Webinar

Splunk + EnCase:
3 Ways to Improve Operational Intelligence with Forensic Security

Presenters:
Mitchell Bezzina, Principal Solutions Consultant, Guidance Software
Megan Stewart, Professional Services Consultant, Guidance Software

Watch Webinar

Types

Topics

Products

Languages

Infographic

4 Key Takeaways from the 2017 SANS IR Survey

This infographic explores highlights from the 2017 SANS survey on trends in Incident Response.
pdf
Product Brief

What's New in EnCase Endpoint Security v6

EnCase® Endpoint Security Version 6 is here and has been completely redesigned with a new UI and enhanced response capabilities to make our market-leading EDR solution even better.
pdf
Product Brief

What's New With Tableau

This document provides information on the new Tableau products available as well as new product features available from recent Tableau product updates.
pdf
Product Brief

EnCase Forensic Product Overview

This document provides a high-level overview of EnCase Forensic
pdf
Publication

Next Gen Endpoint Risks and Protections: A SANS Su...

Endpoints are more than just servers, desktops and laptops--and not all of them are under corporate control. Today's endpoints also include printers, industrial controls, HVAC systems and even wearables, according to the 2016 endpoint security survey...
pdf
User Guide

Tableau Forensic Universal Bridge Integration Guid...

This document provides a product summary and integration guidelines for the Tableau Forensic Universal Bridge, model T356789iu.
pdf
Product Brief

Tableau Password Recovery Integration Tips

This document provides physical, electrical, and network information for Tableau Password Recovery (TPR) as well as recommendations for integrating the solution.
pdf
Case Study

Office of the Attorney General in Bogotá, Colombia...

Discover how the advisor to the Attorney General in Bogota, Colombia and head of the computer crimes unit adopted and leveraged EnCase Forensic and Guidance Software's EnCE training
pdf
Caso de estudio

La Fiscalía General de la Nación en Bogotá, Col...

María Pinzón Leguizamón es la coordinadora nacional contra el cibercrimen del Cuerpo Técnico de Investigación (CTI) en la Fiscalía General de la Nación en Bogotá, Colombia. La función principal del CTI es asesorar a la Fiscalía General sobr...
pdf
Quick Reference Guide

Tableau Cable and Power Supply Compatibility Chart

Provides Tableau users with cable and power supply compatibility information for all current Tableau products.
pdf
Product Brief

Integrated Open-Source Toolkit for Incident Respon...

EnCase Endpoint Security's integrated open-source toolkit strengthens and centralizes the incident response process with a robust set of integrations to various open source applications, combining the leading forensics and endpoint response platform ...
pdf
Quick Reference Guide

How to Update the TACC 2 Driver and LCD on your TP...

This is a step-by-step document to assist users with updating their Tableau Password Recovery (TPR) units to TPR version 1.2.
pdf
Whitepaper

5 Steps to Jumpstart your IG Initiative

Information Governance (IG) is a broad topic and an emerging market with decision structures and authority figures being defined across organizations and industries. In this whitepaper, we will cover the apparent barriers to IG adoption and five ste...
pdf
Whitepaper

Cross-Border Data Privacy in Focus

Cross-border data transfer issues will likely remain a top priority, particularly for the EU. Organizations should start the process of designing and implementing a privacy-compliant cross-border data transfer strategy now, as this can potentially be...
pdf
Product Brief

EnCase Endpoint Security Complement Guide

Guidance Software, the global leader in forensic security, understands the problem of maintaining continuity between security tools. We believe the best security requires tools that “talk” to each other and work together to keep the network safe. Wit...
pdf
Informe de Producto

EnCase Endpoint Security Complement Guide - Españo...

