Alternatives to Amped Authenticate

Compare Amped Authenticate alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Amped Authenticate in 2024. Compare features, ratings, user reviews, pricing, and more from Amped Authenticate competitors and alternatives in order to make an informed decision for your business.

  • 1
    Storyzy

    Storyzy

    Storyzy

    Automated, AI-based research tools allow for easier, faster, and more effective open-source research. Thousands of categorized sources—websites, blogs, video channels, social networks, are automatically indexed and archived, and continually added to Storyzy’s platform database. This allows users to add on to it and customize their own source lists. All in 42 languages. Granular investigations are made possible, allowing the identification of clues, markers, and hard evidence of information manipulation, on websites, blogs, social media documents, but also in images and visuals. For over ten years now, Storyzy’s teams have been designing and developing tools to fight online information manipulation. Artificial and human intelligence combined are the indispensable ingredients that made it possible to build the Storyzy platform with its actual users.
  • 2
    Graphika

    Graphika

    Graphika

    Graphika leverages the power of artificial intelligence to create the world’s most detailed maps of social media landscapes. We pioneer new analytical methods and tools to help our partners navigate complex online networks. Using our unique, patented set of technologies and tools, our intelligence team creates and applies new, rigorous analytical methods to answer difficult questions about online conversations. Graphika’s analysis and investigations team is a world leader in the detection and study of harmful online networks. Through our work with industry partners, academic institutions, government bodies, and non-profit organizations, we regularly deliver public-facing reports on topics ranging from state-backed influence operations, to violent conspiracy networks, and targeted harassment campaigns.
  • 3
    Logically Intelligence
    Logically Intelligence uses artificial intelligence to identify and tackle harmful and manipulative content at speed and at scale. Our platform ingests content and data from social platforms, online media source and websites. As a result, Logically Intelligence provides analysts with the insights needed to detect, assess, and act on emerging threats. Monitor and analyze a specific information environment by creating a Situation Room using a simple keyword-based interface or advanced boolean queries. Identify and analyze narratives emerging in a specific Situation Room, including keywords driving the narrative, associated posts, and original poster data. Also, you can compare two narratives over time and measure the impact of counter-narratives. Boolean queries or keywords can be added in any language and the platform will display and translate data from all languages.
  • 4
    Alethea Artemis
    Leveraging the power of advanced analytics and machine learning, Artemis conducts multi-channel analysis across a broad array of online content, including forums, social media and other resources to proactively identify and investigate disinformation online. Artemis delivers unrivaled intelligence on disinformation networks. Its real-time insights allow our customers time to protect key assets from risk and potential damage due to disinformation, misinformation, and social media manipulation.
  • 5
    Truepic

    Truepic

    Truepic

    All digital content has a history. Real or synthetic, original or edited, details matter. Be informed with Truepic’s technology that empowers transparency and shared trust in content across the internet. Truepic’s glass-to-glass technology records where and how content is created and edited, and displays those details to you wherever you are. Named one of TIME’s Best Inventions, Truepic’s secure camera technology captures, signs, and seals critical details in every photo or video, such as date, time, location, and the true pixels captured. Increase transparency at scale about how, where, when, and by whom content is created in your products.
  • 6
    NewsGuard

    NewsGuard

    NewsGuard

    Leveraging its bird’s eye view of the digital information environment, NewsGuard extracts and catalogs the top misinformation narratives spreading online. NewsGuard provides data about each narrative in machine-readable format—such as example language, links containing the false claim, and related keywords and hashtags. The Misinformation Fingerprints can be used as data seeds for existing AI/Social Listening tools to trace false claims across the internet and social media or can be used by human analysts to understand mis- and disinformation risks. Purpose-built for use by both human analysts and AI tools, NewsGuard’s Misinformation Fingerprints™ provides a continuously updated view of the digital information environment—and a powerful way to track narratives that are emerging and spreading online.
  • 7
    Deepware

    Deepware

    Deepware

    Deepfakes are going to be the first real punch from AI to humanity. The cybersecurity industry has a very short time to get ahead of deepfakes before they undermine the public’s trust in reality. Cybersecurity faces an emerging threat generally known as deepfakes. Malicious uses of AI-generated synthetic media, the most powerful cyber-weapon in history is just around the corner. We expect destructive use of deepfakes, particularly as phishing attacks, to materialize very soon. The main limitation is the lack of legitimate voice-swapping techniques, which is a much greater danger than face/head-swapping.
  • 8
    ValidSoft

    ValidSoft

    ValidSoft

    Pretty much anything we do online now requires passwords and security questions. It’s a part of life, really. Keeping track of all this information is frustrating. All of it is meant to protect us, ensuring we are the only ones who can access our accounts and data. Granted we are always hearing news of breaches that circumvent our passwords, but we want fast, easy-to-use login authentication that delivers a better end-user experience and saves on operational costs. We believe voice is the leading authentication factor that will improve your lives. You deliver a simple, quick, secure, password-free login experience for your customers. You significantly reduce password management costs. You achieve compliance with biometric privacy laws. A real-time comparison of an individual’s voice to their unique voiceprint validates the claimed identity. Make sure people are who they say they are. Use one model across many channels for true omnichannel excellence.
  • 9
    Maltego

    Maltego

    Maltego Technologies

    Maltego is a Java application that runs on Windows, Mac and Linux. Maltego is used by a broad range of users, ranging from security professionals to forensic investigators, investigative journalists, and researchers. Easily gather information from dispersed data sources. View up to 1 million entities on a graph​. Access over 58 data sources in the Maltego transform hub. Connect public (OSINT), commercial and own data sources. Write your own Transforms. Automatically link and combine all information in one graph. Automatically combine disparate data sources in point-and-click logic​. Use our regex algorithms to auto-detect entity types. Enrich your data through our intuitive graphical user interface​. Use entity weights to detect patterns even in the largest graphs. Annotate your graph and export it for further use.
    Starting Price: €5000 per user per year
  • 10
    Sensity

    Sensity

    Sensity

    We help your international expansion with our all-in-one solution to classify and analyze ID Documents. Stop frauds with a multilayer AI-Powered forensic suite. Get detailed reports about the type of forgery with our analytics dashboard. Onboard-only users who present faces coherent with the face on the ID document previously presented. Our solution can be used to find and match a face in a million faces database with 99.2% accuracy. With our passive liveness detection, your clients don't need to perform any action in front of the camera. We leverage four different types of approaches able to analyze the document from a completely different perspective in order to put in condition your fraud team to spot a wide range of document fraud. Speed-up the document review from hours to seconds and get actionable insights to evaluate the risk rate of your new clients. Keep anything monitored through a simple and intuitive dashboard.
  • 11
    Originality.AI

    Originality.AI

    Originality.AI

    Your needs, as a serious web publisher, for a plagiarism checking and AI detection tool are unique. Yet, all the existing plagiarism checking tools are built with Academia in mind. Originality.AI is built by a team of content marketing and GPT-4 AI experts that deeply understands your needs and includes features like Team Management (no more sharing your login), Auto-Billing, Scan History by User and most importantly an AI Writing Detection tool. You can now have all your content scanned with a record of who scanned it, when it was scanned, if AI is suspected and if any plagiarism was found all saved for reference later. You will no longer need to rely on their promise that it is plagiarism free, original content or waste time scanning it yourself. With the team management function and activity history it puts you or your editor in firm control of your plagiarism checking.
    Leader badge
    Starting Price: $0.01 per 100 words
  • 12
    Intrinsic

    Intrinsic

    Decoy Technologies

    Craft your own policies beyond standard abuse categories and enforce them in just minutes. Intrinsic is a platform for building AI agents for user trust. We hook directly into your existing workflows, and gradually help enhance human review with automation safely and seamlessly. Automate moderation of text, images, videos and reports with a system that gets better with every moderation action. Manage review queues and escalations easily with fine-grained RBAC permissions. Make data-driven decisions based on policy performance reports and platform-wide health monitoring. Access advanced security, AI-powered analytics, and comprehensive information governance.
  • 13
    ZeroFox

