Alternatives to ISEEK

Compare ISEEK alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to ISEEK in 2026. Compare features, ratings, user reviews, pricing, and more from ISEEK competitors and alternatives in order to make an informed decision for your business.

  • 1
    Digital WarRoom

    Digital WarRoom

    DWR eDiscovery

    DWR eDiscovery allows legal professionals to process, analyze, review, and produce documents that are relevant to litigation and other legal disclosure obligations. Our tools allow easy ingestion and analysis of client and opposing party documents using a comprehensive set of document review features including AI search, keyword search, keyword highlighting, metadata filtering, marking documents, privilege log management, redactions, and a range of analysis tools to help users best understand their document corpus. TRAINING IS ALWAYS INCLUDED. All of our features are DIY, meaning the user can perform standard eDiscovery tasks on their own without the need for a consultant to intervene. DWR Pro ($1995-5995) is a software solution that can be downloaded to your local server. Our cloud subscriptions are billed per-GB for hosting with no other hidden fees. The entry-level Single Matter subscription starts at $250/month with fees that range form $10/GB/month to $1/GB/month.
    Compare vs. ISEEK View Software
    Visit Website
  • 2
    Magnet AXIOM Cyber

    Magnet AXIOM Cyber

    Magnet Forensics

    Enterprise organizations large and small use Magnet Forensics’ solutions to close cases quickly with powerful analytics that surface intelligence & insights while also being able to leverage automation and the cloud to reduce downtime and enable remote collaboration at scale. Some of the world’s largest corporations use Magnet Forensics to investigate IP theft, fraud, employee misconduct and incident response cases such as ransomware, business email compromise and phishing attacks. The benefits of hosting your applications in the cloud ranges from cost savings to more centralized operations. Deploy AXIOM Cyber in Azure or AWS to leverage the benefits of cloud computing plus the ability to perform off-network remote collections of Mac, Windows and Linux endpoints.
  • 3
    Aid4Mail

    Aid4Mail

    Fookes Software Ltd

    Aid4Mail is a fast, reliable, and highly accurate tool to collect, recover, search, and convert emails. It supports most mailbox file formats (e.g. PST, OST, OLM, mbox), IMAP accounts (e.g. Yahoo! Mail, AOL) and popular mail service providers (e.g. Microsoft 365, Exchange, Gmail). Aid4Mail can recover double-deleted messages and corrupted emails, and extract MIME data from certain types of unknown file formats through file carving. Aid4Mail provides a large array of tools to search and filter out unwanted emails during conversion. Save time by using native pre-acquisition filters to download a subset of your mail from Exchange, Office 365, Gmail and other webmail services. Use Aid4Mail’s integrated search engine to cull-down your email collection. Its search operators are very similar to Gmail and Office 365. Aid4Mail is used by Fortune 500 companies, government agencies and legal professionals around the world. It is made in Switzerland by perfectionists.
  • 4
    GlitchSecure

    GlitchSecure

    GlitchSecure

    Continuous Security Testing for SaaS Companies - Built by Hackers Automatically assess your security posture with continuous vulnerability assessments and on-demand pentests. Hackers don't stop testing, and neither should you. We use a hybrid approach that combines testing methodologies built by expert hackers, a real-time reporting dashboard, and continuous delivery of high-quality results. We improve the traditional pentesting lifecycle by continually providing expert advice, remediation verification, and automated security testing throughout the entire year. Our dedicated team of experts works with you to properly scope and review your applications, APIs, and networks to ensure in-depth testing coverage all year. Let us help you sleep better at night.
    Starting Price: $6,600 per year
  • 5
    CloudNine

    CloudNine

    CloudNine Discovery

    CloudNine is a cloud-based eDiscovery automation platform that streamlines the litigation discovery, audits, and investigations by allowing users to review, upload, and create documents in a central location. With its comprehensive suite of professional services that include discovery consulting, computer forensics, managed review, online hosting, information, governance, litigation support, and project management, CloudNine dramatically reduces the overall costs of eDiscovery processing. Law firms and corporations can save time and money by consolidating all of their data collection, processing, and review requirements by leveraging CloudNine’s self-service eDiscovery software.
    Starting Price: $35.00/month
  • 6
    E3:Universal

    E3:Universal

    Paraben Corporation

    Don’t get caught up in tools that are unmanageable. The E3 Platform gets you processing all types of digital evidence quickly with an Easy interface, Efficient engines, and Effective workflow. E3:UNIVERSAL version that is designed to do all data types from hard drive data, smartphones, and IoT data. The need to change around your tool based on what type of digital data you have is a thing of the past. The E3 Forensic Platform seamlessly adds a large variety of evidence into a single interface to be able to search, parse, review and report on the digital data from most digital sources. Computer forensics focuses on bits and bytes of the file system that holds a large variety of different valuable pieces of data that can be the key to your investigation. From the FAT files systems of old to modern file systems like Xboxes, the E3 Forensic Platform works with the powerhouse of multi-tasking analysis engines to breakdown the data.
  • 7
    OSForensics

