Cyber incidents leave calling cards, from disk images to file fragments and even remnants of deleted files. All of these provide security leaders with valuable information for proper response and risk mitigation.

Products recognized in this category provide forensic capabilities to assist in analysis of both on network and off network events and data, painting a valuable picture that security teams can use to manage risk and address vulnerabilities.

FINALIST | BEST COMPUTER FORENSIC SOLUTION SOLUTION

BELKASOFT EVIDENCE CENTER X
Company: Belkasoft
Noteworthy: Pioneered so-called artifact extraction, supporting analysis of 1000+ applications and formats for major computer and mobile operating systems as well as a wide variety of acquisition types, including checkm8, jailbreaks, agent-based and other methods.

FINALIST | BEST COMPUTER FORENSIC SOLUTION SOLUTION

E3 UNIVERSAL
Company: Paraben Corporation
Noteworthy: Takes on the diverse sampling of available digital data into a software system designed to give examiners the workflow to maximize the results of data review, also providing the ability to work in modern data segregation with remote collections.

FINALIST | BEST COMPUTER FORENSIC SOLUTION SOLUTION

GARGAMEL
Company: LIFARS
Noteworthy: Acquires forensic evidence from remote Windows or Linux machines using several different methods and in a simple and unified interface, also helping system administrators to easily automate processes without having to modify the system firewall the infrastructure already uses.

FINALIST | BEST COMPUTER FORENSIC SOLUTION SOLUTION

MAGNET AXIOM CYBER
Company: Magnet Forensics
Noteworthy: Updated every four to six weeks with new features, feature enhancements, support for new artifacts and updates to existing artifacts, and bug fixes, ensuring forensic teams have the latest technology to combat the constantly changing threats.

FINALIST | BEST COMPUTER FORENSIC SOLUTION SOLUTION

RECORDTS
Company: TSFactory LLC
Noteworthy: Designed from the ground up for session recording for all environments, with sessions buffered so no data is lost, RECORDTS encrypts data in-transit between modules and webconsoles as well as at rest on disk in storage – perfect for cloud deployments.