EnCase® Endpoint Investigator

The Most Powerful and Easy-to-use Remote Forensic Security Solution Available.


EnCase Endpoint Investigator 8.08: New encryption support and data acquisition from cloud and on-premises

EnCase Endpoint Investigator 8.08 takes the digital investigations to the next level by introducing new evidence decryption capabilities from Symantec endpoint encryption, Dell full disk encryption and Apple File System encryption. You can now acquire evidence from online and on premises services for Microsoft Office 365, Microsoft Exchange and Microsoft SharePoint, efficiently and precisely. Adding to that are support for Microsoft Edge Internet artifacts, ability to perform physical memory acquisitions on Mac OS X, as well as mobile acquisition enhancements providing you with the best possible user experience.

Encase Technology Is Trusted by Corporations and Government Agencies Worldwide


You are tasked with more types of investigations than ever before; HR issues, compliance violations, regulatory inquiries, IP theft, and more. To meet the needs of your internal stakeholders you need visibility across your endpoints, no matter where they are, and that is what we provide.

  • Perform any type of internal or regulatory investigation
  • Collect data from off-the-network endpoints to keep your investigations moving
  • Work discreetly without interrupting the business or alerting employees

Be confident in your investigation findings using EnCase technology that is trusted by corporations and governments with a proven record of court acceptance. No other solution offers the same level of forensic capabilities and flexibility.

Technical Overview Download Product Brief

"Unquestionably the most powerful and versatile computer forensic tool available"

Request Demo

Find What Matters with EnCase Endpoint Investigator

Be confident in your findings using the trusted, industry-leading digital forensics solution.


EnCase Mobile Investigator

EnCase Mobile Investigator was built with the investigator in mind. As investigations including mobile devices grow exponentially, investigators need a solution to keep up with the latest mobile devices, applications and operating systems so that criminals can be prosecuted. When coupled with EnCase Forensic, EnCase Mobile Investigator empowers forensic investigators to seamlessly acquire, review, analyze, and report on mobile evidence from the widest variety of devices so that no evidence is hidden. Unlike other traditional forensic solutions, EnCase Forensic and EnCase Mobile Investigator provide investigators with the flexibility, visibility, and ease-of-use to complete any forensic investigation from end to end.

Product Brief

EnCase Endpoint Investigator Product Overview

Encase Endpoint Investigator provides organizations the ability to handle their own investigations in-house at a fraction of the cost of hiring a consultant or outsourcing the investigation.
Product Video

EnCase Endpoint Investigator Technical Overview

This is a technical whiteboard video of EnCase Endpoint Investigator, Guidance Software's best-of-breed remote digital investigations solution.
Product Video

The Enhanced EnCase Agent

This Whiteboard Video is a technical overview of Guidance Software's Enhanced Agent used for investigations with EnCase Endpoint Investigator, a best-of-breed digital investigation solution that remotely collects data, even from off-the-network endpo...

3 Ways To Accelerate Remote Digital Investigations

Whether you are an HR manager trying to discreetly monitor suspicious employee activity, or an IT auditor investigating for policy violations, you need a way to quickly investigate remote endpoints across your environment. EnCase Endpoint Investigato...
Case Study

Conducting Internal Investigations with EnCase End...

Discover how using EnCase Endpoint Investigator can help you with your internal forensic investigations through four common case studies including: IP Theft, HR Violation, Corporate Fraud, and an Internal Investigation.

Cross-Border Data Privacy in Focus

Cross-border data transfer issues will likely remain a top priority, particularly for the EU. Organizations should start the process of designing and implementing a privacy-compliant cross-border data transfer strategy now, as this can potentially be...

Ready to Talk?

Let us answer your questions or schedule a demo.