Cellebrite Features
What are the features of Cellebrite?
Analysis
- File Analysis
- Memory Analysis
- Email Analysis
- Linux Analysis
Functionality
- Decryption
Top Rated Cellebrite Alternatives
(20)
4.6 out of 5
Visit Website
Sponsored
Cellebrite Categories on G2
Filter for Features
Analysis
File Analysis | As reported in 11 Cellebrite reviews. Identifies potentially malicious files and applications for threats files and applications for abnormalities and threats. | 88% (Based on 11 reviews) | |
Memory Analysis | Analyzes infortmation from a computer or other endpoint's memory dump for information removed from hard drive. 11 reviewers of Cellebrite have provided feedback on this feature. | 88% (Based on 11 reviews) | |
Registry Analysis | Identifies recently accessed files and applications for abnormalities and threats. | Not enough data | |
Email Analysis | Based on 10 Cellebrite reviews. Parses and/or extracts emails and associated content for malware, phishing, other data that can be used in investigations. | 77% (Based on 10 reviews) | |
Linux Analysis | As reported in 10 Cellebrite reviews. Allows for parsing and/or extraction of artifacts native to Linux OS including but not limited to system logs, SSH activity, and user accounts. | 62% (Based on 10 reviews) |
Functionality
Incident Alerts | Gives alerts when incidents arise. Some responses may be automated, but users will still be informed. | Not enough data | |
Anomaly Detection | Constantly monitors activity related to user behavior and compares activity to benchmarked patterns. | Not enough data | |
Continuous Analysis | Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering. | Not enough data | |
Decryption | Based on 10 Cellebrite reviews. Facilitates the decryption of files and data stored using cryptographic algorithms. | 80% (Based on 10 reviews) |
Remediation
Incident Reports | Produces reports detailing trends and vulnerabilities related to their network and infrastructure. | Not enough data | |
Remediation Suggestions | Provides relevant and helpful suggestions for vulnerability remediation upon detection. | Not enough data | |
Response Automation | Reduces time spent remedying issues manually. Resolves common network security incidents quickly. | Not enough data |