| Easiest VA/VM to set up and
Lowest false positive rate
Scales from 200 to 2M nodes
Cerberus is a malware triage technology that is available as an add-on for FTK 4. The first step towards automated reverse engineering, Cerberus provides threat scores and disassembly analysis to determine both the behaviour and intent of suspect binaries.
EnCase® Cybersecurity is a unique solution designed to expose and mitigate internal and external risks and threats which evade traditional information security solutions. Understand at the deepest levels what is occurring on your endpoints and ensure 100% visibility into unstructured and volatile data across the enterprise. The powerful cyberforensic capabilities of EnCase Cybersecurity are designed to bring accurate and rapid closure to any incident.
EnCase® Enterprise is a network enabled, covert investigative solution that allows organisations to do a forensically sound investigation across the wire from a single point on a network without having to have physical possession of the system or hard drive in question and without taking it off line, avoiding any business disruption.
AccessData® Enterprise takes network-enabled digital investigations to the next level. Built on our industry-standard, court-validated Forensic Toolkit® technology, AD Enterprise delivers state-of-the-art incident response capabilities, deep dive analysis of both volatile and static data, as well as superior threat detection capabilities – all within an easy-to-use interface. A role-based permission system, an intuitive incident response console, secure batch remediation capabilities, unsurpassed searching and filtering, and comprehensive logging and reporting are just a few of the reasons AD Enterprise is quickly being adopted by Fortune 500 companies.
Forensic Toolkit® (FTK®) is recognized around the world as the standard in computer forensics investigation technology. This court-validated digital investigations platform delivers cutting-edge analysis, decryption and password cracking all within an intuitive, customizable and user-friendly interface.
OnLineDFS (tm) software enables in-depth analysis of computer systems in order to identify behavior that is at variance with policies, regulations or laws, and to gather data in a forensically sound manner.
Because OnLineDFS enables non-disruptive but forensically-sound examination and information-gathering, as well as data gathering from systems which are geographically remote from the investigator, it is ideal for auditing running systems for compliance assurance and for gathering data for e-discovery.
SilentRunner® enables you to answer the difficult question of "What happened?" in the aftermath of a security incident by tackling the complicated tasks of capturing, analyzing and visualizing network data. It is a passive network monitoring solution that visualizes network activity by creating a dynamic picture of communication flows, swiftly uncovering break-in attempts, weaknesses, abnormal usage, policy violations and misuse, and anomalies — before, during and after an incident.
SilentRunner™ Sentinel™ lets you know what’s happening on your network by tackling the complicated tasks of capturing, analyzing and visualizing network and VoIP data. It’s a passive network monitoring solution that creates a dynamic picture of communication flows to swiftly uncover break-in attempts, weaknesses, abnormal usage, policy violations and anomalies before, during and after an incident. Operating like a surveillance camera, SilentRunner Sentinel can play back events from thousands of communications to validate system threats and investigate security breaches.