EnCase Endpoint Security Complement Guide - Español
pdf
Infographic

Inside-Out Security Framework

Guidance Software provides a four step vendor-agnostic inside-out security framework that utilizes endpoint intelligence to create or enhance an active defense. Download this infographic one page fold-out to easily reference the inside-out security ...
pdf
Product Brief

What's New in EnCase Endpoint Investigator

This document describes the new capabilities delivered in release 8.02 of EnCase Endpoint Investigator
pdf
Product Brief

Tableau Forensic Hardware Overview

This document provides a high-level overview of the Tableau Forensic Hardware line of products
pdf
Informe de Producto

Tableau Forensic Hardware Overview - Español

Tableau Forensic Hardware Overview - Español
pdf
製品概要

Tableau Forensic Hardware Overview - 日本語

Tableau Forensic Hardware Overview - 日本語
pdf
产品简介

Tableau Forensic Hardware Overview - 简体中文

Tableau Forensic Hardware Overview - 简体中文
pdf
Product Brief

Tableau Forensic Hardware Overview - 한국어

Tableau Forensic Hardware Overview - 한국어
pdf
Product Brief

360° Endpoint Threat Assessment Service

Guidance Software's 360° Threat Assessment Service from Guidance locates active adversaries that may be present on your network and identifies signs of past breaches so security teams can take action.
pdf
Product Brief

EnCase Endpoint Security & IOC's

Using EnCase Endpoint Security to scan for Indicators of Compromise (IOCs), is a powerful way detect advanced persistent threats. Seamless integration with STIX and YARA make threat hunting more efficient and allows InfoSec teams to detect and effe...
pdf
Product Brief

Travel Risk Program

Guidance Software Professional Service Travel Risk Program (TRIP)provides an extra layer of CyberSecurity for business travelers.
pdf
Product Brief

EnCase Endpoint Security + Splunk: Endpoint Visibi...

The combination of EnCase Endpoint Security and Splunk Enterprise delivers the most comprehensive visibility into network and endpoint threat information and provides powerful remediation capabilities.
pdf
Product Brief

Tableau Password Recovery Product Overview

​Tableau(TM) Password Recovery is a purpose-built, cost-effective, scalable, turnkey solution that simplifies and accelerates the process of identifying, unlocking and re-engaging password-protected files into an active case for digital investigator...
pdf
製品概要

Tableau Password Recovery Product Overview - 日本語

Tableau Password Recovery Product Overview - 日本語
pdf
产品简介

Tableau Password Recovery Product Overview - 简体中文

Tableau Password Recovery Product Overview - 简体中文
pdf
Product Brief

Tableau Password Recovery Product Overview - 한국어

Tableau Password Recovery Product Overview - 한국어
pdf
Product Brief

What's New In EnCase Endpoint Security

This document outlines the new features and product updates now available in EnCase Endpoint Security Version 5.13.
pdf
Whitepaper

Protecting Your Sensitive Data Beyond the Perimete...

Traditional Data Loss Prevention (DLP) solutions require significant resources, have functional shortcomings, and are highly complex. Misconceptions about its use all led to a decrease in popularity over the years, continuing to leave organizations ...
pdf
Whitepaper

Continuous Monitoring of Endpoints - Myths vs. Rea...

This whitepaper, written by Jon Friedman of the Cyber-Edge Group, examines various approaches to continuous monitoring in the EDR world and which methodology makes the most sense in today’s threat landscape.
pdf
Product Brief

What's New in EnCase Forensic 8

EnCase Forensic 8 delivers the capabilities you need to complete your investigations efficiently. This document discusses the new capabilities in version 8, including mobile acquisition, as well as some of the usability enhancements designed to make ...
pdf
製品概要

What's New in EnCase Forensic 8 - 日本語

What's New in EnCase Forensic 8 - 日本語
pdf
产品简介

What's New in EnCase Forensic 8 - 简体中文

What's New in EnCase Forensic 8 - 简体中文
pdf
Product Brief

What's New in EnCase Forensic 8 - 한국어

What's New in EnCase Forensic 8 - 한국어
pdf
Product Brief

EnCase Forensic Academic Program

Teaching students the principles and methodologies of computer forensics can be challenging. To be effective, professors must combine lectures and practical applications of techniques into a structure that enables quick comprehension.
pdf
Whitepaper

The Next Step in EDRM

Five essential benefits of coordinated risk management and e-discovery to improve organizational processes, reduce costs, and shorten the e-discovery time frame.
pdf
Whitepaper

360° Visibility: Why Nothing Less Will Do for Risk...

