Exterro is a data risk management platform that empowers teams to optimize e-discovery, privacy and data governance, digital forensics, and cybersecurity compliance operations. It offers a suite of products including E-Discovery, Digital Forensics, Privacy and Data Governance, and Cybersecurity Compliance, enabling organizations to manage and optimize their data risk management activities. The platform provides a range of features including legal hold, comprehensive interview, in-place preservation, ECA, collection and processing, e-discovery data management, review, employee change monitor, data source discovery, and legal project management. Exterro is used by over 30% of the Fortune 500 companies and is suitable for law enforcement, e-discovery professionals, forensic investigators, IT professionals, privacy and data governance professionals, and cybersecurity compliance professionals.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A library for accessing and parsing Extensible Storage Engine (ESE) Database Files used by Microsoft applications like Windows Search, Exchange, and Active Directory for forensic analysis purposes.
A digital artifact extraction framework for extracting data from volatile memory (RAM) samples, providing visibility into the runtime state of a system.
A library to access and parse Windows XML Event Log (EVTX) format, useful for digital forensics and incident response.
A library for accessing and parsing Windows NT Registry File (REGF) format files, designed for digital forensics and registry analysis applications.
A PowerShell-based incident response and live forensic data acquisition tool for Windows hosts.
Free software for extracting Microsoft cabinet files, supporting all features and formats of Microsoft cabinet files and Windows CE installation files.
A library for read-only access to QEMU Copy-On-Write (QCOW) image files, supporting multiple versions and compression formats for digital forensics analysis.
A command-line tool for creating hex dumps, converting between binary and human-readable representations, and patching binary files.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.