise-grade AI designed to amplify the efficiency and expertise of every security team. With QRadar SIEM, analysts can reduce repetitive manual tasks like case creation and risk prioritization to focus on critical investigation and remediation efforts.
  • 22
    Microsoft Purview Audit
    Determine the scope of compromise, and access audit logs to support investigations. Determine the scope of compromise, and access audit logs to support investigations. Get a dynamic bandwidth quota to access your auditing data. Support investigations by providing visibility to events such as when mail items were accessed, replied to, and forwarded, or when and what a user searched for in Exchange Online and SharePoint Online. Create customized audit log retention policies to retain audit records based on the service where the audited activities occur, specific audited activities, or the user who performs an audited activity. Organizations are initially allocated a baseline of 2,000 requests per minute, where this limit will dynamically increase depending on an organization's seat count and licensing subscription. Retain audit log records for up to 10 years with an add-on license.
    Starting Price: $12 per month
  • 23
    AD Enterprise

    AD Enterprise

    AccessData

    Today’s digital forensics teams face many challenges in a world filled with an overwhelming amount of data. From multiple office locations, to massive employee pools and remote workers, AD Enterprise provides deep visibility into live data directly at the endpoint, helping you conduct faster, more targeted enterprise-wide post-breach, HR and compliance investigations in a single, robust solution. With AD Enterprise, you can respond quickly, remotely and covertly while maintaining chain of custody, and facilitate focused forensic investigations and post-breach analysis, without interruption to business operations. Preview live data at the endpoint, then filter on any attributes and choose to retrieve only the data that matters to your investigation, saving time and cost. Perform collections from endpoints in multiple locations by deploying our remote Enterprise Agent to a broad range of operating systems, including Windows, Mac, Linux and more.
  • 24
    Belkasoft Triage
    Belkasoft Triage is a new digital forensic and incident response tool developed specifically for a quick analysis of a live computer and making a partial image of important data. Belkasoft T is designed to assist in situations when an investigator or a first responder is at the scene of incident and needs to quickly identify and obtain specific digital evidence stored on a Windows machine. The product is irreplaceable in situations of time pressure, when there is a need to quickly detect presence of specific data and obtain investigative leads instead of conducting an in-depth analysis of all the digital evidence.
  • 25
    DomainTools

    DomainTools

    DomainTools

    Connect indicators from your network with nearly every active domain and IP address on the Internet. Learn how this data can inform risk assessments, help profile attackers, guide online fraud investigations, and map cyber activity to attacker infrastructure. Gain insight that is necessary to make the right decision about the risk level of threats to your organization. DomainTools Iris is a proprietary threat intelligence and investigation platform that combines enterprise-grade domain and DNS-based intelligence with an intuitive web interface.
  • 26
    Influent

    Influent

    Uncharted

    Influent is a fresh approach to link analysis for graphs of transactional data. Influent empowers analysts to visually and interactively investigate transactional flow between billions of entities, accounts and transactions, revealing actors and behaviors of concern. Enhance Monitoring & Speed up Alert Disposition by enabling investigators to follow the money. Present evidence visually in an easy to understand format. Identify and add new data sources as investigations progress. Enhances the understanding of large and dirty datasets. Powerful dashboards highlight critical information. Reason over complex communication networks; Understand who knew what, when, and how. Influent creates a single investigation platform, linking disparate and imperfect data sources to quickly access all the information on an entity of interest. Fuzzy searching and automated entity resolution dramatically reduce data wrangling and allows analysts to focus on the critical investigative aspects of their work.
  • 27
    Cado

    Cado

    Cado Security

    Investigate all escalated alerts with unparalleled speed & depth. Revolutionize how Security Operations and Incident Response teams investigate cyber attacks. In today's complex and evolving hybrid world, you need an investigation platform you can trust to deliver answers. Cado Security empowers teams with unrivaled data acquisition, extensive context, and unparalleled speed. The Cado Platform provides automated, in-depth data so teams no longer need to scramble to find the critical information that they need, enabling faster resolutions and more effective teamwork. With ephemeral data, once the data is gone, it's gone. Act in real-time. The Cado Platform is the only tool with the ability to perform automated full forensic captures as well as utilize instant triage collection methods - native acquisition of cloud-based resources including containers, as well as SaaS applications and on-premise endpoints.
  • 28
    E3:Universal