    ZeroFox

    ZeroFox

    Organizations invest immense resources into social media and their digital presence, which has become the primary engagement method for many individuals and businesses. As social media becomes the preferred engagement tool, security teams must understand and address the risks posed by digital platforms, the largest unsecured IT network on earth. Explore the ZeroFox Platform - watch this 2 minute overview video. With a global data collection engine, artificial intelligence-based analysis, and automated remediation, the ZeroFox Platform protects you from cyber, brand and physical threats on social media & digital platforms. Understand your organization’s digital risk exposure across a broad range of platforms where you engage and cyberattacks occur. ZeroFox's mobile app provides the powerful protection of the ZeroFox platform at your fingertips, wherever and whenever you need it.
  • 14
    TrustLab

    TrustLab

    TrustLab

    TrustLab provides out-of-the box future-proof regulatory compliance powered by AI & leading industry experts. Ensure your platform is compliant with: EU Digital Services Act (DSA) UK Online Safety Act Australian Online Safety Act Plug-and-play user complaints covering current and future regulatory requirements such as the Digital Services Act. Compliance with regulatory requirements including transparency reports, messaging, statement of reasons, appeals, and more. Liability protection for fines from user content moderation. Monitor & measure platform moderation performance with certainty. Leverage TrustGraph's AI capabilities and industry benchmark to quantify risk in real time. Detect and enforce on networks of bad actors promoting harmful content.
  • 15
    OARO Media
    Technological advances in artificial intelligence have made realistic tampered with photos and videos mainstream in the form of deep fakes. OARO Media creates an immutable data trail that allows businesses, governing bodies, and even individual users to authenticate any photo or video. It is the only mobile app that generates reliable photos and videos embedded with records of user identity, content, timestamp, and GPS coordinates. Efficient claims management and improving the customer experience is a high priority for insurers. Historically the process of authenticating insurance claims has been arduous and involved high staff costs. Adjusters needed to visit sites in person to verify the damage claimed and customers could not easily review the adjuster’s records.
  • 16
    LiarLiar

    LiarLiar

    LiarLiar

    Supports all of your favorite tools and platforms. LiarLiar employs cutting-edge AI to analyze micro movements, heart rate, and subtle cues in body language to detect deception. Our tool gives you unprecedented insight into the truth during video calls or video analysis. Designed with a user-friendly interface, LiarLiar can be easily set up and operated. Even those with minimal tech experience can become experts in detecting lies with a simple click. Compatible with popular video call software like Zoom, Google Meet, Skype, and more, LiarLiar can be used on any video feed, including YouTube or your own local videos. Analyze any conversation, any time. For a limited time, we're offering lifetime access to our beta version. Be among the first to experience the power of LiarLiar and continue to receive updates at an unbeatable price. Use our simple installer to set up LiarLiar on your Windows or Mac device.
    Starting Price: $29.99 one-time payment
  • 17
    Cognitech FiA 64
    FiA is a comprehensive software with analysis tools designed for forensic analysis and authentication of digital images. This extensive toolkit will allow the user to investigate the evidence and detect possible traces of tampering or other types of inconsistencies. FiA is used to systematically detect forged/doctored file based digital image evidence is able to authenticate and uncover where tampering and modification has taken place in a doctored image. This solution allows the expert to prepare everything needed for official court ready reports and all results are based on a forensic scientific methodology. FiA is a proven solution based on years of research. More research is being conducted to further extend software authentication capabilities to video authentication. FiA was developed for Law Enforcement Agencies only. In addition it is not effective to purchase this technology without the associated comprehensive training course.
  • 18
    Axon Investigate
    Improper playback software can alter video evidence and impede investigations. Axon Investigate allows you to review footage from more third-party proprietary video formats than any other solution on the market and provides immediate access to original metadata including date, time, image numbers, etc. More than 80% of investigations involve video evidence. Axon Investigate dramatically improves the video investigation process, saving officers up to 10 hours per week by providing simple, fast and repeatable workflows. Manage and organize hundreds of video sources into one project, track activity, tag relevant events, extract available video and create court-ready deliverables in standard, lossless formats. Axon Investigate is built by a team of certified, forensic video analysts and ensures that investigators view original video evidence and share accurate copies ready for court.
  • 19
    Medex Forensics

    Medex Forensics

    Medex Forensics

    Unlike any other software, Medex reveals information that is not present in the metadata of a digital video file. With this additional intelligence, investigators are answering new questions about video and identifying additional crimes and perpetrators in previously impossible ways. Medex Forensics provides examiners the newest automated tools for digital video authentication, source detection, and provenance analysis. Medex’s patented approach to examining digital video provides investigators and prosecutors new insight into digital video. Identify a video’s provenance, including origination camera make/model and any editing software or platform. Triage videos from mobile device extractions and expedite actionable intelligence.
  • 20
    ActiveFence

    ActiveFence

    ActiveFence

    ActiveFence is the leading Trust and Safety provider for online platforms, protecting over three billion users from malicious behavior and content daily. Trust and Safety teams of all sizes rely on ActiveFence to keep their users safe from the widest spectrum of online harms, including child abuse, disinformation, hate speech, terror, fraud, and more. We offer a full stack of capabilities with our deep intelligence research, AI-driven harmful content detection and moderation platform. ActiveFence protects platforms globally, in over 100 languages, letting people interact and thrive safely online.
  • 21
    Ad Observer

    Ad Observer

    Ad Observer

    Who is paying for online advertising to target you? Who’s showing you ads because you’re married, or you’re a liberal, or work in the oil industry or some other category? Are they saying different things to different people? Help hold them accountable by installing our browser plugin, which sends us the ads you see on Facebook and YouTube, without compromising your privacy. Ad Observer is a tool you add to your Web browser. It copies the ads you see on Facebook and YouTube, so anyone can see them in our public database. If you want, you can enter basic demographic information about yourself in the tool to help improve our understanding of why advertisers targeted you. However, we’ll never ask for information that could identify you.
  • 22
    Bot Sentinel

    Bot Sentinel

    Bot Sentinel

    We designed Bot Sentinel to be simple to use and as informative as possible. We publicly display detailed information about Twitter accounts the platform is tracking to give visitors of this website a better understanding of how nefarious accounts spread disinformation and target other accounts. We try to be as transparent as possible and give visitors as many data points as possible. Bot Sentinel is a non-partisan platform; we track all accounts. The platform uses machine learning and artificial intelligence to classify Twitter accounts and add the accounts to a publicly available database that anyone can browse. We trained Bot Sentinel to classify Twitter accounts using thousands of accounts and millions of tweets for our machine-learning model. The system can correctly classify accounts with an accuracy of 95%. Unlike other machine learning tools designed to detect “bots,” we are focusing on specific behaviors and activities deemed inappropriate by Twitter rules.
  • 23
    Buster.Ai

    Buster.Ai

    Buster.Ai

    The multiplication of fake news makes the use of an information verification algorithm indispensable. Making decisions based on false information is a huge risk for your business. Be sure of your information before you make your decisions. Our AI analyzes any statement at speed and scale, 24/7, to protect organizations from misinformation. Use data analysis on social networks to identify harmful, toxic, divisive, and false content and prevent its impact on organizations. Businesses rely on information to make important decisions, our solution reduces the risk, of checking the information and identifying fake one. Enter your assertion into natural language and get your relevant insight. Identify misinformation about your organization on social networks. Identify the actors that are detrimental to your investments.
  • 24
    Cyabra

    Cyabra

    Cyabra

    Cyabra uncovers threats to companies, products, people, and places on social platforms, by exposing and reporting malicious actors, disinformation, and bot networks. Integrating seamlessly into your systems, Cyabra’s breadth of OSINT coverage is unparalleled and includes Facebook, TikTok, Twitter, news sites, the cybercrime underground, and more. Cyabra also provides actionable insights, real-time alerts and advanced mitigation. Safeguard local and national elections from foreign and domestic influence. Stop bad actors using social engineering tactics from impacting public discourse. Uncover arising protests and key leaders fuelling online rage and hate.
  • 25
    Google Fact Check Explorer
    The Fact Check Tools consist of two tools: Fact Check Explorer and Fact Check Markup Tool. Both tools aim to facilitate the work of fact-checkers, journalists, and researchers. Google does not endorse or create any of these fact-checks. If you disagree with one, please contact the website owner that published it.
  • 26
    Factiverse

    Factiverse

    Factiverse

    Check information in seconds and find credible sources for any content, whether you are writing yourself or verifying AI-generated content. Focus on your writing, and save hours of manual research. Elevate your fact-checking by using the most comprehensive collection of manual fact-checks since 1991. Get hourly updates from certified fact-checkers globally in your feed. Always stay on top of false narratives. Maintain focus during research, writing, or analysis by hovering over complex terms and industry-specific jargon and getting embedded explanations. Boost reader engagement and prevent the audience from leaving your page.
  • 27
    Fakespot