Guidance Software pioneered the category of digital investigations, and our expertise in forensic security provides organizations with 360° Visibility across their entire enterprise and all stages of the Cyber Kill Chain.
pdf
Product Brief

EnCase Endpoint Investigator Product Overview

Encase Endpoint Investigator provides organizations the ability to handle their own investigations in-house at a fraction of the cost of hiring a consultant or outsourcing the investigation.
pdf
Informe de Producto

EnCase Endpoint Investigator Product Overview - Es...

EnCase Endpoint Investigator Product Overview - Español
pdf
製品概要

EnCase Endpoint Investigator Product Overview - 日本...

EnCase Endpoint Investigator Product Overview - 日本語
pdf
产品简介

EnCase Endpoint Investigator Product Overview - 简体...

EnCase Endpoint Investigator Product Overview - 简体中文
pdf
Product Brief

EnCase Endpoint Investigator Product Overview - 한국...

EnCase Endpoint Investigator Product Overview - 한국어
pdf
User Guide

Tableau Password Recovery User Guide

Provides a comprehensive overview of Tableau Password Recovery features and functions. Includes step-by-step instructions for setting up and operating the solution. ​
pdf
Product Brief

Digital Investigations Overview

To securely triage, acquire, investigate, and report the findings of digital investigations, you must have the right combination of hardware and software at your disposal. EnCase Forensic software and Tableau hardware have been the tools of choice fo...
pdf
User Guide

T9 Forensic FireWire Bridge User Guide

Provides detailed instructions for operating the Tableau T9 to image FireWire storage devices or Apple Macs™ booted in target disk mode. Includes a comprehensive discussion on the T9 LCD user interface display.
pdf
Whitepaper

5 Steps To Weather the Zero Hour

Summarized from "The Zero Hour Phone Call: Expedite Your Data Breach Response to Minimize Risk" by Sheryl Falk, Partner at Winston and Strawn LLP, this document covers what security should do to jump start the incident response process. Namely, under...
pdf
Whitepaper

5 Takeaways From The 2016 SANS Survey on Endpoint ...

Guidance Software sponsored the 2016 SANS Survey on Endpoint Security, which discusses data related to topics such as the frequency of breaches and methods for detection and response.
pdf
Whitepaper

The Zero Hour Phone Call Expedite Your Data Breach...

"The Zero Hour Phone Call: Expedite Your Data Breach Response to Minimize Risk" written by Sheryl Falk, Partner at Winston and Strawn LLP, covers what security should do to jump start the incident response process. Namely, understanding your data & s...
pdf
Quick Reference Guide

TD2 Quick Start Guide

Printable user guide providing device connections and functions of the TD2 1:2 Forensic Duplicator.
pdf
Quick Reference Guide

TD3 Quick Start Guide

Printable user guide providing device connections and functions of the TD3 Forensic Imaging System.
pdf
Quick Reference Guide

T9 Quick Start Guide

Printable user guide providing device connections and basic operation of the T9 Forensic FireWire Bridge.
pdf
Quick Reference Guide

T35u / T35u-RW Quick Reference Guide

Printable user guide providing basic operation, connection recommendations, DIP switch information, and support information of the Tableau T35u/T35u-RW Forensic SATA/IDE Bridges.
pdf
Quick Reference Guide

TDA5-ZIF Quick Start Guide

Printable user guide providing basic operation of the TDA5-ZIF hard drive adapter kit.
pdf
User Guide

