Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Claimed
Claimed

Cellebrite Features

What are the features of Cellebrite?

Analysis

  • File Analysis
  • Memory Analysis
  • Email Analysis
  • Linux Analysis

Functionality

  • Decryption

Top Rated Cellebrite Alternatives

Cellebrite Categories on G2

Filter for Features

Analysis

File Analysis

As reported in 11 Cellebrite reviews. Identifies potentially malicious files and applications for threats files and applications for abnormalities and threats.
88%
(Based on 11 reviews)

Memory Analysis

Analyzes infortmation from a computer or other endpoint's memory dump for information removed from hard drive. 11 reviewers of Cellebrite have provided feedback on this feature.
88%
(Based on 11 reviews)

Registry Analysis

Identifies recently accessed files and applications for abnormalities and threats.

Not enough data

Email Analysis

Based on 10 Cellebrite reviews. Parses and/or extracts emails and associated content for malware, phishing, other data that can be used in investigations.
77%
(Based on 10 reviews)

Linux Analysis

As reported in 10 Cellebrite reviews. Allows for parsing and/or extraction of artifacts native to Linux OS including but not limited to system logs, SSH activity, and user accounts.
62%
(Based on 10 reviews)

Functionality

Incident Alerts

Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.

Not enough data

Anomaly Detection

Constantly monitors activity related to user behavior and compares activity to benchmarked patterns.

Not enough data

Continuous Analysis

Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering.

Not enough data

Decryption

Based on 10 Cellebrite reviews. Facilitates the decryption of files and data stored using cryptographic algorithms.
80%
(Based on 10 reviews)

Remediation

Incident Reports

Produces reports detailing trends and vulnerabilities related to their network and infrastructure.

Not enough data

Remediation Suggestions

Provides relevant and helpful suggestions for vulnerability remediation upon detection.

Not enough data

Response Automation

Reduces time spent remedying issues manually. Resolves common network security incidents quickly.

Not enough data