    OSForensics

    PassMark Software

    Extract forensic data from computers, quicker and easier than ever. Uncover everything hidden inside a PC. Discover relevant data faster through high performance file searching and indexing. Extract passwords, decrypt files and recover deleted files quickly and automatically from Windows, Mac and Linux file systems. Identify evidence and suspicious activity through our hash matching and drive signature analysis features. Identify and analyze all files and even automatically create a timeline of all user activity. 360° Case Management Solution. Manage your entire digital investigation with OSF’s new reporting features. Build custom reports, add narratives and even attach your other tools’ reports to the OSF report. Volatility Workbench is a graphical user interface (GUI) for the Volatility tool. OSForensics courses offered to suit a diverse range of users and skill sets. Write an image concurrently to multiple USB Flash Drives.
    Starting Price: $799 per user per year
  • 8
    PME Discovery

    PME Discovery

    PME Discovery

    PME is a targeted mobile data collection and web-based review platform that lets teams securely gather, organize, and analyze mobile data from devices without physical device access or complex hardware, prioritizing only the information they need and protecting custodian privacy. It includes PME Collect, a remote automated data acquisition tool that guides custodians through a workflow to capture texts, call logs, social messaging, media, contacts, and other app data based on specified criteria, filters out irrelevant information before upload, and encrypts it for secure transfer, and PME Review, a browser-accessible interface for case management that supports search, tagging, commenting, redaction, and export in multiple formats. It offers strong security and governance with encryption, user access control, digital signatures, configurable retention policies, and regional data localization to meet regulatory requirements.
  • 9
    Passware Kit
    Passware Kit Forensic is the complete encrypted electronic evidence discovery solution that reports and decrypts all password-protected items on a computer. The software recognizes 340+ file types and works in batch mode recovering passwords. Analyzes live memory images and hibernation files and extracts encryption keys for hard disks and passwords for Windows & Mac accounts. Passware Bootable Memory Imager acquires memory of Windows, Linux, and Mac computers. Resolved navigation issues after stopping the password recovery process. Instant decryption of the latest VeraCrypt versions via memory analysis. Accelerated password recovery with multiple computers, NVIDIA and AMD GPUs, and Rainbow Tables. In addition to all the key features of a Windows version, Passware Kit Forensic for Mac provides access to APFS disks from Mac computers with Apple T2 chip.
    Starting Price: $1,195 one-time payment
  • 10
    EDT

    EDT

    EDT

    EDT integrates the case management functions that regulators and prosecutors need, alongside traditional e-discovery and disclosure workflows such as data processing, analysis, review, production, and presentation in court. It delivers all the features clients need to run every case, end-to-end, from a single repository, without any data movements, delivering increased efficiency and reducing complexity and risk. Export documents in any industry standard load file format (Relativity, Concordance, Ringtail, Summation, Excel, CSV, DOJ, SEC, CSV etc.) Full audit trail makes it easy to see produced versions and history for each document. Flexible Bates numbering including the ability to assign new production numbers. Create TIFF or PDF images in advance or on the fly. Customize placeholders and slip-sheets for any file type. Apply permanent redactions and remove underlying text at production time. Concurrent, distributed processing for large productions and tight deadlines.
  • 11
    ZyLAB ONE
    Control your data, spend and timelines. Corporations see increased demands to answer regulatory requests, meet litigation deadlines or respond to calls for transparency. Many organizations are caught by surprise by their legal bills. Take control with ZyLAB ONE eDiscovery. ZyLAB ONE's transparent pricing model makes it easy for corporations of any size to take control of eDiscovery at a predictable price. Corporate legal teams can collaborate with outside counsel and drastically reduce the number of documents reviewed externally. ZyLAB ONE enables your legal professionals to work efficiently, providing a seamless end-to-end experience thought upload, processing, review and production. Utilizing Microsoft Azure data centers, ZyLAB ONE protects your data at all times with encryption both at rest and in transit while ensuring high availability.
  • 12
    XRY

    XRY

    MSAB

    XRY by MSAB is a mobile-device forensics extraction solution that enables investigators to securely and efficiently access, extract, and preserve digital evidence from smartphones, tablets, and other mobile devices. It supports a wide and growing range of devices, unlock and bypass features (including passcode bypass and chip-level support for difficult devices), full decoding of app data (such as WhatsApp, Facebook, Instagram, Viber), browser history (Safari, Chrome, Opera), and location/timeline correlation across sources. It is built with full chain-of-custody and evidential integrity in mind, including a secure XRY forensic file format with encryption and auditing, while offering access both at the frontline (scene) and in the lab. XRY includes variants such as Logical (fast, live data), Physical (raw memory dumps, deleted data recovery), Cloud (cloud-/app-based data), and Pro (deepest device and exploit access).
  • 13
    MailArchiva

    MailArchiva

    Stimulus Software

    MailArchiva is a professional enterprise grade email archiving, e-discovery, forensics and compliance solution. Since 2006, MailArchiva has been deployed in some of the most demanding IT environments on the planet. The server designed to make the storage and retrieval of long-term email data as convenient as possible and is ideal for companies needing to satisfy e-Discovery records requests in a timely and accurate manner. MailArchiva offer tight integration (includfing full calendar, contact & folder synchronization) with a wide variety of mail services, including MS Exchange, Office 365 (Microsoft 365) and Google Suite. Among its many benefits, MailArchiva reduces the time needed to find info and satisfy discovery record requests, ensures that emails remain intact over the long term, reduces legal exposure, ensures employees are collaborating effectively, assists in compliance with archiving legislation (e.g. Sarbanes Oxley Act), reduces storage costs by up to 60%.
    Starting Price: $34.56 / user
  • 14
    Cellebrite

    Cellebrite

    Cellebrite

    All the functionality you need to conduct in-depth analysis and generate custom reports to reveal the truth. With advanced searching and filtering capabilities, and built-in AI media categorization, investigators easily find Internet History, Downloads, Locations, Recent searches, and more. Obtain user activity from Windows memory, and get registry artifacts including jump list, Windows 10 timeline activity, shellbags, SRUM, and more. Review device history from Windows Volume Shadow Copies. Review history in APFS Snapshots and Time Machine backups, display and search Spotlight metadata and KnowledgeC data, review network connections, recent documents, user activity, and more. Ingest data into Cellebrite Pathfinder, Berla, APOLLO and, ICAC tools such as Project Vic and PhotoDNA. Share your case findings with other stakeholders using customized reporting capabilities. The most complete workstation designed to handle the most rigorous datasets for digital intelligence and eDiscovery.
  • 15
    Lexiti

    Lexiti

    Safelink

    Lexiti is a litigation workspace that brings review, chronologies and bundles into one platform. It helps legal teams prepare cases without switching between tools. eDiscovery & review: Upload evidence, process large productions (ZIPs, PSTs, email), and use filters, labels and saved searches to surface key documents fast. AI chronologies: Extract events from documents and build structured timelines with direct source links. Filter by person, topic, date or entity. Bundles: Create court-ready bundles with automated pagination, indexing and bookmarks. Collaboration & control: Granular permissions, audit trails and a unified document viewer keep work organised and defensible. Security: Enterprise-grade encryption and private AI that never trains on your data.
    Starting Price: £50/workspace
  • 16
    ZL UA

    ZL UA

    ZL Technologies

    Regain control of electronic communications and documents while uncovering their true value, all from a singular platform. Gain insight into dark file repositories in order to improve security, classification strategy, lifecycle management, and more. Ongoing file analysis allows ZL File Analysis and Management the versatility to give users the ability to tackle current projects and address future projects as they arise concurrently. Conduct the entire eDiscovery process, from collection to production, without ever moving data. Perform lightning-fast enterprise searches to pinpoint relevant information in seconds and fully understand your data before crafting Early Case Assessment (ECA) strategies. Bolster compliance supervision with granular and customizable lexicons. Generate an advanced sample of emails that captures a representative sample of all outgoing messages to be reviewed. Conduct pre- and post-review compliance on electronic communication channels to meet requirements.
  • 17
    Xplico

    Xplico

    Xplico

    Xplico is installed in the major distributions of digital forensics and penetration testing: Kali Linix, BackTrack, DEFT, Security Onion, Matriux, BackBox, CERT Forensics Tools, Pentoo and CERT-Toolkit. Xplico allows concurrent access by multiple users. Any user can manage one or more Cases. The UI is a Web User Interface and its backend DB can be SQLite, MySQL or PostgreSQL. Xplico can be used as a Cloud Network Forensic Analysis Tool. The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on. Xplico isn’t a network protocol analyzer. Xplico is an open source Network Forensic Analysis Tool (NFAT). At each data reassembled by Xplico is associated a XML file that uniquely identifies the flows and the pcap containing the data reassembled.
  • 18
    Quick View Plus
    Quick View Plus 2020 is built for productivity. View 300+ file formats without the need for the applications they were created in. Whether you're looking for a file viewer for your desktop or laptop, or need more advanced capabilities for eDiscovery, native file review, or computer forensics, Quick View Plus 2020 has everything you need. Quick View Plus 2020 provides one interface for searching, viewing, copying and printing nearly any file. This single interface now includes redaction and annotation capabilities also. QVP 2020 integrates easily with document management systems, review platforms, and litigation case management applications. Quick View Plus 2020 views Microsoft Excel spreadsheets in a more realistic interactive grid view. In addition, it delivers extended features for the additional 300+ formats supported, including metadata view and search, command-line integration with third-party applications, Microsoft PowerPoint speaker notes and comments view.
    Starting Price: $49 one-time payment
  • 19
    4n6 DBX Forensics Wizard
    4n6 DBX Forensics Software helps investigators to analyze and examine DBX files without Outlook Express in detail. With DBX File Forensics Software, you can extract DBX data to several popular file formats and email services. The software provides DBX file preview in 4 different modes: Content, Attributes, Message Headers, and Hexadecimal View Attributes. To explore DBX files with the software GUI, the software provides two modules: Folder Selection and File Selection. Select File allows you to search only a single file, while Select Folder allows you to search a folder containing multiple DBX files. This DBX Forensics Software can save evidence of DBX files to multiple destinations like email files (DBX files can be preserved as PST files EML files and MBOX files), document files (DBX files can be preserved as PDF, HTML text and emails). It helps in extracting and preserving.
    Starting Price: $49
  • 20
    Sightline

    Sightline

    Consilio

    Better Self-Service eDiscovery. Drag, drop and process your own data. Find what matters faster. Simplify and speed up review. Discover powerfully simple self-service eDiscovery. Seamlessly organize matters by client. Efficiently process data and manage review workflows of all sizes – from employment matters to large regulatory responses. Report on everything from tagging frequency to reviewer productivity. Run internal investigations, employment issues, subpoena responses and more within a single platform. Control access to matters, understand your risk exposure quickly, and only push data to counsel that passes pre-culling and ECA review. From construction law, to contract disputes, to employment matters, to plaintiff litigation, efficiently load data in for review, co-mingle with opposing counsel productions and prioritize what needs to be reviewed quickly. Load in productions from opposing counsel quickly, leverage analytics to find what matters seamlessly.
  • 21
    Breeze eDiscovery Suite

    Breeze eDiscovery Suite

    Breeze Legal Solutions

    The easiest tool available to process & convert eDiscovery, eMail, ESI (Electronic Stored Files) and Images with only 3-4 clicks of your mouse. Seriously! Easy to use desktop document management tool to search, index/flag and bates number your processed documents! If you get a project that is to big and you need some help, call us up. We can help! You can upload your e-Discovery files to Breeze and our experienced staff can take care of the work for you. If you currently own Breeze, you get a huge discount on what you pay for services. Search, Flag, Tag, Redact and Bates Number easily and quickly. Then you can export your documents to any format (single page, multi-page or PDF) and make load files for Relativity and other popular eDiscovery software platforms. Use Breeze to do your litigation scanning. Breeze works with any TWAIN-enabled scanning device.
    Starting Price: $800 per year
  • 22
    Lean Power

    Lean Power

    Lean Power

    Lean Power is a patented, fully dynamic work management and execution platform that empowers companies to perform regimented work instructions more efficiently, saving labor, increasing the accuracy of data collection in the field, and reducing the risk of plant and equipment failures. Lean Power digitizes paper-based and PDF-based work packages and converts them into digital work instructions. The Lean Power platform supports the entire dynamic procedures lifecycle including creation, planning, execution, and record management. Lean Power can work as a stand-alone work planning and execution solution or integrate with existing document and asset management systems. The application consists of a backend server, frontend web application, and mobile app solution. The application uses forms-based authentication, stores data in an encrypted state, and communicates using web services provided over a secure connection.
  • 23
    Truxton

    Truxton

    Truxton

    Truxton’s easy-to-use, analyst-driven interface allows you to get up to speed quickly, without mastering specialized code or techniques. With Truxton, simplicity doesn’t mean a lack of sophisticated tools. You’ll get cutting edge features like user-defined queries, entity filters, coordinated reviews, notes, and findings. The investigation dashboard provides a complete picture of the current status of each investigation. It shows the name, case number/type, investigator, and the media included in the investigation. It also provides and a host of other tools that allow you to manage, review, and export the case to other Truxton users. Wouldn’t it be nice if multiple users could work on the same case at the same time? Or if you could send out a file to an off-site Subject Matter Expert for review? Export files to another platform without wrangling a bunch of proprietary code? Truxton’s open architecture allows you to take your data into other tools for verification and reporting.
    Starting Price: $3,495 per user
  • 24
    LLIMAGER

    LLIMAGER

    e-Forensics Inc

    LLIMAGER was designed to address the need for a low-cost, no-frills “live” forensic imaging solution for Mac computers, capable of capturing the entirety of a synthesized disk, including volume unallocated space, as macOS sees the disk with its partitions mounted. The application was developed to be user-friendly and easy enough for entry level digital forensics examiners. The application leverages built-in Mac utilities, providing a versatile solution compatible with a wide range of macOS versions, both past and present. This ensures that the tool remains functional across diverse system configurations and updates. FEATURES INCLUDE: Powerful and Fast "Live" imaging, CLI based Application Supports Intel, Apple Silicon, T2 Chips, and APFS File Systems. Full Acquisition Log SHA-256 or MD5 Hashed DMG Images Choice of Encrypted /Decrypted DMGs for use in commercial forensics tools Unlimited Technical Support
    Starting Price: $425
  • 25
    Lattice Technology

