EnCase® Endpoint Investigator

The Most Powerful and Easy-to-use Remote Forensic Security Solution Available.


EnCase Endpoint Investigator 8.07: Going Beyond Performance

Building on the performance enhancements of 8.06, our latest release of EnCase Endpoint Investigator 8.07 introduces new customer-driven enhancements that take digital investigations to the next level. Updated encryption support, Apple File System support, SAFE improvements, and volume shadow copy capabilities are just some of the new enhancements designed to help you collect and analyze the evidence you need, efficiently and precisely, with the best possible user experience.

Encase Technology Is Trusted by Corporations and Government Agencies Worldwide


You are tasked with more types of investigations than ever before; HR issues, compliance violations, regulatory inquiries, IP theft, and more. To meet the needs of your internal stakeholders you need visibility across your endpoints, no matter where they are, and that is what we provide.

  • Perform any type of internal or regulatory investigation
  • Collect data from off-the-network endpoints to keep your investigations moving
  • Work discreetly without interrupting the business or alerting employees

Be confident in your investigation findings using EnCase technology that is trusted by corporations and governments with a proven record of court acceptance. No other solution offers the same level of forensic capabilities and flexibility.

Technical Overview Download Product Brief

"Unquestionably the most powerful and versatile computer forensic tool available"

Request Demo

Find What Matters with EnCase Endpoint Investigator

Be confident in your findings using the trusted, industry-leading digital forensics solution.


EnCase Mobile Investigator

EnCase Mobile Investigator was built with the investigator in mind. As investigations including mobile devices grow exponentially, investigators need a solution to keep up with the latest mobile devices, applications and operating systems so that criminals can be prosecuted. When coupled with EnCase Forensic, EnCase Mobile Investigator empowers forensic investigators to seamlessly acquire, review, analyze, and report on mobile evidence from the widest variety of devices so that no evidence is hidden. Unlike other traditional forensic solutions, EnCase Forensic and EnCase Mobile Investigator provide investigators with the flexibility, visibility, and ease-of-use to complete any forensic investigation from end to end.

Product Brief

EnCase Endpoint Investigator Product Overview

Encase Endpoint Investigator provides organizations the ability to handle their own investigations in-house at a fraction of the cost of hiring a consultant or outsourcing the investigation.
Product Video

EnCase Endpoint Investigator Technical Overview

This is a technical whiteboard video of EnCase Endpoint Investigator, Guidance Software's best-of-breed remote digital investigations solution.
Product Video

The Enhanced EnCase Agent

This Whiteboard Video is a technical overview of Guidance Software's Enhanced Agent used for investigations with EnCase Endpoint Investigator, a best-of-breed digital investigation solution that remotely collects data, even from off-the-network endpo...

3 Ways To Accelerate Remote Digital Investigations

Whether you are an HR manager trying to discreetly monitor suspicious employee activity, or an IT auditor investigating for policy violations, you need a way to quickly investigate remote endpoints across your environment. EnCase Endpoint Investigato...
Case Study

Conducting Internal Investigations with EnCase End...

Discover how using EnCase Endpoint Investigator can help you with your internal forensic investigations through four common case studies including: IP Theft, HR Violation, Corporate Fraud, and an Internal Investigation.

Cross-Border Data Privacy in Focus

Cross-border data transfer issues will likely remain a top priority, particularly for the EU. Organizations should start the process of designing and implementing a privacy-compliant cross-border data transfer strategy now, as this can potentially be...

Ready to Talk?

Let us answer your questions or schedule a demo.