    E3:Universal

    Paraben Corporation

    Don’t get caught up in tools that are unmanageable. The E3 Platform gets you processing all types of digital evidence quickly with an Easy interface, Efficient engines, and Effective workflow. E3:UNIVERSAL version that is designed to do all data types from hard drive data, smartphones, and IoT data. The need to change around your tool based on what type of digital data you have is a thing of the past. The E3 Forensic Platform seamlessly adds a large variety of evidence into a single interface to be able to search, parse, review and report on the digital data from most digital sources. Computer forensics focuses on bits and bytes of the file system that holds a large variety of different valuable pieces of data that can be the key to your investigation. From the FAT files systems of old to modern file systems like Xboxes, the E3 Forensic Platform works with the powerhouse of multi-tasking analysis engines to breakdown the data.
  • 29
    Command Zero

    Command Zero

    Command Zero

    Autonomous & User-led Cyber Investigations. Supercharge expert analysis and threat hunts. Question-based, AI-powered cyber investigations and threat hunting at scale. Consistent, customizable, predictable investigations with auto-reporting and timelines. Industry best practices and the institutional knowledge from leading organizations. For most organizations, manually investigating all escalated cases is an impossible task. Command Zero addresses this bottleneck by providing the necessary expert knowledge, processes, and tools to complement security operations teams. Analysts can review complete investigations, expand on autonomous sequences and conduct bespoke user-led inquiries to achieve expert outcomes.
  • 30
    4n6 DBX Forensics Wizard
    4n6 DBX Forensics Software helps investigators to analyze and examine DBX files without Outlook Express in detail. With DBX File Forensics Software, you can extract DBX data to several popular file formats and email services. The software provides DBX file preview in 4 different modes: Content, Attributes, Message Headers, and Hexadecimal View Attributes. To explore DBX files with the software GUI, the software provides two modules: Folder Selection and File Selection. Select File allows you to search only a single file, while Select Folder allows you to search a folder containing multiple DBX files. This DBX Forensics Software can save evidence of DBX files to multiple destinations like email files (DBX files can be preserved as PST files EML files and MBOX files), document files (DBX files can be preserved as PDF, HTML text and emails). It helps in extracting and preserving.
    Starting Price: $49
  • 31
    Phonexia Voice Inspector
    Perform fast and highly accurate language-independent forensic voice analysis using a speaker recognition solution explicitly designed for forensic experts and exclusively powered by state-of-the-art deep neural networks. Analyze the subject’s voice automatically with an advanced speaker identification tool, and support your forensic expert’s conclusion with accurate, unbiased voice analysis. Identify a speaker in the recordings of any language without the need to hire a language-specific linguist as Phonexia Voice Inspector can detect pronunciation differencies in any language. Present the results of your forensic voice analysis to a court in the most convenient way with an automatically generated report containing all the necessary details to validate the claim. Phonexia Voice Inspector is an out-of-the-box solution that provides police forces and forensic experts with a highly accurate speaker recognition tool to support effective criminal investigations and give evidence in court.
  • 32
    4n6 Outlook Forensics Wizard
    4n6 Outlook Forensics Wizard is the most reliable, fast and easy-to-use software to open and analyze Outlook email data files. Forensics Investigator is this application developed specifically to collect evidence from Outlook data files. This advanced Outlook Forensics Software provides detailed preview of Outlook data files in various modes. You can easily use this software without facing any type of problem. The app also offers several premium benefits: 1. Allows to open, view, and analyze unlimited Outlook Data Files. 2. No need to install Outlook application to analyze email data. 3. Outlook Forensics Wizard is complete free from any type of risk. 4. Supports all the versions of Outlook including Outlook 2019. 5. Analyze Outlook email data in multiple modes to deeply analyze.
    Starting Price: $49
  • 33
    Omnis Cyber Intelligence
    Omnis CyberStream and Omnis Cyber Intelligence form NETSCOUT’s advanced Network Detection and Response (NDR) platform built on deep packet inspection. The platform delivers pervasive, packet-level visibility to eliminate blind spots across data centers, cloud environments, remote users, and network edges. By combining real-time adaptive threat detection with continuous packet capture, it enables faster and more accurate incident response. Omnis Cyber Intelligence identifies and prioritizes threats at the source using layered machine learning, threat intelligence, and deterministic analysis. Always-on packet and metadata collection ensures security teams have full context before, during, and after an incident. Integrated investigation workflows reduce alert noise and shorten the gap between detection and response. The platform empowers SOC teams to investigate, respond, and prevent threats with confidence and precision.
  • 34
    Viddle