    Lattice Technology

    Lattice Technology

    An XVL file contains the CAD-accurate geometry, the linked bill of materials, assembly/service process instructions and more. From automotive, aerospace and defense, to industrial machinery, our customers are 3D model-based manufacturers who design and assemble complex products. Using tools from Lattice Technology, stakeholders can easily leverage 3D CAD models in order to author technical communications for their functional specific needs. SOLIDWORKS, Catia, NX, Autodesk Inventor, Creo and other native formats. XVL retains accuracy while reducing file sizes to 1% size of the original CAD model. Models from multiple CAD files and formats can be combined into a single file of XVL. Assembly work instructions, design review interactive documents, service instructions, and interactive spare part catalogs. Choose from a variety of formats/devices and a variety of standard formats, Microsoft Excel, Interactive web pages, 2D or 3D PDF, Apple iOS.
  • 26
    Digital Reef

    Digital Reef

    Digital Reef

    With unparalleled Big Data processing capabilities, Digital Reef's advanced technology provides legal teams with the fastest and most reliable way to ingest, cull, analyze, and export data. Cut daunting, unstructured data sets down to the essential elements and organize documents based on relevance to cost effectively complete your discovery tasks within the most stringent deadlines. Leverage de-nisting, deduplication, boolean searches, and analytics. Reduce and organize data sets for review. Use Pre-Review Analytics™ to further reduce the review set. Use built-in interface or export to other review applications. Reuse coding decisions from previous cases.
  • 27
    Rational Review

    Rational Review

    Rational Enterprise

    Rational Review is a hosted software-as-a-service or on-premises repository for analytics and review. This full-featured software is backed by an experienced and dedicated client services team. RR is a clear choice over the various competing point solution review platforms. RR is offered at a fraction of the cost of most alternatives. Pricing is simple and predictable, with a fixed-fee schedule for unlimited users and matters, tiered based on the amount of data. Organizations using this repository in concert with Rational Governance will realize further savings, as loading and processing activities and fees are completely eliminated. RR’s massive scalability and robust processing capabilities powered by an Oracle database make it the most reliable platform available. RR’s software functionality includes the most advanced analytics, a workflow engine that dramatically improves efficiency, and self-provisioning of all site activities.
  • 28
    Discovery Assistant

    Discovery Assistant

    ImageMAKER Development

    Discovery Assistant is designed specifically for litigation support professionals to capture, search, and process Windows-based electronic documents. Users can quickly search through millions of native documents, scanned documents, emails and their attachments to find relevant information. Processed documents can be exported as native files, or as TIFF or PDF images (including hidden Metadata and text) to one of the leading case management review tools. Converts terabytes of e-mail, electronic documents, scanned images to TIFF or PDF, while extracting Metadata and Text. Keeps track of each document, maintains parent child relationships, full audit trail, reporting tools. Informative tabbed interface, with the ability to drill down into the details. Out of the box installation, simple to install, and simple to use software.
  • 29
    BeSafe

    BeSafe

    BeSafe

    Protect control monitor, your files everywhere in all platforms, all drives, all boxes. Protect any kind of files (PDF, Office, videos and more) with state of the art encryption. BeSafe’s preserves native collaboration features in Dropbox, Google Drive, and Slack. Stay in control of your documents by enabling one-time viewing or specifying an expiration time for shared access. Instantly revoke access if you have sent the file to the wrong recipient. Get 360° data access visibility: Know who, when, where and how your content is accessed. Find out what matters most with instant “read” notifications and even page-by-page view analytics. We are revolutionizing end-to-end encrypted cloud collaboration with Proxy Re-Encryption cryptography. Besafe uses patent pending technology for encrypting your data and enabling secure sharing over any email or cloud file sharing application. BeSafe can be integrated to Dropbox via the user’s BeSafe web portal.
  • 30
    X1 Distributed Discovery
    Unique in the industry, X1 Distributed Discovery upends the traditional collection process by analyzing ESI on a custodian’s assigned computer on a moment’s notice, prior to collection, enabling true early case assessment (ECA) and focusing collections as precisely as desired. X1 dramatically increases speed to review via direct upload to Relativity or other review platforms. For the first time ever, legal and IT teams can now instantly find, preserve and collect data remotely, test search terms, across hundreds of custodians, including desktops, laptops, file servers, cloud repositories, and other enterprise data sources like Dropbox and OneDrive, all prior to collection. Only with X1’s patented technology can legal teams and eDiscovery examiners execute keywords on ESI in place and receive statistics for potential responsiveness in a nearly instantaneous, iterative process, all before collection.
  • 31
    Vound Software
    W4 lets investigators review digital evidence rapidly, locate items of interest quickly, and report their findings easily. Intella Team is a multiuser, network enabled processing and review solution for mid-sized cases which require collaborative review. Intella Connect is an enterprise-level platform that allows teams to work together on their cases to deliver world-class results. In cases with many document collections, Predictive Coding is considered a more efficient method of conducting review because it doesn't require "eyes-on" review of all of the potentially responsive documents to complete responsiveness determinations. It's also considered as accurate, if not even more accurate, than manual review in many cases – not only saving time and cost during document review but doing so without sacrificing quality. W4 provides all the tools you need to quickly identify the best sources of evidence for your cases.
    Starting Price: $99 per year
  • 32
    ONE Discovery

