AccessData Forensic Toolkit (FTK), from Exterro Reviews
AccessData Forensic Toolkit (FTK), from Exterro

AccessData Forensic Toolkit (FTK), from ExterroCompetitors and Alternatives

We don't have enough ratings and reviews to provide an overall score.

Most Commonly Comparedto AccessData Forensic Toolkit (FTK), from Exterro

Best AccessData Forensic Toolkit (FTK), from Exterro Alternatives for Medium-sized Companies

Splunk Enterprise Security (ES)

Score 8.4 out of 10

Splunk Enterprise Security (SIEM) is the company's flagship SIEM product, offered as a premium service to subscribers of Splunk Cloud or Splunk Enterprise.

Higher Rated Features

  • Security Information and Event Management (SIEM)
  • Centralized event and log data collection
  • Custom dashboards and workspaces

Popular Integrations

There is not enough information to display integrations.

Trellix Endpoint Security ENS

Score 8.5 out of 10

Trellix Endpoint Security (ENS) solutions apply proactive threat intelligence and defenses across the entire attack lifecycle to keep organizations safer and more resilient.

Higher Rated Features

  • Endpoint Security
  • Centralized Management
  • Malware Detection

Popular Integrations

There is not enough information to display integrations.

Best AccessData Forensic Toolkit (FTK), from Exterro Alternatives for Enterprises

Splunk Enterprise Security (ES)

Score 8.4 out of 10

Splunk Enterprise Security (SIEM) is the company's flagship SIEM product, offered as a premium service to subscribers of Splunk Cloud or Splunk Enterprise.

Higher Rated Features

  • Security Information and Event Management (SIEM)
  • Centralized event and log data collection
  • Custom dashboards and workspaces

Popular Integrations

There is not enough information to display integrations.

Trellix Endpoint Security ENS

Score 8.5 out of 10

Trellix Endpoint Security (ENS) solutions apply proactive threat intelligence and defenses across the entire attack lifecycle to keep organizations safer and more resilient.

Higher Rated Features

  • Endpoint Security
  • Centralized Management
  • Malware Detection

Popular Integrations

There is not enough information to display integrations.