15 years helping Singaporean businesses
choose better software
Digital Forensics Software
Digital Forensics software streamlines investigation and examination of security incidents through email analysis, network forensics, disk and data capture, mobile device analysis, and file analysis.
Filter Results (25)
Countries available
Countries where the product is available. Note: Customer support may not be accessible in that country.
Singapore
Pricing Options
25 results
Enables you to detect and block malware providing real-time threat intelligence and complete web, device, and data control.
Sophos Intercept X is the worlds most comprehensive next-generation endpoint
protection solution built to stop the widest range of attacks. Intercept X
combines multiple techniques including signatureless exploit prevention, deep
learning malware detection, anti-ransomware capabilities, root cause analysis,
and more.
Learn more about Intercept X Endpoint
...
Read more
Features
- Investigation Management
- Incident Management
- Endpoint Protection Software
- Reporting/Analytics
- Search/Filter
- Prioritization
- Threat Intelligence
- Anomaly/Malware Detection
- Alerts/Notifications
Caseboard is an integratable intelligence suite for visual data analysis, database integration, for investigating and preventing fraud.
Caseboard is an integratable intelligence suite for visual data analysis, database integration, for investigating and preventing fraud. With Caseboard, the tools available for users include link analysis, georeferncing, facial recognition, temporal pattern analysis, data enrichment, graphic representation of data analysis, and more.
Learn more about Caseboard
...
Read more
Features
- Investigation Management
- Incident Management
- Endpoint Protection Software
- Reporting/Analytics
- Search/Filter
- Prioritization
- Threat Intelligence
- Anomaly/Malware Detection
- Alerts/Notifications
Digital forensics solution for Law Enforcement that recovers, processes & analyzes digital evidence from multiple sources on a unified.
Magnet AXIOM is a digital forensics solution that helps Law Enforcement recover, process & analyze evidence-related data from computers, cloud and mobile devices on a unified interface. AXIOM provides easy reporting that presents data in a clear and direct manner. Some of the built-in analytics features such as Connections, Timeline and Magnet.AI can lead to breakthroughs in your examinations.
Learn more about Magnet AXIOM
...
Read more
Features
- Investigation Management
- Incident Management
- Endpoint Protection Software
- Reporting/Analytics
- Search/Filter
- Prioritization
- Threat Intelligence
- Anomaly/Malware Detection
- Alerts/Notifications
Electronic evidence examination and digital data processing solution that provides IoT, mobile/smartphone, and hard drive forensics.
Electronic evidence examination and digital data processing solution that provides IoT, mobile/smartphone, and hard drive forensics.
Learn more about E3:Universal
Features
- Investigation Management
- Incident Management
- Endpoint Protection Software
- Reporting/Analytics
- Search/Filter
- Prioritization
- Threat Intelligence
- Anomaly/Malware Detection
- Alerts/Notifications
Network Investigation and Post-Breach Analysis
Enterprise provides deep visibility into live data directly at the endpoint, helping you conduct faster, more targeted enterprise-wide post-breach, HR and compliance investigations in a single, robust solution. With Enterprise, you can respond quickly, remotely and discreetly while maintaining chain of custody, and facilitate focused forensic investigations and post-breach analysis, without interruption to business operations.
Learn more about Forensic Toolkit (FTK)
...
Read more
Features
- Investigation Management
- Incident Management
- Endpoint Protection Software
- Reporting/Analytics
- Search/Filter
- Prioritization
- Threat Intelligence
- Anomaly/Malware Detection
- Alerts/Notifications
Aware is the only comprehensive AI solution for governance, risk, compliance and people insights for leading collaboration platforms.
Your all-in-one governance, e-Discovery, DLP and intelligence platform, Aware enables collaboration for the enterprise by removing risk, enabling legal workflows, analyzing organization sentiment, and delivering authentic, continuous insights.
Aware adopts the latest advancements in cognitive computing, artificial intelligence, and behavioral analytics to amplify enterprise value by monitoring the social graph for Slack, Yammer, Microsoft Teams, Workplace by Facebook, Zoom, and more.
Learn more about Aware
...
Read more
Features
- Investigation Management
- Incident Management
- Endpoint Protection Software
- Reporting/Analytics
- Search/Filter
- Prioritization
- Threat Intelligence
- Anomaly/Malware Detection
- Alerts/Notifications
MailXaminer - A Forensic Tool Designed with the Intent to Recover, Read & Analysis Various facets of Email File Format.
MailXaminer is primarily designed using advanced technology for analysis of email files. The tool assists cyber experts in resolving Digital Crime cases using a semantic approach. This utility is attuned with desktop based & web based/cloud email file formats. MailXaminer allows investigators to analyze data through various view options like HTML, MIME, HEX, Message Header, etc. Software also provides various Search Mechanisms, Export Options as well as Team Collaboration feature.
Learn more about MailXaminer
...