    ONE Discovery

    ONE Discovery

    Repurpose decisions on data, lowering eyes on review spend measured in tens of millions. Manage Security by keeping data in place; control by removing third-party data management. Proven Infrastructure, Superior Customer Support, and User Experience. Aggregate load-ready data in ONE repository to reduce response times. Maximize In House & Legal Consulting Teams & Performance. Save Millions $ by eliminating repetitive processes that get smarter with every iteration. Premier scalable storage & high-frequency data solutions for processing, management, and document review. Whether you’re dealing with a few dozen or a few million pieces of ESI, processing performance never slows down. ONE Discovery's powerful processing engine outperforms industry-leading solutions by 150% in benchmark tests and is infinitely scalable. Focus on the ESI that matters and see meaning in seconds. Organize complex data sources and uncover insights with just a few clicks.
  • 33
    PDFEncrypt

    PDFEncrypt

    PDFEncrypt

    PDFEncrypt is a free, open source utility to encrypt PDF files using standard PDF encryption algorithms. When a document is encrypted, its contents become unreadable. An authorized user can decrypt the document to obtain access to the contents. If a PDF document is encrypted with a password, the user must specify the password before the document can be viewed in Adobe Reader or Adobe Acrobat. PDFEncrypt provides a means to encrypt any standard PDF document for free, without the need to purchase the Adobe Acrobat software or upload your confidential PDF files to a third-party server for encryption. The app runs directly on your Windows PC and allows you to specify a password (required to open the document) as well as many options and permissions to apply to the PDF file.
    Starting Price: Free
  • 34
    ESET Endpoint Encryption
    A simple to use standalone encryption solution providing full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Patented technology to protect data for businesses of all sizes. ESET Endpoint Encryption is FIPS 140-2 validated with 256 bit AES encryption. ESET Endpoint Encryption requires no server for deployment and can seamlessly support remote users. Manage encryption on Windows machines and native macOS encryption (FileVault) from a single dashboard. ESET Endpoint Encryption gives companies enhanced ability to protect specific files, folders, virtual disks or archives. By encrypting emails and attachments, and restricting access to removable media for specific users, you can protect data in transit and prevent their leakage outside the company. Full control of licensing and software features, security policy and encryption keys from a dedicated ESET Endpoint Encryption console.
  • 35
    Cognitech VideoActive
    Part of the Tri-Suite64 software package, VideoActive® 64 is the first Real-Time forensic video processing software. The Cognitech® U.S. Patented software is the world’s only software that has a fully automatic Real-Time Universal De-Multiplexing ability, in addition to Real-Time Track & Cover, lidar crime scene reconstruction and analysis. Real-Time Universal DVR Capture, Patented Lossless Video Capture with encoding that doubles video storage and a Video Search (e.g. cars and people). Cognitech VideoActive’s modular design allows the end-user to choose a pre-defined configuration or user-defined signal processing chain. VideoActive® modules can be easily combined to produce a user-defined processing pipeline from live sources or locally stored files, all in real-time. New software code entirely re-written for 64-bit software architecture improving use of larger size files, such as 4K and 8K video to be opened, played, and saved.
  • 36
    C2 Transfer

    C2 Transfer

    Synology C2

    End-to-end encryption and user identity authentication let you transfer files securely. Optional protections help you prevent unauthorized tampering with the content. A two-step process using sharable transfer links and one-time passwords sent via email or SMS makes sure only the right people receive your files. Protect uploaded content with links that expire, download limits, and watermarks. C2 Transfer works for anyone who shares a great number of files. Up to 100 transfers can be active at the same time and each transfer can contain 20 GB worth of files. Request and receive files from anyone by sending them a simple and secure link. All files are encrypted and recipients are asked to verify their identity before uploading files. Businesses can quickly manage C2 Transfer licenses through a simple interface, simplifying user access. Secure file sharing doesn't need to be complicated. Simple steps ensure each file you send with C2 Transfer is delivered to the right person.
    Starting Price: $99.99 per year
  • 37
    Google Vault
    Data retention and eDiscovery for G Suite. Keep track of what matters. Retain, search, and export your organization’s data from select apps with Vault for G Suite Business and Enterprise editions. Protect your data and stay covered. Get a handle on things. Set retention rules and holds on data from certain G Suite apps for an entire domain or specific organizational units. Find what you’re looking for now, export it whenever. Retrieve valuable information, even from suspended accounts. It’s a smart way to gather what your legal team needs and prevent data loss from employee turnover. Give your legal team what they need to stay prepared. Vault allows you to preserve your users’ data from specific G Suite apps with holds. All content retrieved through search can be exported to standard formats for additional review, including results for any licensed account. Track user activity within Vault. Robust audit trails let you see searches, content views, exports, and more.
    Starting Price: $6 per user per month
  • 38
    Heureka Intelligence Platform
    The Heureka Intelligence Platform is designed to help organizations automate and overcome the challenges of locating and classifying unstructured data. We require minimal server infrastructure and deliver real-time data and risk analytics enterprise-wide. The Heureka Intelligence platform is easy to deploy and allows you to start getting results quickly. Windows? Mac? or Linux? Manage your unstructured data across all of your endpoints and file servers. With our cloud or on-premises solutions, Heureka is designed to grow with you regardless of your organizational size. Proactively manage endpoints, PII risk, view trends, create reports, conduct searches or take file action. Remediate files by deleting or quarantining or collect files to a central location. Heureka easily exports data to common E-Discovery review platforms or BI tools to share data intelligence.
  • 39
    RansomStop

