---
description: Discover the best Digital Forensics Tools for your organisation. Compare top Digital Forensics Tools tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Best Digital Forensics Tools - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Digital Forensics Tools](https://www.softwareadvice.co.uk/directory/4450/digital-forensics/software)

# Digital Forensics Tools

Canonical: https://www.softwareadvice.co.uk/directory/4450/digital-forensics/software

-----

## Products

1. [Intercept X Endpoint](https://www.softwareadvice.co.uk/software/159223/sophos-endpoint-antivirus) — 4.5/5 (220 reviews) — Sophos Intercept X is a hybrid antivirus solution that provides businesses protection against malware, viruses and of...
2. [Caseboard](https://www.softwareadvice.co.uk/software/419825/caseboard) — 4.9/5 (13 reviews) — Caseboard is a solution specialized in data integration and analysis, whose functionalities improve the processes of ...
3. [Exterro E-Discovery Software Suite](https://www.softwareadvice.co.uk/software/134872/exterro) — 3.8/5 (9 reviews) — Exterro Project Management is a cloud-based project management solution which helps law firms and in-house legal team...
4. [Magnet AXIOM](https://www.softwareadvice.co.uk/software/241401/magnet-axiom) — 4.7/5 (7 reviews) — Magnet AXIOM is a Digital Forensics software for Public Safety professionals designed to recover and examine evidence...
5. [E3:Universal](https://www.softwareadvice.co.uk/software/241688/e3-universal) — 5.0/5 (6 reviews) — E3:Universal is an on-premise digital forensics solution, which helps investigators and businesses in the public sect...
6. [Forensic Toolkit (FTK)](https://www.softwareadvice.co.uk/software/241601/forensic-toolkit) — 3.8/5 (4 reviews) — Forensic Toolkit (FTK) is an investigation management software designed to help businesses in the healthcare, finance...
7. [IBM QRadar Incident Forensics](https://www.softwareadvice.co.uk/software/393891/ibm-qradar-incident-forensics) — 4.8/5 (4 reviews) — IBM QRadar Incident Forensics is a digital forensics solution that helps businesses streamline operations related to ...
8. [Aware](https://www.softwareadvice.co.uk/software/331022/awarehq) — 3.5/5 (4 reviews) — The Aware platform enables organizations to proactively discover, classify, secure, and manage data It solves for gov...
9. [Trellix Network Security](https://www.softwareadvice.co.uk/software/420321/fireeye-network-security) — 3.7/5 (3 reviews) — Trellix Network Security is an on-premise and cloud-based solution designed to help businesses leverage artificial in...
10. [MailXaminer](https://www.softwareadvice.co.uk/software/239762/mailxaminer) — 4.7/5 (3 reviews) — The first major launch in the field of e-Discovery applications, led by MailXaminer, was a complete forensic email in...
11. [Detego Digital Forensics](https://www.softwareadvice.co.uk/software/241650/detego-digital-forensics) — 4.5/5 (2 reviews) — Detego Digital Forensics is designed to help intelligence agencies, law enforcement units, and forensic departments a...
12. [Harmony Endpoint](https://www.softwareadvice.co.uk/software/262306/harmony-endpoint) — 4.0/5 (2 reviews) — Harmony Endpoint is a cloud-based and on-premise security and digital forensics solution, which helps small to large ...
13. [Barracuda Incident Response](https://www.softwareadvice.co.uk/software/241409/barracuda-forensics-and-incident-response) — 5.0/5 (1 reviews) — Barracuda Forensics and Incident Response is an email security solution that helps businesses identify and respond to...
14. [DomainTools](https://www.softwareadvice.co.uk/software/262311/domaintools) — 5.0/5 (1 reviews) — DomainTools is a web-based threat intelligence software designed to help businesses assess the risk of domains, inves...
15. [Aid4Mail](https://www.softwareadvice.co.uk/software/430245/aid4mail-service) — 5.0/5 (1 reviews) — Aid4Mail is a fast and accurate email search and conversion application for use in digital forensics, eDiscovery, mai...
