Software

Software


Mostrar por página
Ordenar por

 

Internet Evidence Finder (IEF) is the market leading forensic software used for the recovery of Internet-related data from computer hard drives and live memory.

*Price upon request

The ideal email investigation and eDiscovery software tool for an agency, law firm, or investigative team that needs to coordinate the search and analysis of Electronically Stored Information (ESI) and files in excess of 250 gigabytes.

*Price upon request

To process, search and analyze Electronically Stored Information in excess of 250GB. Intella® Pro was designed for corporate investigators, professional service firms and consultants who have a need to review larger amounts of ESI.

 

*Price upon request

The ideal email investigation and eDiscovery software tool for single users that need to search and analyze larger amounts of Electronically Stored Information (ESI) up to 250 gigabytes.

 

*Price upon request

It performs the same functions of Intella® 100, 250 and Pro except for indexing, thus enabling another investigator to view the case on a different computer. (Limit of 2 Viewers per license of Intella® 100, Limit of 3 Viewers per Intella® 250 and 8 Viewers with Intella® Pro).

*Price upon request

To process evidence files linked to child exploitation cases. A means for cross jurisdiction collaboration between police services worldwide. Includes automated image appearance matching, face identification and many other tools.

*Price upon request

Another component of Paraben's P2 Forensic Collection that adds one more powerful program to your toolkit. Whether your case has ICQ, Yahoo, MSN, Trillian, Skype, Hello, or Miranda you'll be able to handle whatever comes your way.

*Price upon request

court proven, computer forensic solution for examiners who need affordable, reliable analysis for computer investigations. To process large volumes of data,  it is known for its advanced email and chat log analysis. 

*Price upon request

With Network E-mail Examiner, you can now thoroughly examine Microsoft Exchange (EDB), Lotus Notes (NSF), and GroupWise e-mail stores.

*Price upon request

To examine AOL 9.0, PST files, and over 14 other mail types, including e-mail in the deleted folders and e-mail deleted from deleted items. With bookmarking and advanced searching features including multiple word & multiple phrase searching.

*Price upon request

P2 eXplorer is a forensic image mounting tool designed to help investigators manage and examine evidence. With P2 eXplorer, you can mount forensic images as read-only local logical and physical disks.

*Price upon request

Link Analysis can be a valuable tool for any forensic investigator to be able to sift through the data to find the "smoking gun."

*Price upon request
The endpoint incident response software solution designed to reduce costs and complexities associated with the incident response process and reduce the risk of exposing sensitive data to loss or theft.

 

*Price upon request

A market leader in e-discovery software, EnCase® eDiscovery Complete gives in-house counsel control and oversight of every phase of the electronic discovery process.

 

*Price upon request

The industry-standard computer investigation solution, is for forensic practitioners who need to conduct efficient, forensically sound data collection and investigations using a repeatable and defensible process.

 

(Delivery: DownloadOnly, License: 25)

For monitoring employees in the office or working remotely: records web sites visited, emails, chats, keystrokes typed, files transferred, documents printed and applications run.

SpectorSoft's most popular software for conducting investigations of detailed employee computer and Internet activity. Automatically documents and archives everything your employees do on the computer and the Internet.

*Price upon request

A court-accepted digital investigations platform that is built for speed, analytics and enterprise-class scalability. Known for its intuitive interface, email analysis, customizable data views and stability. Can grow with your organization’s needs.

                                                                      *Price upon request

Reduce the need for cumbersome write-blocking hardware. SoftBlock blocks data transfer at the kernel level. Manage and monitor all attached and mounted device settings within one consolidated interface.Works only on Mac OS X.

*Price upon request

Passware Kit Enterprise helps IT professionals, system administrators and security experts to solve password related problems, which frequently occur in corporate environment.

* Price upon request

Amped Five is a world leader in image processing software specifically designed for investigative, forensic and security applications. Its primary purpose is to provide forensic investigators a complete and unique solution to process and analyze digital images and video data in a simple, fast and precise way.

Amped Authenticate is a software package for forensic image authentication and tamper detection on digital photos. Authenticate provides a suite of different tools to determine whether an image is an unaltered original, an original generated by a specific device, or the result of a manipulation with a photo editing software and thus may not be accepted as evidence. Current products and processes are focused on one or a relative few scientific tools. Authenticate puts the power of multiple tests, procedures, and reporting in one package to improve the user's ability to detect tampered images or determine originality.

Amped VideoScanner is a portable self-contained USB tool for quick and effective analysis of the content of a high volume of video files during forensic investigations. VideoScanner will automatically locate all video files in a folder, drive, or an entire device. Then VideoScanner can extract frame snapshots at user defined intervals and generate a full report with all the relevant information. For efficient chain of custody, VideoScanner can hash files with an MD5 hash code.

 

*Price upon request

Designed for forensic examiners & military/intelligence operatives in law enforcement & government, as well as IT security personnel in corporations who are conducting forensic examinations in the field, or on live systems.

The Data Extractor Express is a specialized software product functioning in tandem with the PC-3000 Express hardware-software product. It is intended for recovering data from SATA (Serial ATA) and ATA (IDE) HDDs 3.5″, 2.5″, 1.8″, 1.0″, USB HDD, SSHD (Solid State Hybrid Drive) etc. 

* Los precios no incluyen el IVA ni la entrega