Read more
Features
- Investigation Management
- Incident Management
- Endpoint Protection Software
- Reporting/Analytics
- Search/Filter
- Prioritization
- Threat Intelligence
- Anomaly/Malware Detection
- Alerts/Notifications
It is a digital forensics solution that helps businesses rebuild data, retrace actions, manage investigations, and more.
It is a digital forensics solution that helps businesses rebuild data, retrace actions, manage investigations, and more.
Learn more about IBM QRadar Incident Forensics
Features
- Investigation Management
- Incident Management
- Endpoint Protection Software
- Reporting/Analytics
- Search/Filter
- Prioritization
- Threat Intelligence
- Anomaly/Malware Detection
- Alerts/Notifications
Fully integrated security for every communication channel in your organization
Fully integrated security for every communication channel in your organization
Learn more about Trellix Network Security
Features
- Investigation Management
- Incident Management
- Endpoint Protection Software
- Reporting/Analytics
- Search/Filter
- Prioritization
- Threat Intelligence
- Anomaly/Malware Detection
- Alerts/Notifications
A central platform to rapidly Extract, Analyse and Report on data from 1,000s of digital devices.
An all-in-one Digital Forensics platform that enables organisations to extract, analyse and create court-ready reports on data from a range of devices including PCs, laptops, mobile phones, removable media, and smart devices.
Learn more about Detego Digital Forensics
...
Read more
Features
- Investigation Management
- Incident Management
- Endpoint Protection Software
- Reporting/Analytics
- Search/Filter
- Prioritization
- Threat Intelligence
- Anomaly/Malware Detection
- Alerts/Notifications
D3 SOAR is a platform with a fully embedded MITRE ATT&CK Module, for better Threat Intelligence, Monitoring, and Hunting.
D3 SOAR is a platform with a fully embedded MITRE ATT&CK Module, D3 Security helps SOC teams become Threat Hunters with streamlined workflows and $$$,$$$ in cost savings per year.
With D3 SOAR, you can unify teams across borders and job functions: Easily manage all Incidents and Cases, collaborate on complex security and legal investigations, conduct post-incident analyses, derive actionable analytics, and automatically report on progress to continually improve your security posture.
Learn more about D3 SOAR
...
Read more
Features
- Investigation Management
- Incident Management
- Endpoint Protection Software
- Reporting/Analytics
- Search/Filter
- Prioritization
- Threat Intelligence
- Anomaly/Malware Detection
- Alerts/Notifications
Tech solution to deter document leaks: can detect the leaker with just a photo of the compromised confidential document.
The state-of-the-art ITM technology, LeaksID, is designed to protect sensitive documents from insider threats. It offers a comprehensive solution for managing and preventing data and document leaks through its integration features. By utilizing a steganographic technique to embed undetectable and distinctive marks into confidential documents, LeaksID is an efficient deterrent against data breaches.
Learn more about LeaksID
...
Read more
Features
- Investigation Management
- Incident Management
- Endpoint Protection Software
- Reporting/Analytics
- Search/Filter
- Prioritization
- Threat Intelligence
- Anomaly/Malware Detection
- Alerts/Notifications
Cloud-based and on-premise endpoint protection solution that helps businesses protect devices from malware or phishing attacks.
Cloud-based and on-premise endpoint protection solution that helps businesses protect devices from malware or phishing attacks.
Learn more about Harmony Endpoint
Features
- Investigation Management
- Incident Management
- Endpoint Protection Software
- Reporting/Analytics
- Search/Filter
- Prioritization
- Threat Intelligence
- Anomaly/Malware Detection
- Alerts/Notifications
Cyber threat intelligence platform that helps streamline risk assessments, map cyber activities and facilitate fraud investigations.
Cyber threat intelligence platform that helps streamline risk assessments, map cyber activities, facilitate online fraud investigations, and more.
Learn more about DomainTools
Features
- Investigation Management
- Incident Management
- Endpoint Protection Software
- Reporting/Analytics
- Search/Filter
- Prioritization
- Threat Intelligence
- Anomaly/Malware Detection
- Alerts/Notifications
Allows crime scene documentation as well as 3D reconstruction of crime scenes, traffic accidents and fires
Allows crime scene documentation as well as 3D reconstruction of crime scenes, traffic accidents and fires
Learn more about SceneWorks
Features
- Investigation Management
- Incident Management
- Endpoint Protection Software
- Reporting/Analytics
- Search/Filter
- Prioritization
- Threat Intelligence
- Anomaly/Malware Detection
- Alerts/Notifications
Digital Forensic Case Management solution covering evidence management, notes, asset tracking and ISO compliance.
Digital Forensic Case Management solution covering evidence management, notes, asset tracking and ISO compliance.
Learn more about Lima
Features
- Investigation Management
- Incident Management
- Endpoint Protection Software
- Reporting/Analytics
- Search/Filter
- Prioritization
- Threat Intelligence
- Anomaly/Malware Detection
- Alerts/Notifications
A tool that helps forensics investigators map crime scenes and collect data faster with guided workflows.