16. [Fidelis Elevate](https://www.softwareadvice.co.uk/software/307619/fidelis-elevate) — 5.0/5 (1 reviews) — Fidelis Elevate, an Open XDR (Extended Detection and Response) platform, enables cyber security by automating defense...
17. [Trimble Forensics Capture](https://www.softwareadvice.co.uk/software/404970/trimble-forensics-capture) (0 reviews) — Trimble Forensics Capture helps investigators map crime scenes and collect data faster with guided workflows. The gui...
18. [OpenText Forensic](https://www.softwareadvice.co.uk/software/391754/encase-forensic) (0 reviews) — EnCase Forensic is a digital forensic solution that can collect and preserve critical desktop/mobile evidence from mu...
19. [Lima](https://www.softwareadvice.co.uk/software/241383/lima) (0 reviews) — Lima is a digital forensics solution, which enables regulatory bodies, law enforcement agencies and businesses to man...
20. [Nuix Neo Investigations](https://www.softwareadvice.co.uk/software/526526/Nuix-Neo-Investigations) (0 reviews) — Nuix Neo Investigations is a software that allows for deep data analysis and real-time collaboration to uncover insig...
21. [Strand](https://www.softwareadvice.co.uk/software/529673/Strand) (0 reviews) — Strand is an AI-enabled platform that automates the digital forensic and incident response processes. Built for MSPs,...
22. [SafeRestore](https://www.softwareadvice.co.uk/software/538330/SafeRestore) (0 reviews) — SafeRestore is an AI-powered data recovery software and cloud suite designed to recover deleted files, photos, messag...

## Related Categories

- [Investigation Management Software](https://www.softwareadvice.co.uk/directory/4635/investigation-management/software)
- [Network Monitoring Tools](https://www.softwareadvice.co.uk/directory/4307/network-monitoring/software)
- [SOAR Tools](https://www.softwareadvice.co.uk/directory/4421/soar/software)
- [Electronic Discovery Software](https://www.softwareadvice.co.uk/directory/4517/ediscovery/software)
- [Network Security Software](https://www.softwareadvice.co.uk/directory/4170/network-security/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.uk/directory/4450/digital-forensics/software)
- [All Categories](https://www.softwareadvice.co.uk/directory)

## This page is available in the following languages

| Locale | URL |
| de | <https://www.softwareadvice.de/directory/4450/digital-forensics/software> |
| en | <https://www.softwareadvice.com/digital-forensics/> |
| en-AU | <https://www.softwareadvice.com.au/directory/4450/digital-forensics/software> |
| en-GB | <https://www.softwareadvice.co.uk/directory/4450/digital-forensics/software> |
| en-IE | <https://www.softwareadvice.ie/directory/4450/digital-forensics/software> |
| en-NZ | <https://www.softwareadvice.co.nz/directory/4450/digital-forensics/software> |
| fr | <https://www.softwareadvice.fr/directory/4450/digital-forensics/software> |

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice UK","address":{"@type":"PostalAddress","addressLocality":"Egham","addressRegion":"ENG","postalCode":"TW20 9AH","streetAddress":"Tamesis, The Glanty, Staines-upon-Thames Egham TW20 9AH United Kingdom"},"description":"Software Advice helps businesses in the UK find the best software with confidence. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.uk","url":"https://www.softwareadvice.co.uk/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@type":"Organization","@id":"https://www.softwareadvice.co.uk/#organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SoftwareAdvice UK","url":"https://www.softwareadvice.co.uk/","@type":"WebSite","@id":"https://www.softwareadvice.co.uk/#website","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.co.uk/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Digital Forensics Tools","description":"Discover the best Digital Forensics Tools for your organisation. Compare top Digital Forensics Tools tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.co.uk/directory/4450/digital-forensics/software","about":{"@id":"https://www.softwareadvice.co.uk/directory/4450/digital-forensics/software#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.co.uk/directory/4450/digital-forensics/software#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.softwareadvice.co.uk/directory/4450/digital-forensics/software#webpage","mainEntity":{"@id":"https://www.softwareadvice.co.uk/directory/4450/digital-forensics/software#itemlist"},"isPartOf":{"@id":"https://www.softwareadvice.co.uk/#website"},"inLanguage":"en-GB","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Digital Forensics Tools","position":2,"item":"https://www.softwareadvice.co.uk/directory/4450/digital-forensics/software","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.uk/directory/4450/digital-forensics/software#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Best Digital Forensics Tools - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"Intercept X Endpoint","position":1,"description":"Sophos Intercept X is a hybrid antivirus solution that provides businesses protection against malware, viruses and offers a remote management tool. The anti-malware protection is designed to identify, block or remove threats, thus protecting computers and servers from viruses, adware, spyware and other infections. It can be deployed on-premise or hosted in the cloud.\n\n\nWeb protection adds a layer of defense, which prevents attacks originating from infected websites, scanning for and blocking threats before they can affect devices.\n\n\nSophos Intercept X also features device and application control which enables an administrator to set rules governing the use of removable media like USBs and mobile and wireless devices. Unauthorized applications and devices can be prevented from accessing the network that helps prevent the spread of malware and reducing the risk of data loss.\n\n\nSophos Intercept X includes a centralized management console which enables an administrator to monitor computers on the network. Support is offered via live chat and through an online helpdesk and a knowledge base.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/53dffd09-6bf4-49f8-b4a3-4006b48a8d7a.png","url":"https://www.softwareadvice.co.uk/software/159223/sophos-endpoint-antivirus","@type":"ListItem"},{"name":"Caseboard","position":2,"description":"Caseboard is a solution specialized in data integration and analysis, whose functionalities improve the processes of criminal investigation, auditing, prevention and the fight against fraud.\n\nBased on interaction with various security and anti-fraud agencies, we built a platform with the most modern technology, with a dynamic and friendly interface.\n\nIntelligent, intuitive and efficient information is generated in an integrated environment through resources for link analysis, analysis with maps and graphs, integration with social networks, facial recognition and temporal patterns, among others.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b91aaa6f-e115-4275-aaca-bd83bfa6f497.png","url":"https://www.softwareadvice.co.uk/software/419825/caseboard","@type":"ListItem"},{"name":"Exterro E-Discovery Software Suite","position":3,"description":"Exterro Project Management is a cloud-based project management solution which helps law firms and in-house legal teams with legal and e-discovery processes. The software provides customized project orchestration along with the user-defined workflows to coordinate all relevant activities and tasks such as production, preservation, collection, review and processing.\n\n\nExterro Project Management’s key benefits include collaboration within the team, defensibility via automated processes and visibility through dashboards. Primary features of the software include collection tracking, request management, intake, analytics, visual dashboards, real-time reporting and deadlines.\n\n\nAdditionally, the software provides documented processes and auditable workflows to coordinate with internal workforce, third party vendors and external law agencies. Exterro Project Management can integrate with tools such as OneDrive, SharePoint, Veritas, Slack, Box and Druva.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4a0bf3d4-528b-4877-8d74-1a4ae43c069c.png","url":"https://www.softwareadvice.co.uk/software/134872/exterro","@type":"ListItem"},{"name":"Magnet AXIOM","position":4,"description":"Magnet AXIOM is a Digital Forensics software for Public Safety professionals designed to  recover and examine evidence in a case file. The platform allows administrators to retrieve data such as browser history, deleted files and chats from cloud databases, mobile devices and computers.  \n\nLaw enforcement professionals can analyze media and text-based content across evidentiary sources and identify conversations regarding weapons, drugs and other relevant data. Magnet AXIOM enables teams to bypass passwords and extract images from locked or unlocked mobile devices. Additionally, operators can generate investigation reports to visualize connections between different files and devices. \n\nMagnet AXIOM lets businesses integrate the system with several third-party applications including GrayKey and Volatility. Pricing is available on request and support is extended via phone, email and knowledge base.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c8327a18-dab3-4999-8695-ff40bee90ee8.jpeg","url":"https://www.softwareadvice.co.uk/software/241401/magnet-axiom","@type":"ListItem"},{"name":"E3:Universal","position":5,"description":"E3:Universal is an on-premise digital forensics solution, which helps investigators and businesses in the public sector process multiple types of evidence from within a unified platform. Professionals can utilize the content analysis wizard to review files by sorting them into multiple categories including documents, emails, graphics and videos.