TD2 Forensic Duplicator User Guide

Provides a comprehensive overview of the Tableau TD2 forensic duplicator features and functions. Includes a complete list of all Tableau products included in a standard TD2 kit.
pdf
User Guide

TD3 Forensic Imager User Guide

Provides a comprehensive overview of the Tableau TD3 Forensic Imaging System features and functions. Includes a complete list of all Tableau products included in a standard TD3 kit.
pdf
Publication

EnCase Legal Journal - 5th Edition

Over the last decade, the field of computer forensics and e-discovery has become more complex as well as more critical to court proceedings in large part due to the explosion of digital data in society at large.
pdf
Product Brief

ThreatGRID Technology Partner, Malware Analysis an...

​ThreatGRID securely crowdsources large volumes of malware and performs advanced analysis in the cloud, to identify key behavioral indicators enabling near real-time remediation.
pdf
Quick Reference Guide

TD2u Quick Reference Guide

This document provides step-by-step instructions for for connecting the Tableau TD2u Forensic Duplicator along with other information for basic operation of the device.
pdf
Whitepaper

POS Systems: Endpoint Malware Detection and Remedi...

Over the past few years, the news has featured a seemingly unending parade of data breaches, virtually all of which began on compromised endpoints. It’s understandable why attackers have set their sights on POS system endpoints.
pdf
Quick Reference Guide

T8u Quick Reference Guide

Printable user guide providing basic operation, connection recommendations, DIP switch information, and support information of the Tableau T8u Forensic USB 3.0 Bridge.
pdf
User Guide

Forensic Bridge DIP Switch Configuration Guide

​This printable guide provides information on the four DIP switches for each of the Tableau Forensic Bridges.
pdf
Product Brief

OEM Forensic Bridges

Forensic examiners require their workstations to offer a unique combination of speed, performance, flexibility, and comprehensive imaging capability.
pdf
Whitepaper

Countering Advanced Persistent Threats with Cyber ...

Government and military networks have been at risk from targeted attacks for years, but these attacks now also threaten less well‐secured public sector entities.
pdf
User Guide

Configuring Dropbox with EnCase Applications

This step-by-step integration guide provides information on setting up and configuring Dropbox with EnCase applications. Administrative and user-based instructions provide basic information on establishing the connection (prerequisite)
pdf
Product Brief

EnForce Risk Manager Overview

EnForce Risk Manager is a software application for any organization with sensitive data. It is purposefully designed to proactively identify, classify, quantify, and remediate private or sensitive data across the enterprise.
pdf
Infographic

EnForce Risk Manager Infographic

One of the biggest threats facing corporations today is the risk of compromising sensitive data. In a recent Guidance Software survey of over 550 information security, compliance, and risk management professionals
pdf
Publication

EnCase eDiscovery Connectors

EnCase eDiscovery collects from electronic mail servers and document repositories using connectors that are specific to each type of email or document store.
pdf
Publication

Preparing for FRCP Changes with EnCase eDiscovery

Learn the specifics of the changes to the Federal Rules of Civil Procedure (FRCP), including the FRCP 26(b)(1) requirement for "proportional discovery" and FRCP 37€
pdf
Infographic

The Incident Response Decision Tree

The Incident Response Decision Tree is a poster that outlines the decisions that need to be made in a breach.
pdf
Quick Reference Guide

T6u Quick Reference Guide

​Printable quick start guide providing basic operation, connection recommendations, DIP switch information, and support information of the Tableau T6u Forensic SAS Bridge.
pdf
Whitepaper

Corporations Take Control of E-Discovery

Chris Dale, famed e-discovery expert and founder of the UK-based eDisclosure Information Project, joins Guidance Software in analyzing the results of the Guidance Software Second Annual E-Discovery Survey.
pdf
Product Brief

T8u Forensic USB 3.0 Bridge

​The Tableau T8u sets a new standard in USB write-blocking performance. T8u delivers a 10x increase in imaging speed while maintaining the value, ease of use, and reliability Tableau forensic products are known for.
pdf
Product Brief

EnCase Endpoint Security Product Overview

EnCase® Endpoint Security detect, validate and prioritize unknown threats, assess the scope and impact of a compromise, and return devices to a trusted state.
pdf
Informe de Producto

EnCase Endpoint Security Product Overview - Españo...