    Fakespot

    Fakespot

    Fakespot protects you from getting ripped off when shopping online. Join the secure shopping revolution and get the the truth about products, reviews, and sellers before you buy. Fakespot has your back when you’re shopping online at home or on mobile. Fakespot’s new browser app allows you to browse the open-web and when you land on sites that we support you will have Fakespot's features enabled to help you make informed purchase decisions. Share via other shopping apps and browsers, Share to analyze functionality is still included for users coming from our previous app. Since Fakespot’s inception, we have analyzed over 9 billion product and seller reviews. Our analysis helps you make informed decisions so you love everything you buy and never return anything. Fakespot also stays one step ahead of emerging threats by always updating our algorithms to protect you as you shop. Fakespot is safe, secure shopping that saves time, money, and headaches.
  • 28
    Reality Defender

    Reality Defender

    Reality Defender

    Reality Defender provides best-in-class detection against advanced threats posed by deepfakes and AI-generated disinformation. Our industry-leading solutions for enterprises, government, and institutional clients help protect against everything from advanced voice fraud in call centers to media verification in newsrooms. With repeated successes in combating financial fraud and defending governments, our clients trust Reality Defender to help detect deepfake-driven threats.
  • 29
    Public Editor

    Public Editor

    Public Editor

    We’re an online community of critical thinkers vetting the most-shared news articles on the Internet. We train ourselves – across nine separate assessment tasks – to label misinformation in the news. Our browser extensions show everyone which ideas are mistaken or misleading. And if we haven’t reviewed a news article yet, you can send it our way. We need your help to ensure we can continue identifying misinformation & building trust in a shared reality.
  • 30
    WeVerify

    WeVerify

    WeVerify

    Online disinformation and fake media content have emerged as a serious threat to democracy, economy and society. Content verification at scale and in near real-time is currently far from trivial, even for experienced journalists, fact-checkers, human rights activists or media literacy scholars. The WeVerify project aims to develop intelligent human-in-the-loop content verification and disinformation analysis methods and tools. Social media and web content will be analyzed and contextualized within the broader online ecosystem, in order to expose fabricated content, through cross-modal content verification, social network analysis, micro-targeted debunking, and a blockchain-based public database of known fakes.
  • 31
    Utopia AI Moderator
    Automation with Utopia AI Moderator increases quality, improves publishing speed and reduces costs. Utopia AI Moderator is a fully automated moderation tool that protects your online community and your brand from abusive user-generated content, fraud, cyberbullies and spam. It learns from the publishing decisions your human moderators made previously, works in real time, with a higher degree of accuracy when compared to humans. Utopia AI Moderator understands the context, works in any language, and is especially good in informal language, slang or dialect. Our tool increases the quality of published content. It removes publishing delays and provides reliable, consistent curation around the clock, allowing human moderators to focus on moderation policy management and only the most difficult cases. Utopia AI Moderator is ready for production use in only two weeks, and it moderates 100% of your incoming content. It stays up-to-date by learning as it works.
  • 32
    Amped FIVE

    Amped FIVE

    Amped Software

    Amped FIVE is the most complete image and video forensics software, acclaimed for its reliability and workflow efficiency. Amped FIVE was designed to answer the need to provide solid, scientific-based forensic image and video enhancement for worldwide legal systems. Image and video analysts worldwide have contributed to the development of the software used today, ensuring all aspects of the investigation process can be completed within a single application. Developed specifically for forensics, public safety, and national security, this all-in-one solution has more than 140 filters and tools, to convert, process, enhance, analyze, present, and document images and videos. It supports any type of image and video data retrieved from various multimedia sources (including audio streams) from CCTV and DVR systems, body-worn cameras, dash cameras, drones, mobile phones, fingerprints, documents, and much more.
  • 33
    Forensic Email Collector
    Expertly preserve email evidence without breaking a sweat. Get plug & play output for digital forensic investigations and eDiscovery. We all run into cases where collecting a mailbox as a whole is not an option, often due to privacy or timeframe concerns. On the other hand, eDiscovery and digital forensics workflows often involve a full collection, followed by post-acquisition searches. Forensic Email Collector solves this problem in a creative way. You can perform instant in-place searches on mailboxes on the server before the acquisition and forensically preserve only the search results. No need to create labels, tag documents, or make any changes to the target mailbox. Files attached to emails as hyperlinks to a cloud storage system can throw a monkey wrench into your forensic preservation. The linked attachments often require authentication and are inaccessible unless handled as part of the initial acquisition.
    Starting Price: $499 one-time payment
  • 34
    ADF Cloud Platform

    ADF Cloud Platform

    ADF Solutions

    ADF Solutions is the leading provider of digital forensic and media exploitation tools. These tools are used for processing and analyzing Android/iOS smartphones, mobile devices, computers, external drives, drive images, and other media storage (USB flash drives, memory cards, etc.) ADF triage software is all about speed, scalability, ease-of-use, and relevant results. The tools have a proven track record in reducing forensic backlogs, streamlining digital investigations and rapid access to digital evidence and intelligence. Our customers include federal, state and local law enforcement agencies, military and defense agencies, Office of Inspector General offices, Attorneys General, prosecutors, and other investigative professionals worldwide.
  • 35
    Belkasoft Remote Acquisition
    Belkasoft Remote Acquisition (Belkasoft R) is a new digital forensic and incident response tool developed specifically for remote extraction of hard and removable drives, RAM, connected mobile devices, and even specific types of data. Belkasoft R will be useful in cases when an incident response analyst or a digital forensic investigator needs to gather evidence quickly and the devices in question are situated in geographically distributed locations. With Belkasoft R, there is no longer need to interrupt an employees' daily routine or draw excessive attention to your investigation. Belkasoft R saves your time and money doing a forensically sound remote acquisitions: no more excessive costs and extra time for travels. No more geographical challenges and expensive trips. No need in having trained specialists in all locations of your organization’s offices.
  • 36
    EnCase Forensic
    The Gold Standard in Forensic Investigations – including Mobile Acquisition. Improve investigation efficiency with the release of optical character recognition (OCR) support that seamlessly extracts embedded text from scanned images, documents and PDFs as part of the evidence collection workflow. 21.2 also expands social media artifact support and includes an enhanced workflow with a new summary view that allows users to cross-reference disparate artifact types, significantly improving evidence processing workflows. OpenText Security (formerly Guidance Software) created the category for digital investigation software with EnCase Forensic in 1998. EnCase has maintained its reputation as the gold standard in criminal investigations and was named the Best Computer Forensic Solution for eight consecutive years by SC Magazine. No other solution offers the same level of functionality, flexibility, and has the track record of court-acceptance as EnCase Forensic.
  • 37
    Belkasoft Triage
    Belkasoft Triage is a new digital forensic and incident response tool developed specifically for a quick analysis of a live computer and making a partial image of important data. Belkasoft T is designed to assist in situations when an investigator or a first responder is at the scene of incident and needs to quickly identify and obtain specific digital evidence stored on a Windows machine. The product is irreplaceable in situations of time pressure, when there is a need to quickly detect presence of specific data and obtain investigative leads instead of conducting an in-depth analysis of all the digital evidence.
  • 38
    Virtual Forensic Computing
    We are the creators of Virtual Forensic Computing (VFC). This world-renowned software enables Digital Forensic Investigators to view a suspect’s machine in its native environment without turning the original device on, therefore preserving crucial metadata. Widely used by various law enforcement agencies all over the world, VFC is ‘an essential tool’ in every Computer Forensic Investigator’s toolbox. Founded in 2003 by a former Head of the Digital Forensics Unit of the National Crime Squad, MD5 LTD is a UK leading provider of Digital forensics & eDiscovery services. Our digital investigation services are widely used by various organizations including corporate businesses, law enforcement, and government agencies, the legal sector, forensic accountants, and insolvency practitioners. MD5’s forensic laboratory continues to investigate the business world’s ever-changing digital environment.
    Starting Price: $1000 per year
  • 39
    Binalyze AIR
    Binalyze AIR is a market-leading Digital Forensics and Incident Response platform that allows enterprise and MSSP security operations teams to collect full forensic evidence at speed and scale. Our incident response investigation capabilities such as triage, timeline and remote shell help to close down DFIR investigations in record time.
  • 40
    Animetrics