    RansomStop

    RansomStop

    RansomStop is an AI-based ransomware detection and response tool designed to stop active ransomware encryption before it spreads and disrupts business operations by detecting malicious file encryption activity and responding automatically in seconds. It focuses on real-time containment and protection of critical infrastructure, such as web servers, application servers, SQL servers, domain controllers, NAS appliances, hypervisors, and cloud storage, by analyzing file entropy, access patterns, and metadata to recognize unauthorized encryption rather than relying on process intent or signatures, making it resilient even against evasive or “living-off-the-land” attacks. Once ransomware activity is detected, RansomStop can automatically disable compromised accounts, terminate malicious processes, and block attacker IPs, helping prevent widespread damage and operational downtime without waiting for manual intervention.
  • 40
    ADF Cloud Platform

    ADF Cloud Platform

    ADF Solutions

    ADF Solutions is the leading provider of digital forensic and media exploitation tools. These tools are used for processing and analyzing Android/iOS smartphones, mobile devices, computers, external drives, drive images, and other media storage (USB flash drives, memory cards, etc.) ADF triage software is all about speed, scalability, ease-of-use, and relevant results. The tools have a proven track record in reducing forensic backlogs, streamlining digital investigations and rapid access to digital evidence and intelligence. Our customers include federal, state and local law enforcement agencies, military and defense agencies, Office of Inspector General offices, Attorneys General, prosecutors, and other investigative professionals worldwide.
    Starting Price: $35000
  • 41
    Decover

    Decover

    Decover

    DecoverAI offers a smart solution that streamlines document review and legal research, saves time, and enhances data security, helping legal professionals work more efficiently and cost-effectively. The extensive process of sifting through hundreds of documents incurs significant financial costs for legal firms, adding to the overall expenses without guaranteeing efficient results. Lawyers face immense time pressure, with hours lost to manual document review impacting productivity and profitability, especially in the face of escalating client demands and tight deadlines. The protection of sensitive client data is an ongoing priority, given the persistent risk of data breaches and unauthorized access. Implementing rigorous security measures is essential to uphold client trust. Explore practical strategies and tools to streamline legal operations and maximize productivity. From automation to collaborative partnerships, discover tailored solutions for today's legal challenges.
  • 42
    Junto

    Junto

    Junto

    Junto is an affordable and powerful alternative to expensive E-discovery platforms. This innovative web application provides law, business, and government professionals with an easy-to-use and affordable solution for securely reviewing, searching, and organizing vast amounts of discovery data. The cloud-based online platform provides direct access to information from anywhere in the world. What’s more? Junto's intuitive navigation saves you valuable time and facilitates effortless team collaboration. Discover Junto today and start turning information into powerful results. Junto is a proprietary E-discovery web application developed and managed by Cornerstone Discovery. Junto is specifically designed to help paralegals, solo-practicing attorneys, law firms, investigators, and lead counsel with the processing, review, analysis, and production of vast amounts of discovery data. This easy-to-use and powerful web application will make you more productive.
    Starting Price: $400 per month
  • 43
    EchoMark

    EchoMark

    EchoMark

    Collaboration and communication, meet privacy and security. While other companies attempt to prevent data exfiltration by limiting the flow of information, we use invisible personalized watermarks in documents and email messages to allow for seamless sharing that's also easily traceable. Whether information is shared via email, printout, or photo, EchoMark provides an invisible solution to find the source within minutes. Advanced features like natural language versioning and computer vision detection help further ensure tracking success. Once deployed, EchoMark will automatically watermark documents and emails according to your established parameters. If you suspect a leak has occurred or spotted a document online, upload the original document to your EchoMark dashboard. EchoMark will use computer vision to compare the leaked fragment with each marked copy of the document shared.
    Starting Price: $ 19 per month
  • 44
    Search Encrypt

    Search Encrypt

    Search Encrypt

    Search Encrypt was designed from the ground up with privacy as its core value. The Search Encrypt extension protects your privacy by detecting searches that may be tracked and tied to your personal information. It intercepts those searches and redirects them to Search Encrypt's privacy-enhanced search engine which will be set to your default search engine. Search Encrypt is supported by sponsored ads featured on our search results page. Searches that may be tracked are stopped from processing and redirected to our privacy-enhanced search engine. Search Encrypt forces an advanced SSL encryption with perfect forward secrecy and also encrypts your search term locally before being sent to our servers. Enhance your local browsing privacy! After 30 minutes of inactivity, Search Encrypt results expire and can no longer be viewed.
  • 45
    NuCypher

    NuCypher

    NuCypher

    Manage secrets such as IAM tokens, database and SSH credentials, and signing/encryption keys across dynamic environments. Conditionally grant and revoke access to sensitive data to arbitrary numbers of recipients. Process encrypted data while preserving the confidentiality of the inputs and results. NuCypher's PRE network provides cryptographic access controls for distributed apps and protocols. NuCypher's NuFHE library enables secure, private computation on encrypted data by outsourced nodes. Fully Homomorphic Encryption (FHE) is a form of encryption that allows arbitrary, secure computation on encrypted data (meaning encrypted data can be processed without needing to decrypt it first). Operations on the encrypted data are applied as if being performed on the plaintext data.
  • 46
    Autopsy

    Autopsy

    Basis Technology

    Autopsy® is the premier end-to-end open source digital forensics platform. Built by Basis Technology with the core features you expect in commercial forensic tools, Autopsy is a fast, thorough, and efficient hard drive investigation solution that evolves with your needs. Tens of thousands of law enforcement and corporate cyber investigators around the world use Autopsy. Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It is used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recover photos from your camera's memory card. Everyone wants results yesterday. Autopsy runs background tasks in parallel using multiple cores and provides results to you as soon as they are found. It may take hours to fully search the drive, but you will know in minutes if your keywords were found in the user's home folder. See the fast results page for more details.
  • 47
    Phonexia Voice Inspector
    Perform fast and highly accurate language-independent forensic voice analysis using a speaker recognition solution explicitly designed for forensic experts and exclusively powered by state-of-the-art deep neural networks. Analyze the subject’s voice automatically with an advanced speaker identification tool, and support your forensic expert’s conclusion with accurate, unbiased voice analysis. Identify a speaker in the recordings of any language without the need to hire a language-specific linguist as Phonexia Voice Inspector can detect pronunciation differencies in any language. Present the results of your forensic voice analysis to a court in the most convenient way with an automatically generated report containing all the necessary details to validate the claim. Phonexia Voice Inspector is an out-of-the-box solution that provides police forces and forensic experts with a highly accurate speaker recognition tool to support effective criminal investigations and give evidence in court.
  • 48
    Password Scale
    Solve the team frustrations when managing passwords, get access to the shared password pool only by entering in a Slack group. Keep the team passwords encrypted and saved in a secure storage, mitigate the risk of compromising passwords stored in multiples and potentially insecure places. We document the encryption design, publishing the entire source code, making possible code reviews and check the implemented zero-knowledge protocol. To retrieve the link with the editor to create the secret, this link expires in 15 minutes. To make unreachable the secret, to complete deletion is necessary to do it manually from the s3 password storage. To setup the password storage, it is only necessary to execute it once. To retrieve a one-time-use link with the secret content, this link expires in 15 minutes. Go to our GitHub project for instructions on how to set up your own password server, also you can try the command on your Slack team using our test server.
  • 49
    Java

    Java

    Oracle

    The Java™ Programming Language is a general-purpose, concurrent, strongly typed, class-based object-oriented language. It is normally compiled to the bytecode instruction set and binary format defined in the Java Virtual Machine Specification. In the Java programming language, all source code is first written in plain text files ending with the .java extension. Those source files are then compiled into .class files by the javac compiler. A .class file does not contain code that is native to your processor; it instead contains bytecodes — the machine language of the Java Virtual Machine1 (Java VM). The java launcher tool then runs your application with an instance of the Java Virtual Machine.
  • 50
    Docskiff Smart Contract Analytics
    Smart Contract Analytics (SCA) is a comprehensive Contract Discovery and Analytics platform powered by Artificial Intelligence & Machine learning. The platform provides a 360 degree insight into contracts and other similar documents helping organizations extract, review and analyse critical information from the contracts and make informed decisions. Product features: 1) NLP and deep learning techniques for extracting metadata 2) Export the extracted data to Excel or client desired format and push the extracted data into any CLM or downstream system 3) Generate dynamic ML models based on the contract type 4) The Platform has adapters to various data sources to obtain legacy documents (For Example, FTP, Google Drive, SharePoint, Dropbox, box, S3 and others etc.) 5) The Platform can segregate the contracts based on the type of the contract (i.e. MSA, NDA, SOW etc.) 6) Document OCR capability with ability to convert images, unsearchable PDF and scanned documents into text.