\n\nUsing E3:Universal, organizations can search, parse and review evidence across mobile devices, operating systems, cloud data, email conversations, computers and more. Its E3:Viewer platform lets administrators gain insights into malware scan results and data investigations through reports. Additionally, it enables supervisors to review mobile applications' access rights and data sources.\n\nUsing E3:Universal is available on license and support is extended via live chat, video tutorials, documentation and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/cc4b8dc4-3eba-4a6b-a9f7-5c6d9763c1ac.png","url":"https://www.softwareadvice.co.uk/software/241688/e3-universal","@type":"ListItem"},{"name":"Forensic Toolkit (FTK)","position":6,"description":"Forensic Toolkit (FTK) is an investigation management software designed to help businesses in the healthcare, finance, legal, energy and other sectors search, process and index data from multiple sources. The platform enables administrators to decrypt files, recover passwords and automatically analyze network data on a unified interface. \n\nManagers can search, tag, label, bookmark and export different cases based on categories and review them in an offline mode. Forensic Toolkit (FTK) offers a data carving engine, allowing operators to process data based on file and pixel size or data type. Additionally, teams can detect and parse URLs, identify similar faces of individuals or objects across images, visualize collected data via pie charts, cluster graphs and timelines.\n\nForensic Toolkit (FTK) lets businesses integrate the system with several third-party applications including Qview. Pricing is available on request and support is extended via phone, email, forums, knowledge base and live chat.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/dc471e6f-624a-4778-b137-4557953315bc.png","url":"https://www.softwareadvice.co.uk/software/241601/forensic-toolkit","@type":"ListItem"},{"name":"IBM QRadar Incident Forensics","position":7,"description":"IBM QRadar Incident Forensics is a digital forensics solution that helps businesses streamline operations related to data collection, rebuilding, analysis, and more on a centralized platform. It enables staff members to gain visibility into the impact of the intrusion by identifying and retracing cyber-criminal actions, preventing incident reoccurrence.\n\nIBM QRadar Incident Forensics allows employees to compile evidentiary profiles, rebuild security incident data, and create a step-by-step view of all offenses. It lets supervisors create visualizations to gain insights into digital impressions and extended relationships, based on IP addresses, chat, email, and social media identities. Additionally, IT security teams can collect contextual incident data from log events, network flows, full packet captures, and digitally stored documents.\n\nIBM QRadar Incident Forensics enables administrators to set up IBM Security App Exchange access rights, allowing team members to collaborate on threat-prevention operations. Pricing is available on request and support is extended via live chat, email, documentation and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ca546cf8-5e03-4f34-b464-7aac3701b648.png","url":"https://www.softwareadvice.co.uk/software/393891/ibm-qradar-incident-forensics","@type":"ListItem"},{"name":"Aware","position":8,"description":"The Aware platform enables organizations to proactively discover, classify, secure, and manage data It solves for governance, risk, compliance and insights from collaboration tools like Slack, Workplace, Teams, and Yammer. Aware secures and protects digital workplaces, enabling visibility into business-critical communications. It mitigates risk associated with sensitive information and enables enhanced compliance monitoring and adherence to Internal policies.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/341243f2-dbac-4d43-9acd-c9b896dac531.png","url":"https://www.softwareadvice.co.uk/software/331022/awarehq","@type":"ListItem"},{"name":"Trellix Network Security","position":9,"description":"Trellix Network Security is an on-premise and cloud-based solution designed to help businesses leverage artificial intelligence (AI), Multi-Vector Virtual Execution (MVX) and machine learning (ML) technologies to detect, manage and resolve cyber attacks. The system provides an intrusion prevention system (IPS) for organizations to identify attacks by matching conventional signatures.\n\nTrellix Network Security's riskware categorization functionality separates critical breach attempts from less malicious activities, allowing businesses to prioritize incident response. Professionals can use real-time evidence to manage newly discovered and targeted attacks. Additionally, the platform includes heuristics, statistical analysis, emulation and code analysis capabilities in a sandbox. \n\nUsing Trellix Network Security, businesses can receive alerts about critical issues. Pricing is available on request and support is extended via documentation, phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e6f07b8c-b27c-485d-bf2b-b34fe540bac0.png","url":"https://www.softwareadvice.co.uk/software/420321/fireeye-network-security","@type":"ListItem"},{"name":"MailXaminer","position":10,"description":"The first major launch in the field of e-Discovery applications, led by MailXaminer, was a complete forensic email investigation and analysis tool, a complete toolkit for recording, analyzing, checking and reporting email evidence.