    Animetrics

    Animetrics

    Advanced investigative facial recognition solution for law enforcement and forensic investigators. Convert 2D images into 3D avatars for facial feature superimposition. FaceR Identity Management Solution, a centralized storage and management system for advanced 3D facial recognition powered by Animetrics' FaceR technology. Law enforcement officials, forensic investigators and security personnel have a pressing need to resolve suspects' identities from any kind of photographic evidence that captures an image of a suspects face including video surveillance cameras. ForensicaGPS, the new biometric solution from Animetrics, allows officers to identify individuals from low-resolution photos or video. ForensicaGPS features advanced facial recognition technology designed to increase the speed and enhance the accuracy of criminal investigations. The key to ForensicaGPS' accuracy is the software's ability to convert two-dimensional facial images into three-dimensional avatars.
  • 41
    Velociraptor

    Velociraptor

    Velociraptor

    At the press of a (few) buttons, perform targeted collection of digital forensic evidence simultaneously across your endpoints, with speed and precision. Continuously collect endpoint events such as event logs, file modifications and process execution. Centrally store events indefinitely for historical review and analysis. Actively search for suspicious activities using our library of forensic artifacts, then customize to your specific threat-hunting needs. It was developed by Digital Forensic and Incident Response (DFIR) professionals who needed a powerful and efficient way to hunt for specific artifacts and monitor activities across fleets of endpoints. Velociraptor provides you with the ability to more effectively respond to a wide range of digital forensic and cyber incident response investigations and data breaches.
  • 42
    The Respond Analyst
    Accelerate investigations and improve analyst productivity with a XDR Cybersecurity Solution. The Respond Analyst™, an XDR Engine, automates the discovery of security incidents by turning resource-intensive monitoring and initial analysis into thorough and consistent investigations. Unlike other XDR solutions, the Respond Analyst connects disparate evidence using probabilistic mathematics and integrated reasoning to determine the likelihood that events are malicious and actionable. The Respond Analyst augments security operations teams by significantly reducing the need to chase false positives resulting in more time for threat hunting. The Respond Analyst allows you to choose best-of-breed controls to modernize your sensor grid. The Respond Analyst integrates with the leading security vendor offerings across important categories such as EDR, IPS, Web Filtering, EPP, Vulnerability Scanning, Authentication, and more.
  • 43
    AssureID

    AssureID

    Acuant

    Real Time Multi-Factor Identity Verification Software AssureID offers fast multi-factor authentication to improve customer experiences, increase conversion rates and mitigate fraud. Patented technology authenticates IDs by applying 50+ forensic and biometric tests, in seconds, utilizing the industry's largest document library. Acuant's library is powered by human-assisted machine learning for the highest accuracy. AssureID eliminates manual errors, speeds up the document inspection process, and significantly reduces employee training. Solutions integrate easily into any environment in any industry and read IDs from over 196 countries and all 50 US states. Accurate data population with 50+ forensic tests run in seconds in the same seamless process. Three classes of facial match & liveness tests including NIST algorithm, intuitive & fast. World-class patented image capture that automatically crops & detects document type & region.
  • 44
    Mideo CaseWorks

    Mideo CaseWorks

    Mideo Systems

    CaseWorks for the Lab is a DEMS application configured for the management and visual documentation of case evidence within the forensic lab. Agencies often have more sophisticated image management requirements than a LIMS provides, especially for comparative science applications (latent prints, firearms/tool marks, questioned documents). This includes detailed auditing for all image-related records, including enhancement, access, and output. Caseworks for the Lab unifies all departments under one imaging platform while still having the ability to share information with LIMS The configuration of our solution is designed to evolve the documentation and comparison of case evidence from a highly paper-based process to nearly paperless. Starting with the documentation of incoming evidence to the final case notes for submission to LIMS.
  • 45
    Forevid

