Top Rated FTK Enterprise Alternatives
Collection of evidence in the tool - AD Enterprise has many capabilities that are valuable for e-discovery and forensics for corporate investigation teams Review collected by and hosted on G2.com.
Complex of the installation of AD enterprise when attempting to do remote collections and additional cost for SQL support and APIs Review collected by and hosted on G2.com.
9 out of 10 Total Reviews for FTK Enterprise
FTK Enterprise is a digital forensic investigation tool that stands out as the pioneering solution capable of conducting off-network endpoint collection and seamlessly gathering data from various online and cloud sources that are widely utilized. Review collected by and hosted on G2.com.
No significant downsides were observed during the usage of FTK Enterprise. Review collected by and hosted on G2.com.
Ediscovery and central case management are the two key components of FTK enterprise. Review collected by and hosted on G2.com.
Cost, resources and Complexity are the key disadvantage for normal users. Review collected by and hosted on G2.com.
The cross-platform online/offline collection options are intuitive and easy to use. Review collected by and hosted on G2.com.
We have not intigrated into our cybersecurity solutions because the project team are having interface issues. Review collected by and hosted on G2.com.
As a basic forensic tool,it is good and I have been using it for the past 11 years. Review collected by and hosted on G2.com.
Where do I start? Remote acquisition is problematic. To start with certificate generation at installation was fraught with issues. There was no clear step-by-step to generate the correct certificates and it took many, many hours to work out what was actually needed. Self-generated certs, whic work straight away, are no good in an Enterprise environment. An error on the screen where certificates are selected still has not been fixed and was the cause of other issues as it suggests a certificate type that is incorrect.
The other issue is that remote connections are far from straight forward. The system will not accept machine names and insists on only IP addresses and even then, connections 1st time are rare and usually requires several attempts and an agent re-install.
Our environment mandates that the system resides in a separate, secure Active Directory Domain and connections to the main Domain, where the target machines reside, makes it much more difficult. I have to launch FTK "as" the other Domain user in order to connect.
When agents run as a service and the connection is validated by certificate, there should be no need for further authentication as this complicates connections.
I just get the feeling that the this part of the system was designed by people with no forensic or system engineering background - clearly they don't appreciate just how difficult this part of the application is to use day-to-day.
There are other issues as well - too involved to mention here.
If I were to rate the remote-access portion out of 10 it would only get a 1. It needs a redesign - plain and simple.
I would also like to see a comprehensive user manual with real-world functional examples and explanations of features. It would be a big manual, but I really don't get the best out of its capabilities because I probably don't realise all its potential. For the money we paid for this system, the very least I expected was a straight forward installation and a comprehensive user manual! Review collected by and hosted on G2.com.

The world has changed a lot when it comes to crime and cyber crimes are one of the most dangerous when it comes to big corporate like mine, and to beat and investigate such advanced crimes modern technology has beaten all odds in forensic investigations. AD Enterprise is one such leading platform in the Industry that handles forensic data on a larger scale. It is quite helpful to our IT department and security professionals in effectively investigating matters like the identification of corrupt employees and whistleblowers. Review collected by and hosted on G2.com.
The Ad Enterprise is so effective because of the access to the data of all the employees from their devices and organization networks which I find ethically disadvantages to the employee's trust and privacy. Review collected by and hosted on G2.com.

When it comes to forensic investigation modern technology has beaten all odds. AD Enterprise is one of the most leading platforms in the industry for managing the data of forensic investigations on a larger scale. It provides detailed access to the data in the networks of organizations and employee devices. This helps the IT and other security professionals to investigate a dishonest employee, conduct facts analysis after breach or to the claims of a whistle blower. Review collected by and hosted on G2.com.
The only disadvantage of this software is that nothing of the employee data will remain private as it will be accessible by the software. Review collected by and hosted on G2.com.

As a senior advisor I have recommended Ad Enterprise as precautionary actions towards network related cyber crimes. This platform manages forensic investigation on a large scale by providing access to our employee data within the organization network and employee devices. This data helps the company in identifying dishonest employees and gather facts against whistle blowing. Review collected by and hosted on G2.com.
In attempt to access the employee data the privacy is compromised and the employee will always work under the pressure of continuous monitoring. Review collected by and hosted on G2.com.
The automated process made our legal hold process easy. Review collected by and hosted on G2.com.
The inability to disassociate an associate from a hold and still have the ability to track the associate on the custodian report. Review collected by and hosted on G2.com.
The indexing the tool does makes it easy to locate important evidence. Review collected by and hosted on G2.com.
The reporting format is not intuitive and the Internet history could be better parsed. Review collected by and hosted on G2.com.