Loading...
Browse 25 investigation tools
Platform for threat investigation with automation and knowledge management
Platform for threat investigation with automation and knowledge management
Investigation and case management system for cybersecurity incidents
Investigation and case management system for cybersecurity incidents
Investigation platform for digital forensics and incident analysis
Investigation platform for digital forensics and incident analysis
Deep OSINT investigation tool for threat actor attribution and analysis
Deep OSINT investigation tool for threat actor attribution and analysis
Virtual machine for secure, anonymous dark web investigation via Tor and I2P
Virtual machine for secure, anonymous dark web investigation via Tor and I2P
SOAR platform with automated threat hunting and investigation capabilities
SOAR platform with automated threat hunting and investigation capabilities
Managed service for POI investigations with expert threat assessment teams.
Managed service for POI investigations with expert threat assessment teams.
AI-assisted case management software for investigations and incident response
AI-assisted case management software for investigations and incident response
Whistleblowing and case management software for reporting and investigations
Whistleblowing and case management software for reporting and investigations
Due diligence services with multilingual analysts for investigations
Due diligence services with multilingual analysts for investigations
Data collection tool for eDiscovery, investigations, and forensics
Data collection tool for eDiscovery, investigations, and forensics
Data analysis platform for transforming data into actionable intelligence
Data analysis platform for transforming data into actionable intelligence
eDiscovery workflow automation platform for legal hold to review processes
eDiscovery workflow automation platform for legal hold to review processes
Data processing & analysis platform for eDiscovery, investigations & forensics
Data processing & analysis platform for eDiscovery, investigations & forensics
Digital forensics & investigation platform for analyzing evidence & cases
Digital forensics & investigation platform for analyzing evidence & cases
AI-powered investigation tool for analyzing identity exposures from darknet data
AI-powered investigation tool for analyzing identity exposures from darknet data
Proactive threat hunting platform for detecting and investigating attacks
Proactive threat hunting platform for detecting and investigating attacks
ESI collection & preservation platform for eDiscovery & investigations
ESI collection & preservation platform for eDiscovery & investigations
Enterprise resilience platform for risk, compliance, security & incident mgmt.
Enterprise resilience platform for risk, compliance, security & incident mgmt.
AI-powered investigative analytics platform for eDiscovery, data privacy & fraud
AI-powered investigative analytics platform for eDiscovery, data privacy & fraud
Cloud-based isolated workspace for anonymous digital investigations & research
Cloud-based isolated workspace for anonymous digital investigations & research
Dark web investigation platform with comprehensive database and analysis tools
Dark web investigation platform with comprehensive database and analysis tools
Zui is a desktop application for data exploration and analysis that provides drag-and-drop data ingestion, automatic format detection, and interactive querying capabilities for structured and semi-structured data.
Zui is a desktop application for data exploration and analysis that provides drag-and-drop data ingestion, automatic format detection, and interactive querying capabilities for structured and semi-structured data.
An interactive command line application for Open Source Intelligence collection and artifact management that enables investigation of IP addresses, domains, email addresses, file hashes, and other digital artifacts.
An interactive command line application for Open Source Intelligence collection and artifact management that enables investigation of IP addresses, domains, email addresses, file hashes, and other digital artifacts.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance