Related Products
|
||||||
Platforms Supported
Windows
Mac
Linux
SaaS / Web
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
SaaS / Web
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Security teams and investigators who want an automated forensics software for incident response in order to analyze data and assemble reports
|
Audience |
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
$2,500
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationSleuth Kit Labs
Founded: 2023
United States
www.cybertriage.com
|
Company InformationLogicHub
Founded: 2017
United States
www.logichub.com
|
|||||
Alternatives |
Alternatives |
|||||
|
||||||
|
|
|||||
|
||||||
|
||||||
Categories |
Categories |
|||||
Incident Response Features
Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
Security Orchestration
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management
|
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
IT Security Features
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Incident Management Features
Audit Trail
Corrective Actions (CAPA)
Disaster Recovery
Incident Reporting
IT Incident Management
OSHA Compliance
Root-Cause Diagnosis
Safety Management
Task Management
Ticket Management
Vulnerability Management Features
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
|
|||||
Integrations
Censys
Elastic Security
IBM Cloud
IBM Security QRadar SIEM
IBM Security Randori Recon
IBM Security Verify Access
Joe Sandbox
LOGIQ
Microsoft Defender for Endpoint
SentinelOne Singularity
|
Integrations
Censys
Elastic Security
IBM Cloud
IBM Security QRadar SIEM
IBM Security Randori Recon
IBM Security Verify Access
Joe Sandbox
LOGIQ
Microsoft Defender for Endpoint
SentinelOne Singularity
|
|||||
|
|