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/78bef2dc-2d1a-47b2-b7ef-764724580ad2.png","url":"https://www.softwareadvice.co.uk/software/239762/mailxaminer","@type":"ListItem"},{"name":"Detego Digital Forensics","position":11,"description":"Detego Digital Forensics is designed to help intelligence agencies, law enforcement units, and forensic departments analyze and extract data from various online and external storage devices. It allows organizations to capture and store evidence in a centralized repository, generate custom reports and conduct data analysis.\n\nFeatures of Detego Digital Forensics include document management, data synchronization, workflow automation and more. Employees can use the application to streamline data extraction, photo DNA, hash matching and image processing operations. Additionally, the application enables users to analyze and identify relations between people, devices, cases and places.\n\nDetego Digital Forensics lets investigators track documents related to suspects, legal exhibits and historical cases via a unified platform. Pricing is available on request and support is extended via phone, email, documentation and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1a3b0724-38a8-4c25-b416-935bbefcd13f.png","url":"https://www.softwareadvice.co.uk/software/241650/detego-digital-forensics","@type":"ListItem"},{"name":"Harmony Endpoint","position":12,"description":"Harmony Endpoint is a cloud-based and on-premise security and digital forensics solution, which helps small to large businesses ensure protection from malware, ransomware or phishing attack. Features include threat hunting, real-time monitoring, URL filtering, credential theft prevention and password reuse protection. \n\nHarmony Endpoint assists IT professionals with attack detection, investigation and remediation. Using its threat emulation sandbox, engineers can detect and block various files types received as email attachments or web downloads. The application automatically creates forensic reports about attack flow, affected assets and endpoint events. Users can also restore encrypted files using snapshots and restrict malware mutation based on process execution tree similarities. \n\nHarmony Endpoint offers mobile applications for both iOS and Android. Pricing is available on request and support is extended via email, phone and documentation.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f04ab3fe-859b-49dc-82c2-545714ef5f37.png","url":"https://www.softwareadvice.co.uk/software/262306/harmony-endpoint","@type":"ListItem"},{"name":"Barracuda Incident Response","position":13,"description":"Barracuda Forensics and Incident Response is an email security solution that helps businesses identify and respond to email attacks. The platform allows employees to automate operational processes, analyze the nature and scope of the attack and block malicious emails via a unified platform.\n\nBarracuda Forensics and Incident Response enables managers to strategize and execute action plans to eliminate or minimize security damages. It lets organizations proactively identify anomalies based on information collected by analyzing previously delivered emails and threat responses. Additionally, it provides a host of features such as SSL security, reporting, and more.\n\nBarracuda Forensics and Incident Response facilitates integration with various third-party applications such as Avira, Google Cloud Platform, Amazon Web Services, OnTrack, Splunk and more. Pricing is available on request and support is extended via phone, email, documentation and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/aec63e69-c95c-429e-9514-05e0661b33b9.png","url":"https://www.softwareadvice.co.uk/software/241409/barracuda-forensics-and-incident-response","@type":"ListItem"},{"name":"DomainTools","position":14,"description":"DomainTools is a web-based threat intelligence software designed to help businesses assess the risk of domains, investigate online fraud and cybercrimes, manage phishing detection and monitor infringing activity. Key features include online fraud investigation, threat hunting, brand protection and incident response.\n\nSecurity analysts using DomainTools can identify threats, streamline investigations, track information and predict risk levels based on threats associated with various domains. The PhishEye solution enables managers to receive notifications about new domain registrations, view information about each domain and export customer domain/IP blocklists in CSV format. Additionally, using predictive assessment, teams can assess whether to allow, conditionally allow or deny various types of connections and classify and block domains according to the type of risk it represents. \n\nDomainTools enables users to mine historical Whois records to find connections, view current as well as historical infrastructure associated with a domain and track the evolution of threat actor campaigns. The TLS and SSL certificates connect and profile domains, which help assess the risk level or trustworthiness of various domains.