    Viddle

    Viddle

    Viddle is a SaaS-based investigation management solution for private investigators and investigators in private and government sectors. Viddle is simple to use and specifically designed to save time in case creation and case management tasks. Viddle facilitates collaboration with other investigators, allowing a primary case investigator to add secondary collaborating investigators from partnering organizations and allocate tasks to the team working on a case. Viddle has built-in video conferencing to facilitate meetings and screen-sharing between investigators. All case evidence is securely stored in Amazon AWS S3 Sydney. Viddle also allows requests of information from parties to a case, such as witness statements and evidence, through online requisitions, eliminating the need for travel to collect case documents.
    Starting Price: $39/month
  • 35
    Case IQ

    Case IQ

    Case IQ

    Manage HR, fraud, and compliance investigations from start to end with Case IQ. A leading cloud-based investigative case management solution for small to large organizations, i-Sight helps companies streamline investigative processes to help them manage issues and analyze the results with ease. Top features include case assignment, workflow alerts, case reviews, collaboration, trend reports, and more.
  • 36
    AirMDR

    AirMDR

    AirMDR

    AI-powered virtual analysts automate 80-90% of routine tasks, delivering faster, higher-quality, and more affordable alert triage, investigation, and response, all supported by human experts. Say no to expensive, slow, poor quality, and inconsistent investigations. Say hello to precision investigations at blazing-fast speed. Traditional MDRs rely on human analysts for case triage, but at AirMDR, our intelligent virtual analyst processes these cases 20 times faster with greater consistency and depth. At AirMDR, human analysts have to manually triage over 90% fewer cases. Experience high-quality investigation, triage, and response for every alert, with 90% of alerts investigated in under five minutes. Every alert is automatically enriched, investigated, and triaged by our virtual analyst, serving as the first responder. This process is continuously supervised and enhanced by our team of human security experts, ensuring a seamless and efficient security operation.
  • 37
    XRY

    XRY

    MSAB

    XRY by MSAB is a mobile-device forensics extraction solution that enables investigators to securely and efficiently access, extract, and preserve digital evidence from smartphones, tablets, and other mobile devices. It supports a wide and growing range of devices, unlock and bypass features (including passcode bypass and chip-level support for difficult devices), full decoding of app data (such as WhatsApp, Facebook, Instagram, Viber), browser history (Safari, Chrome, Opera), and location/timeline correlation across sources. It is built with full chain-of-custody and evidential integrity in mind, including a secure XRY forensic file format with encryption and auditing, while offering access both at the frontline (scene) and in the lab. XRY includes variants such as Logical (fast, live data), Physical (raw memory dumps, deleted data recovery), Cloud (cloud-/app-based data), and Pro (deepest device and exploit access).
  • 38
    IMS

    IMS

    Investigator Software

    IMS is a powerful case management tool used by private investigators and private investigation companies all over the world. Whether you're a freelance private investigator or work for a large investigation company our investigation case management software provides you with the tools needed to manage your ongoing cases and easily keep track of your active cases. You can use our private investigator software to keep a record of everything that goes into your cases, invite other agents to collaborate with you and then share the end result with your client. Our software uses a powerful notification system to ensure you're always kept up to date making it easy to manage hundreds of active cases at once. Use the built in reporting tools to generate case summaries and printable case reports with a full dated log of everything that's happened.
    Starting Price: $30 per month
  • 39
    CycColossus

