15 years helping Australian businesses
choose better software

Digital Forensics Software

Digital Forensics software streamlines investigation and examination of security incidents through email analysis, network forensics, disk and data capture, mobile device analysis, and file analysis.

Australia Show local products

25 results

Enables you to detect and block malware providing real-time threat intelligence and complete web, device, and data control.
Sophos Intercept X is the worlds most comprehensive next-generation endpoint protection solution built to stop the widest range of attacks. Intercept X combines multiple techniques including signatureless exploit prevention, deep learning malware detection, anti-ransomware capabilities, root cause analysis, and more. Learn more about Intercept X Endpoint

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
Caseboard is an integratable intelligence suite for visual data analysis, database integration, for investigating and preventing fraud.
Caseboard is an integratable intelligence suite for visual data analysis, database integration, for investigating and preventing fraud. With Caseboard, the tools available for users include link analysis, georeferncing, facial recognition, temporal pattern analysis, data enrichment, graphic representation of data analysis, and more. Learn more about Caseboard

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
Digital forensics solution for Law Enforcement that recovers, processes & analyzes digital evidence from multiple sources on a unified.
Magnet AXIOM is a digital forensics solution that helps Law Enforcement recover, process & analyze evidence-related data from computers, cloud and mobile devices on a unified interface. AXIOM provides easy reporting that presents data in a clear and direct manner. Some of the built-in analytics features such as Connections, Timeline and Magnet.AI can lead to breakthroughs in your examinations. Learn more about Magnet AXIOM

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
Electronic evidence examination and digital data processing solution that provides IoT, mobile/smartphone, and hard drive forensics.
Electronic evidence examination and digital data processing solution that provides IoT, mobile/smartphone, and hard drive forensics. Learn more about E3:Universal

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
Network Investigation and Post-Breach Analysis
Enterprise provides deep visibility into live data directly at the endpoint, helping you conduct faster, more targeted enterprise-wide post-breach, HR and compliance investigations in a single, robust solution. With Enterprise, you can respond quickly, remotely and discreetly while maintaining chain of custody, and facilitate focused forensic investigations and post-breach analysis, without interruption to business operations. Learn more about Forensic Toolkit (FTK)

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
Aware is the only comprehensive AI solution for governance, risk, compliance and people insights for leading collaboration platforms.
Your all-in-one governance, e-Discovery, DLP and intelligence platform, Aware enables collaboration for the enterprise by removing risk, enabling legal workflows, analyzing organization sentiment, and delivering authentic, continuous insights. Aware adopts the latest advancements in cognitive computing, artificial intelligence, and behavioral analytics to amplify enterprise value by monitoring the social graph for Slack, Yammer, Microsoft Teams, Workplace by Facebook, Zoom, and more. Learn more about Aware

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
MailXaminer - A Forensic Tool Designed with the Intent to Recover, Read & Analysis Various facets of Email File Format.
MailXaminer is primarily designed using advanced technology for analysis of email files. The tool assists cyber experts in resolving Digital Crime cases using a semantic approach. This utility is attuned with desktop based & web based/cloud email file formats. MailXaminer allows investigators to analyze data through various view options like HTML, MIME, HEX, Message Header, etc. Software also provides various Search Mechanisms, Export Options as well as Team Collaboration feature. Learn more about MailXaminer

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
Trellix Network Security uses behavior analysis and machine learning to detect and block advanced cyberattacks across networks.
Trellix Network Security is a network detection and response solution that helps organizations detect, block, and respond to advanced targeted and other evasive attacks. The software leverages signatureless threat detection, machine learning and artificial intelligence, and correlation engines to identify known and unknown threats in real time while enabling back-in-time detection. Trellix Network Security provides visibility across diverse network environments to protect against zero-day, polymorphic, and ransomware attacks. The solution maps detected threats and can be deployed in-line, out of band, on-premises, in the cloud, and in hybrid environments. Learn more about Trellix Network Security

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
It is a digital forensics solution that helps businesses rebuild data, retrace actions, manage investigations, and more.
It is a digital forensics solution that helps businesses rebuild data, retrace actions, manage investigations, and more. Learn more about IBM QRadar Incident Forensics

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
A central platform to rapidly Extract, Analyse and Report on data from 1,000s of digital devices.
An all-in-one Digital Forensics platform that enables organisations to extract, analyse and create court-ready reports on data from a range of devices including PCs, laptops, mobile phones, removable media, and smart devices. Learn more about Detego Digital Forensics

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
D3 SOAR is a platform with a fully embedded MITRE ATT&CK Module, for better Threat Intelligence, Monitoring, and Hunting.
D3 SOAR is a platform with a fully embedded MITRE ATT&CK Module, D3 Security helps SOC teams become Threat Hunters with streamlined workflows and $$$,$$$ in cost savings per year. With D3 SOAR, you can unify teams across borders and job functions: Easily manage all Incidents and Cases, collaborate on complex security and legal investigations, conduct post-incident analyses, derive actionable analytics, and automatically report on progress to continually improve your security posture. Learn more about D3 SOAR