EnCase Endpoint Security Product Overview - Español
pdf
製品概要

EnCase Endpoint Security Product Overview - 日本語

EnCase Endpoint Security Product Overview - 日本語
pdf
产品简介

EnCase Endpoint Security Product Overview - 简体中文

EnCase Endpoint Security Product Overview - 简体中文
pdf
Product Brief

EnCase Endpoint Security Product Overview - 한국어

EnCase Endpoint Security Product Overview - 한국어
pdf
Case Study

Simplify, Strengthen, and Streamline In-house E-Di...

The benefits of in-house e-discovery are becoming more obvious and compelling: efficiency, consistency, transparency, and cost savings, to name a few. On the other hand, there are risks and challenges.
pdf
Whitepaper

Enabling Defensible Cloud ESI Collections that Ali...

Organizations are increasingly choosing to deploy enterprise file synchronization and sharing (EFSS) solutions or cloud repositories as a way of supporting mobile workers, responding to the demand for BYOD (bring your own device).
pdf
Product Brief

Blue Coat Integration Solution Brief

Using a fully-indexed and classified record of all network traffic captured by the Blue Coat Security Analytics Platform, security analysts are able to see potential threats over the network, with the Incident Response (IR) capabilities of EnCase End...
pdf
Whitepaper

Managing Insider Threats through Endpoint Detectio...

​Insider incidents continue to rise and damages resulting from insider attacks are increasing in severity. Consequently, the problem has been garnering considerable interest inside corporations and government agencies.
pdf
Product Brief

EnCase Jump Start

Accelerate the deployment of your EnCase® Endpoint Security and EnCase® eDiscovery software by purchasing a preconfigured, scalable EnCase Jump Start Server.
pdf
User Guide

TD2u Forensic Duplicator User Guide

Provides a comprehensive overview of the Tableau TD2u Forensic Duplicator features and functions. Includes a complete list of all Tableau products included in a standard TD2u kit.
pdf
Whitepaper

10 Best Practices for Reducing E-Discovery Risks a...

Certain proven best practices have evolved from corporate responses to the legal standards for discovery of electronically stored information (ESI). This paper presents those best practices and a summary of the overarching legal standards.
pdf
Whitepaper

Aligning with the NIST Cybersecurity Framework Usi...

The final version of the NIST Cybersecurity Framework was published by the National Institute of Standards and Technology (NIST) in February 2014 as a voluntary standard for the agencies managing and the industries serving critical infrastructure.
pdf
Whitepaper

101: E-Discovery Done Right

Civil litigation has seen sweeping changes as evidence goes digital and developments in technology change the way business organizations use and store information.
pdf
Product Brief

Forensic Bridge Overview

Tableau® write blockers are built for years of lasting service. Our portable write blockers are the imaging backbone of field and lab forensic kits. Our OEM-style write blockers are found in leading, high-performance forensic workstations world-wide.
pdf
Publication

101 – Litigation Holds & Preservation

​Discovery is the backbone of civil litigation, so getting it done right can make the difference between success and failure in a case.
pdf
Product Brief

EnCase Forensic Imager

When time is short and you need to acquire entire volumes or selected individual folders or files, EnCase® Forensic Imager is your tool of choice. Based on trusted, industry-standard EnCase® Forensic acquisition technology, EnCase Forensic Imager
pdf
Whitepaper

Blueprint for Cloud-Based E-Discovery

Cloud-computing is a serious contender for e-discovery and compliance needs, but the prevailing hype has made it hard to discern a workable framework for determining whether cloud-based application is the right deployment model
pdf
Whitepaper

EnCase App Central Developer Network

​Are you an EnScript developer looking for a way to share your work with colleagues? Are you a solution provider who has discovered the benefit of integrating your solution with EnCase?
pdf
Whitepaper

EnCase Processor Hardware and Configuration Recomm...