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/28b43ee8-7a81-4fd0-bae5-d3cd540404bb.png","url":"https://www.softwareadvice.co.uk/software/262311/domaintools","@type":"ListItem"},{"name":"Aid4Mail","position":15,"description":"Aid4Mail is a fast and accurate email search and conversion application for use in digital\nforensics, eDiscovery, mail migration and archiving. Its proprietary engine quickly processes\nlarge volumes of email data while preserving crucial metadata and content.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/9d3cf55e-12fd-455b-9658-56046518fce1.png","url":"https://www.softwareadvice.co.uk/software/430245/aid4mail-service","@type":"ListItem"},{"name":"Fidelis Elevate","position":16,"description":"Fidelis Elevate, an Open XDR (Extended Detection and Response) platform, enables cyber security by automating defense operations across various network architectures. It extends security controls to the cloud and endpoints and uses threat intelligence, analytics, machine learning, threat hunting, and deception technologies to gain insights into threats impacting environment. This process enables security teams to continually handle defenses and neutralize threats before they cause any damage to business operations. The solution centralizes cybersecurity intelligence for IT, IoT (Internet of Things), data centers, and cloud systems into a unified view, with full visibility and control, ensuring that end users detect post-breach attacks. \n\nFidelis Elevate is the XDR platform that offers Active Directory defense, field contextual traffic analysis, integrated deception technology, active threat detection with MITRE ATT&CK mapping, AI-based sandbox analysis, in-band traffic decryption network DLP and risk-aware terrain mapping. With integrated network, endpoint, and cloud visibility and analysis, it automatically maps cyber terrain and evaluates the risk of every asset and network path.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7cb9365f-59d8-485d-8469-660915078e60.png","url":"https://www.softwareadvice.co.uk/software/307619/fidelis-elevate","@type":"ListItem"},{"name":"Trimble Forensics Capture","position":17,"description":"Trimble Forensics Capture helps investigators map crime scenes and collect data faster with guided workflows. The guide, made up of a series of step-by-step instructions, can be customized by your organization to fit the needs of your crime scene investigation team.\n\nIt helps investigators capture and begin processing crime scene data faster than ever before. With guided workflows, users can create geospatial imagery, photo/video, pathology grids and more with just one click—streamlining end-to-end investigations. Designed for both new and experienced investigators, Trimble Forensics Capture is an efficient solution for collecting evidence from crime scenes.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/89c03a47-298b-4095-95c0-6852e5f67521.png","url":"https://www.softwareadvice.co.uk/software/404970/trimble-forensics-capture","@type":"ListItem"},{"name":"OpenText Forensic","position":18,"description":"EnCase Forensic is a digital forensic solution that can collect and preserve critical desktop/mobile evidence from multiple sources such as text messages, call records, pictures, graphics, and much more. \n\nUsing OCR and image analysis, EnCase Forensic can easily collect data from multiple platforms such as computers, IoT devices, cloud services, social media platforms, and more. Users can automate complex queries across multiple evidence sources using robust workflow automation. Built-in triage reporting options enables law enforcement personnel and attorneys to create comprehensive evidence reports and easily share them with any audience.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b84a4bde-d648-4808-b84d-9ba367fe7386.jpeg","url":"https://www.softwareadvice.co.uk/software/391754/encase-forensic","@type":"ListItem"},{"name":"Lima","position":19,"description":"Lima is a digital forensics solution, which enables regulatory bodies, law enforcement agencies and businesses to manage forensic cases of all types. Professionals can create auditable notes to maintain compliance with quality standards set up International Organization for Standardisation (ISO). \n\nKey features of Lima include evidence tracking, contact management, indexing and case reporting. Administrators can configure access permissions for user accounts, create and log statistical events and access reports in CSV, HTML, TSV and other file formats. Additionally, managers can allocate case tasks to colleagues, track progress and review case timelines and maintain a record of client details including agreements and communications.\n\nLima comes with an application programming interface (API), which helps businesses integrate the platform with various third-party systems. The product is available for free or on perpetual licenses and support is extended via documentation, video tutorials, phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0ea9a980-e621-4df5-9a78-1aa48d09414b.png","url":"https://www.softwareadvice.co.uk/software/241383/lima","@type":"ListItem"},{"name":"Nuix Neo Investigations","position":20,"description":"Nuix Neo Investigations is a software that allows for deep data analysis and real-time collaboration to uncover insights on a large scale. It enables data ingestion from various sources and applies collaborative techniques to connect digital evidence and human behavior. The software is designed to handle complex datasets, making it a scalable solution for growing investigation needs across law enforcement, legal service providers, government agencies, corporate investigators, and data analysts.\n\nThe software features solution packs customzied for different use cases to accelerate investigation timelines. It provides visualization of hidden connections between people and information across vast data sets, and a unified view for real-time collaboration across platforms and teams. Nuix Neo Investigations helps automate investigative tasks and workflows to reduce backlogs and prevent burnout, while its link-analysis and data connections deliver accurate answers.\n\nNuix Neo Investigations utilizes advanced AI to classify and contextualize data, helping users find relevant information faster. It is designed to interpret unstructured data at scale. The solution also features specialized capabilities for CSAM investigations, including automated insights, triage, and in-depth risk assessments, as well as ethical AI and deep-link analysis tools to empower teams in fraud investigations.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c7bd0b50-f12e-4494-8556-17cdbf9f1424.jpeg","url":"https://www.softwareadvice.co.uk/software/526526/Nuix-Neo-Investigations","@type":"ListItem"},{"name":"Strand","position":21,"description":"Strand is an AI-enabled platform that automates the digital forensic and incident response processes. Built for MSPs, IR providers and internal security teams, it offers a coordinated team of AI agents that collect evidence, identify root cause, guide remediation and produce audit ready reports.\n\nIt supports both agentless and lightweight deployments and integrates into existing environments. Fully cloud hosted and privacy focused, it helps teams respond faster and document outcomes. It can be deployed with or without agents and fits into existing environments.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/516c690a-4e86-48a5-9f31-78bce31fbd8e.png","url":"https://www.softwareadvice.co.uk/software/529673/Strand","@type":"ListItem"},{"name":"SafeRestore","position":22,"description":"SafeRestore is an AI-powered data recovery software and cloud suite designed to recover deleted files, photos, messages, and documents from computers, mobile devices, and storage drives. It is suitable for individuals, IT professionals, forensic investigators, and businesses dealing with data loss or needing to retrieve information from failed or corrupted storage systems. The software handles various scenarios, from accidental file deletion to complex forensic investigations.\n\nThe desktop recovery software includes a deep scan engine that performs sector-level raw disk scanning. It uses file carving technology to rebuild files from raw disk sectors for numerous formats and offers RAID reconstruction capabilities for different array types. The platform creates forensic-grade disk images in E01, DD, and RAW formats, providing SHA-256 cryptographic verification for each recovered file. Mobile extraction capabilities allow recovery of deleted content from iOS and Android devices, including SQLite database forensics. The software supports multiple file systems and can decrypt password-protected backups secured with FileVault, BitLocker, and VeraCrypt.\n\nSafeRestore also features a browser-based cloud suite with five professional tools that require no installation. The AI Account Recovery agent offers guidance for recovering locked or compromised accounts on various platforms using official recovery methods. Other cloud tools include a metadata scrubber, a document fraud scanner, an AI storage analyzer, and a plagiarism checker. The desktop software is compatible with macOS, Windows, and Linux, ensuring all processing occurs locally to maintain data privacy.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/19372bad-4309-4efc-80a5-77007c191df9.jpg","url":"https://www.softwareadvice.co.uk/software/538330/SafeRestore","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.uk/directory/4450/digital-forensics/software#itemlist","numberOfItems":22}
</script>