A tool that helps forensics investigators map crime scenes and collect data faster with guided workflows.
Learn more about Trimble Forensics Capture
Features
- Investigation Management
- Incident Management
- Endpoint Protection Software
- Reporting/Analytics
- Search/Filter
- Prioritization
- Threat Intelligence
- Anomaly/Malware Detection
- Alerts/Notifications
Tool for the analysis of electronic evidence by are law enforcement, corporate investigators.
Tool for the analysis of electronic evidence by are law enforcement, corporate investigators.
Learn more about Forensic Explorer
Features
- Investigation Management
- Incident Management
- Endpoint Protection Software
- Reporting/Analytics
- Search/Filter
- Prioritization
- Threat Intelligence
- Anomaly/Malware Detection
- Alerts/Notifications
On Demand By-the-Hour Forensic Analysis & Remote Remediation
Companies need digital tools to help detect and respond to a cyber incident. Many traditional solutions are simply too expensive. Even worse, traditional solutions often have restrictive tool architectures that prevent investigators from moving quickly when an attack happens. With worldwide availability and by-the-hour pricing, CyFIR Investigator is an endpoint detection and response solution that is affordable and scalable so companies can get the best protection and only pay for what they need
Learn more about CyFIR Investigator
...
Read more
Features
- Investigation Management
- Incident Management
- Endpoint Protection Software
- Reporting/Analytics
- Search/Filter
- Prioritization
- Threat Intelligence
- Anomaly/Malware Detection
- Alerts/Notifications
Email security solution that enables businesses to proactively identify, analyze and respond to email attacks in real-time.
Email security solution that enables businesses to proactively identify, analyze and respond to email attacks in real-time.
Learn more about Barracuda Forensics and Incident Response
Features
- Investigation Management
- Incident Management
- Endpoint Protection Software
- Reporting/Analytics
- Search/Filter
- Prioritization
- Threat Intelligence
- Anomaly/Malware Detection
- Alerts/Notifications
Digital forensics solution that offers automated incident response, orchestration, endpoint visibility, and more.
Digital forensics solution that offers automated incident response, orchestration, endpoint visibility, and more.
Learn more about Cyber Triage
Features
- Investigation Management
- Incident Management
- Endpoint Protection Software
- Reporting/Analytics
- Search/Filter
- Prioritization
- Threat Intelligence
- Anomaly/Malware Detection
- Alerts/Notifications
EnCase Forensic is designed to help investigators search and identify potential evidence across computers, laptops, and mobile devices.
EnCase Forensic is designed to help investigators search and identify potential evidence across computers, laptops, and mobile devices.
Learn more about EnCase Forensic
Features
- Investigation Management
- Incident Management
- Endpoint Protection Software
- Reporting/Analytics
- Search/Filter
- Prioritization
- Threat Intelligence
- Anomaly/Malware Detection
- Alerts/Notifications
Phonexia Orbis Investigator is a revolutionary out-of-the-box solution for the rapid investigation of audio recordings.
Phonexia Orbis Investigator is a revolutionary out-of-the-box solution for the rapid investigation of audio recordings by law enforcement agencies. Powered by cutting-edge voice biometrics and speech recognition, it identifies speakers and other key information in audio recordings automatically and provides investigators with an intuitive interface for performing case-specific analyses and visualizations, managing notes, and creating reports.
Learn more about Phonexia Orbis Investigator
...
Read more
Features
- Investigation Management
- Incident Management
- Endpoint Protection Software
- Reporting/Analytics
- Search/Filter
- Prioritization
- Threat Intelligence
- Anomaly/Malware Detection
- Alerts/Notifications
A digital forensic toolkit with advanced search capabilities designed to streamline the evidence discovery process.
FTK Forensic Toolkit by Exterro is a digital forensic investigation software that enables users to streamline the evidence discovery process. This toolkit can be used to efficiently analyze data from multiple sources, retrieve deleted files, and reconstruct digital trails. Its intuitive interface and advanced search capabilities can assist with navigating complex data, saving forensic specialists time and effort. FTK Forensic Toolkit can also be used to decrypt files, crack passwords, and build reports.
Learn more about FTK Forensic Toolkit
...
Read more
Features
- Investigation Management
- Incident Management
- Endpoint Protection Software
- Reporting/Analytics
- Search/Filter
- Prioritization
- Threat Intelligence
- Anomaly/Malware Detection
- Alerts/Notifications
Digital forensics tool that helps law enforcement agencies utilize AI to manage audio & video analytics for conducting investigations.
Digital forensics solution that helps law enforcement agencies utilize AI to manage audio and video analytics for conducting investigations.
Learn more about Videoma Intelion
Features
- Investigation Management
- Incident Management
- Endpoint Protection Software
- Reporting/Analytics
- Search/Filter
- Prioritization
- Threat Intelligence
- Anomaly/Malware Detection
- Alerts/Notifications