    CycColossus

    Geoff Smith Associates

    CycColossus - allows for the submission of Intelligence, its assessment, action and dissemination within the intelligence module. Progressing into the Case Management module with effective Investigation and Enquiry tools; including efficient Case File production with Exhibit and material handling and the creation of a fully electronic file. Designed and developed to be highly configurable and tailored for Police, LEA’s, Regulatory Bodies, Counter Fraud & Investigation Services, Whistle Blowers and many others… Easy to use, focussed, fast and efficient paper free business process providing a powerful and flexible solution. CycColossus – includes enterprise intelligence providing a streamlined workflow capability, driving quick throughput from receipt to assessment, action and dissemination; including key POLE entities such as Log, Nominal, Address, Communication and Vehicle.
  • 40
    Case Jacket

    Case Jacket

    Jacket Software

    The Persons of Interest area is designed so that users can create custom profiles for specific cases or people. For example, we have investigators using this feature to track court evictions, while others are utilizing it to help reformed gang members get jobs. Because of the ability to add specific customized fields, you can manage each ‘person’ as you need. Invite outside users to view cases and restrict the transfer of case ownership to other members in your roster. When other users are invited, email invitations are sent automatically with a ‘Secure Access Code’ to allow access. ‘Secure Access Code’ expires to avoid stale roster personnel. Ability to transfer case ownership to other members in the roster. Your data is always secure, with 2048 bit SSL encryption on all pages, multiple database redundancy and off-site backups. Easily add documents to each case, add comments and share them.
    Starting Price: $40 per month
  • 41
    AD Lab

    AD Lab

    AccessData

    Divide and conquer with AD Lab. This proven tool helps you power through massive data sets, handle various data types and run multiple cases at the same time, all within a collaborative, scalable environment. AD Lab uniquely enables distributed processing, allowing investigators to utilize additional hardware to dramatically increase their case processing and resolution speed. While a single-person lab can radically speed up their processing using the four-worker distributed processing engines (DPEs) available with FTK®, labs handling massive data sets, utilizing a distributed workforce, or looking to collaborate with attorneys, HR or other parties, can step up to AD Lab. As a centralized investigative platform, AD Lab adds powerful web-based review functionality and expanded DPE capabilities (up to 16 with the 6.2 release) with a centralized processing farm and centralized database infrastructure.
  • 42
    incy.io Whistleblowing
    incy.io Whistleblowing helps your organization comply with the EU whistleblowing directive. Completely anonymous, easy-to-use and fully customizable. Case specific credentials are created to enable 2-way communication. Automatic notifications of new cases and updates of existing cases for named investigators. Built-in investigations module, automated statistics, support for multiple languages, and more. Data is stored in the EU on ISO 27001 certified servers. New whistleblowing cases will notify the predefined investigators via email and the same happens when there's additional information given by the anonymous reporter to an existing case. The built-in case management view will help the dedicated personnel to simultaneously monitor both individual cases and the bigger picture. If there are multiple reports that link to a single case, these can be linked with each other.
    Starting Price: €120 per month
  • 43
    Vound Software
    W4 lets investigators review digital evidence rapidly, locate items of interest quickly, and report their findings easily. Intella Team is a multiuser, network enabled processing and review solution for mid-sized cases which require collaborative review. Intella Connect is an enterprise-level platform that allows teams to work together on their cases to deliver world-class results. In cases with many document collections, Predictive Coding is considered a more efficient method of conducting review because it doesn't require "eyes-on" review of all of the potentially responsive documents to complete responsiveness determinations. It's also considered as accurate, if not even more accurate, than manual review in many cases – not only saving time and cost during document review but doing so without sacrificing quality. W4 provides all the tools you need to quickly identify the best sources of evidence for your cases.
    Starting Price: $99 per year
  • 44
    VIXN