    Forevid

    Forevid

    Forevid video analyzer offers options to record screens during forensic analysis of video files. Monitor the complete activity in file format to prevent any alteration of digital evidence during collection and examination. Also, change the “frame rate” of the recording and save it in .avi format. The bookmark option to add information to a specific frame of the input video file for editing resulted in a faster and more efficient investigation. With Forevid forensic video analyzer bookmark the frame as a PDF or copy it to the clipboard to edit with an image editor. Video encoding option to convert video into a compatible format for other video player devices. Select the encoding setting to change the quality of the video while converting it into lossless MP4, MKV FLV, and SFX player (exe) file format.
  • 46
    Mitek Mobile Verify
    Even as identity fraud escalates in today’s digital world, you can create certainty with Mitek’s Mobile Verify®. It combines linked and layered automated technologies with the world’s top forensic experts to accurately verify your customers and detect identity fraud quickly, increasing approval rates as well as security. Mobile Verify® is also built to be flexible. It can integrate easily with your existing systems and delivering an intuitive and easy customer experience. Mobile Verify® makes life simple for everyone but fraudsters. By integrating it with your current tech stack, you’ll onboard customers that matter more seamlessly, boost their brand confidence and loyalty. All this while reducing the costs associated with typical friction points and attacks. Ensure the user captures a high-quality image with the first attempt. Confirm the identity document is unaltered and genuine. Establish a trusted real-world identity profile by connecting the user to the identity document.
  • 47
    WebPreserver

    WebPreserver

    WebPreserver

    See it, capture it. Instantly preserve web pages and social media profiles using our Chrome plug-in. Captured content is immediately preserved as forensically-defensible evidence, right on your computer. Save time and expand your collections. WebPreserver’s expands long collapsed posts, comment threads, and replies, ensuring hidden content is captured without you having to manually expand these sections. Generate defensible evidence in seconds. Easily export collected evidence in OCR PDF, MHTML, or WARC. The OCR PDF and MHTML file formats provide the full context of content and are completely searchable. Modern life is digital. As online interactions increase, so does the need for website and social media evidence collections. Manually capturing web page or social media evidence is unreliable and time-consuming. Authenticating social media evidence can be a challenge without the right tools at your disposal.
  • 48
    Forcepoint Insider Threat
    Collect behavioral data from channels such as the web, file operations, keyboards, and email. Explore meaningful data using a powerful dashboard built for analysts, by analysts. Gain Insight with powerful analytics to understand and rapidly respond to risky behaviors before harmful events occur. Video collection and playback help expedite the investigation, allowing for attribution as intent and is admissible in a court of law. Monitor a broad set of data sources and activities to uncover patterns of insider risk rather than individual events. Leverage detailed forensics to quickly understand the intent and exonerate employees of wrongdoing. Always-on, highly customizable monitoring, and enforcement allow prioritization of the riskiest users to prevent breaches before they occur. Prevent overreach with the ability to control, watch, and audit investigators. Eliminate biases with anonymized data for investigation integrity.
  • 49
    Falcon Forensics

    Falcon Forensics

    CrowdStrike

    Falcon Forensics offers comprehensive data collection while performing triage analysis during an investigation. Forensic security often entails lengthy searches with numerous tools. Simplify your collection and analysis to one solution to speed triage. Incident responders can respond faster to investigations, conduct compromise assessments along with threat hunting and monitoring with Falcon Forensics. Pre-built dashboards, easy search, and view data capabilities empower analysts to search vast amounts of data, including historical artifacts, quickly. Falcon Forensics automates data collection and provides detailed information around an incident. Responders can tap into full threat context without lengthy queries or full disk image collections. Provides incident responders a single solution to analyze large quantities of data both historically and in real-time to uncover vital information to triage an incident.
  • 50
    ProDiscover

    ProDiscover

    ProDiscover

    ProDiscover forensics suite addresses a wide range of cybercrime scenarios encountered by law enforcement and corporate internal security investigators. ProDiscover is widely used in Computer Forensics and Incident Response. The product suite is also equipped with diagnostic and evidence collection tools for corporate policy compliance investigations and electronic discovery. ProDiscover helps in efficiently uncovering files and data of interest. Wizards, dashboards and timeline views help in speedily discovering vital information. Investigators are provided with a wide range of tools and integrated viewers to explore the evidence disks and extract artifacts relevant to the investigation. ProDiscover combines speed and accuracy, with ease of use and is available at an affordable price. Launched in 2001, ProDiscover has a rich history. It was one of the first products to support remote forensic capabilities.