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
On-premise platform for Windows that enables you to recover, collect, search, and convert email data.
Software for Email Forensics, eDiscovery & Conversion Leverage the same email processing tool as Fortune 500 companies, government agencies and legal professionals around the globe. Quality software from Switzerland. Learn more about Aid4Mail

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
Australia Local product
Tool for the analysis of electronic evidence by are law enforcement, corporate investigators.
Tool for the analysis of electronic evidence by are law enforcement, corporate investigators. Learn more about Forensic Explorer

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
Tech solution to deter document leaks: can detect the leaker with just a photo of the compromised confidential document.
The state-of-the-art ITM technology, LeaksID, is designed to protect sensitive documents from insider threats. It offers a comprehensive solution for managing and preventing data and document leaks through its integration features. By utilizing a steganographic technique to embed undetectable and distinctive marks into confidential documents, LeaksID is an efficient deterrent against data breaches. Learn more about LeaksID

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
Harmony Endpoint Protection is an endpoint security solution that protects against malware, ransomware, phishing, and other threats.
Harmony Endpoint Protection is an endpoint security solution that provides comprehensive protection for remote workforces and organizations against modern threats like ransomware, phishing, malware, and data breaches. The unified platform integrates advanced threat prevention, fastest recovery, and optimized total cost of ownership in a single, efficient solution that is easy to deploy, manage, and integrate across networks, clouds, and devices. Learn more about Harmony Endpoint

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
Cyber threat intelligence platform that helps streamline risk assessments, map cyber activities and facilitate fraud investigations.
Cyber threat intelligence platform that helps streamline risk assessments, map cyber activities, facilitate online fraud investigations, and more. Learn more about DomainTools

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
Allows crime scene documentation as well as 3D reconstruction of crime scenes, traffic accidents and fires
Allows crime scene documentation as well as 3D reconstruction of crime scenes, traffic accidents and fires Learn more about SceneWorks

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
Digital Forensic Case Management solution covering evidence management, notes, asset tracking and ISO compliance.
Digital Forensic Case Management solution covering evidence management, notes, asset tracking and ISO compliance. Learn more about Lima

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
A tool that helps forensics investigators map crime scenes and collect data faster with guided workflows.
A tool that helps forensics investigators map crime scenes and collect data faster with guided workflows. Learn more about Trimble Forensics Capture

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
On Demand By-the-Hour Forensic Analysis & Remote Remediation
Companies need digital tools to help detect and respond to a cyber incident. Many traditional solutions are simply too expensive. Even worse, traditional solutions often have restrictive tool architectures that prevent investigators from moving quickly when an attack happens. With worldwide availability and by-the-hour pricing, CyFIR Investigator is an endpoint detection and response solution that is affordable and scalable so companies can get the best protection and only pay for what they need Learn more about CyFIR Investigator

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
Email security solution that enables businesses to proactively identify, analyze and respond to email attacks in real-time.
Email security solution that enables businesses to proactively identify, analyze and respond to email attacks in real-time. Learn more about Barracuda Forensics and Incident Response

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
Digital forensics solution that offers automated incident response, orchestration, endpoint visibility, and more.
Digital forensics solution that offers automated incident response, orchestration, endpoint visibility, and more. Learn more about Cyber Triage

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
EnCase Forensic is designed to help investigators search and identify potential evidence across computers, laptops, and mobile devices.
EnCase Forensic is designed to help investigators search and identify potential evidence across computers, laptops, and mobile devices. Learn more about EnCase Forensic

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
A digital forensic toolkit with advanced search capabilities designed to streamline the evidence discovery process.
FTK Forensic Toolkit by Exterro is a digital forensic investigation software that enables users to streamline the evidence discovery process. This toolkit can be used to efficiently analyze data from multiple sources, retrieve deleted files, and reconstruct digital trails. Its intuitive interface and advanced search capabilities can assist with navigating complex data, saving forensic specialists time and effort. FTK Forensic Toolkit can also be used to decrypt files, crack passwords, and build reports. Learn more about FTK Forensic Toolkit

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications
Digital forensics tool that helps law enforcement agencies utilize AI to manage audio & video analytics for conducting investigations.
Digital forensics solution that helps law enforcement agencies utilize AI to manage audio and video analytics for conducting investigations. Learn more about Videoma Intelion

Features

  • Investigation Management
  • Incident Management
  • Endpoint Protection Software
  • Reporting/Analytics
  • Search/Filter
  • Prioritization
  • Threat Intelligence
  • Anomaly/Malware Detection
  • Alerts/Notifications