    VIXN

    Fermata Discovery

    VIXN is a comprehensive investigative case management platform that: • Maps all case data to display nexus and knowledge gaps • Sources case data and structures information for analysis • Filters, indexes, and visualizes data to expose insights • Organizes casework and enables investigation collaboration • Generates actionable entity profiles and automated client reports The VIXN engine is an identity resolution platform that automatically aggregates data on entities-of-interest involved in an investigation and crunches high volumes of information for vital clues. Powered by open source and proprietary data streams, the VIXN engine is delivered in UI and API formats.
    Starting Price: Call for pricing
  • 45
    Axon Investigate
    Improper playback software can alter video evidence and impede investigations. Axon Investigate allows you to review footage from more third-party proprietary video formats than any other solution on the market and provides immediate access to original metadata including date, time, image numbers, etc. More than 80% of investigations involve video evidence. Axon Investigate dramatically improves the video investigation process, saving officers up to 10 hours per week by providing simple, fast and repeatable workflows. Manage and organize hundreds of video sources into one project, track activity, tag relevant events, extract available video and create court-ready deliverables in standard, lossless formats. Axon Investigate is built by a team of certified, forensic video analysts and ensures that investigators view original video evidence and share accurate copies ready for court.
  • 46
    Cognitech VideoActive
    Part of the Tri-Suite64 software package, VideoActive® 64 is the first Real-Time forensic video processing software. The Cognitech® U.S. Patented software is the world’s only software that has a fully automatic Real-Time Universal De-Multiplexing ability, in addition to Real-Time Track & Cover, lidar crime scene reconstruction and analysis. Real-Time Universal DVR Capture, Patented Lossless Video Capture with encoding that doubles video storage and a Video Search (e.g. cars and people). Cognitech VideoActive’s modular design allows the end-user to choose a pre-defined configuration or user-defined signal processing chain. VideoActive® modules can be easily combined to produce a user-defined processing pipeline from live sources or locally stored files, all in real-time. New software code entirely re-written for 64-bit software architecture improving use of larger size files, such as 4K and 8K video to be opened, played, and saved.
  • 47
    SmartEvent

    SmartEvent

    Check Point Software Technologies

    SmartEvent event management provides full threat visibility with a single view into security risks. Take control and command the security event through real-time forensic and event investigation, compliance, and reporting. Respond to security incidents immediately and gain network true insights. SmartEvent provides a single view into security risks. Take control and understand your security status and trends. Respond to security incidents immediately and gain network true insights. Always the latest security management keeps you automatically up-to-date. On-demand expansion to seamlessly onboard more gateways. Zero maintenance makes your environments more secure, manageable and compliant.
  • 48
    ACI Case Manager

    ACI Case Manager

    ACI Worldwide

    Whether a genuine fraud event or a false positive, how banks manage the customer experience is critical. Give your fraud investigators a complete set of tools to resolve any issue and keep customers satisfied. Ensure that analysts can serve customers efficiently and comprehensively to confirm fraud events. Simplify case creation by utilizing account and contact details from ACI Fraud Management. Create efficient customer correspondence through configurable templates with dynamic data selection. Leverage centralized case details with multiple parameters for searching and appending data. Configure fraud analysts' workflow for simplified case management and increase the speed at which they work cases enterprise-wide. Use dynamic data enrichment, data displays and workflows to create guided workflows, built-in prompts and help-aids to assist investigator’s conduct research and decision-making.
  • 49
    XANALYS PowerCase
    Criminal and regulatory investigators face unique challenges. We design and deliver investigative case management systems to manage even the largest, most complex cases while providing transparency and accountability across the entire investigative process. Our extensive experience supporting local, state, and national agencies has enabled us to develop a suite of software that incorporates a consistent investigative methodology while also supporting each customer’s unique requirements and business practices. The PowerCase Investigative Case Management Platform (PowerCase:ICM) combines a rich set of core capabilities with customer/domain specific configurations to deliver enterprise investigative systems aligned to the requirements of our users. Role, case and record level security ensure data access is controlled at every level.
  • 50
    Magnet AXIOM

    Magnet AXIOM

    Magnet Forensics

    Recover & analyze your evidence in one case. Examine digital evidence from mobile, cloud, computer, and vehicle sources, alongside third-party extractions all in one case file. Use powerful and intuitive analytical tools to automatically surface case-relevant evidence quickly. Recover, analyze, and report on data from mobile, computer, cloud, and vehicle sources in one case file with Magnet Axiom. Easily recover deleted data and analyze digital evidence from mobile, computer, cloud, and vehicle sources in one case file, with an artifact-first approach. Discover the full history of a file or artifact to build your case and prove intent. Magnet Axiom provides the most up-to-date artifact support for the most recent devices and sources. Acquire and analyze mobile, cloud, and computer evidence together in one case. Process warrant returns from providers such as Google, Facebook, and Instagram.