The Evidence Processor contains numerous useful features: Acquiring devices directly from the Evidence Processor Processing, with limited options, local and network previews without acquiring the devices
pdf
Product Brief

Automate Incident Response with ArcSight ESM and E...

With the proliferation of perimeter and network security solutions, your ArcSight SIEM platform is potentially receiving millions of events per day, which translates into an ever-growing number of alerts.
pdf
Whitepaper

The Seven Best Practices of Highly Effective E-Dis...

More than six years have passed since the initial Zubulake opinion addressing the preservation duties for ESI and more than three years since the changes to the Federal Rules of Civil Procedure addressing e-discovery.
pdf
Whitepaper

Detect and Survive

The ability to detect complex cases of computer misuse within an organisation, whether perpetrated by outsiders or from within, is vital to the continuing survival of the company.
pdf
Whitepaper

Utilizing Entropy to Identify Undetected Malware

Since many new variations of polymorphic viruses and other malware have the ability to change themselves each time they replicate, they are difficult to detect with traditional detection methods designed to recognize malware.
pdf
Product Brief

EnCase Endpoint Security in Action

Learn more about how the Incident Response (IR) capabilities of EnCase Endpoint Security has transformed the way enterprises expose, analyze, and respond to advanced endpoint threats and errant sensitive data.
pdf
Product Brief

EnCase eDiscovery

A market leader in e-discovery software, EnCase® eDiscovery is a comprehensive and scalable solution for managing electronic evidence for litigation or investigative matters.
pdf
Whitepaper

How 3 Cyber Threats Transform the Role of Incident...

While we still use many of the same old names - viruses, Trojans, and worms - today’s malware enables potent multistage attacks called advanced persistent threats.
pdf
Case Study

Novelis Case Study

​The most highly respected and most often mentioned solution at industry trade shows was EnCase® eDiscovery, so Novelis purchased it, along with training passports for the Novelis e-discovery team repeatable in-house process.
pdf
Whitepaper

The Total Economic Impact Of EnCase Endpoint Secur...

​A global automobile manufacturer (GAM) opened its doors, books, and data to research firm Forrester to conduct a detailed study and analysis of the net benefit the manufacturer realized from the Incident Response (IR) capabilities of EnCase Endpoint...
pdf
Whitepaper

Incident Response: Six Steps for Managing Cyber Br...

Now that security breaches are practically unavoidable, organizations must adopt new postures to be prepared for and successfully respond to incidents right at the first sign of intrusion.
pdf
Case Study

At Liberty Mutual, E-Discovery is a Team Effort

Liberty Mutual is known for having a well-integrated in-house e-discovery process. We asked Sean McSweeney, Deputy General Counsel, and Glenn O’Brien, Electronic Discovery Manager, to discuss their process and approaches from the legal perspectives.
pdf
Case Study

Data Risk & Privacy Survey Results

Sensitive data management across the entire enterprise is an incredibly daunting proposition for any organization- especially in light of shadow IT, data sprawl, and other data-related challenges. In order to gain insight into the market drivers, pai...
pdf
Publication

2016 SANS Survey On Endpoint Security

The 2016 SANS Survey on Endpoint Security is co-sponsored by Guidance Software and held annually by the SANS Institute.
pdf
Whitepaper

Quantified Information Goverance: A New Path To Va...

This whitepaper explores the idea of “Quantified Information Governance,” a concept by the Information Governance Initiative (IGI) that addresses both the philosophy and discipline of data-driven or evidence-based IG decision making.
pdf