By browsing this site, you are agreeing to our cookie policy. More Information

Upcoming Webinar

Developing Your Protected-File Cracking Strategy

Wednesday, October 5, 2016
11:00am PT / 2:00pm ET

Register Webinar

Types

Topics

Products

Webinar

Best Practices in Digital Investigations using EnC...

We brought together the best practices and most common investigator requests into the newest release of EnCase Forensic 8. Built with feedback from our forensic community, you will learn those better ways during this webinar as we explore new capabil...
Video
Webinar

Mejores prácticas en Investigación Digital con EnC...

Reunimos las mejores prácticas y los pedidos más solicitados por los investigador en la versión más reciente de EnCase Forensic 8. Diseñado a partir de la retroalimentación de nuestra comunidad forense, en este seminario en línea aprenderá las mejor...
Video
Product Video

The Enhanced EnCase Agent

This Whiteboard Video is a technical overview of Guidance Software's Enhanced Agent used for investigations with EnCase Endpoint Investigator, a best-of-breed digital investigation solution that remotely collects data, even from off-the-network endpo...
Video
Product Video

EnCase Endpoint Investigator Overview

This is a technical whiteboard video of EnCase Endpoint Investigator, Guidance Software's best-of-breed remote digital investigations solution.
Video
Product Video

EnCase Endpoint Security Overview - Français

EnCase Endpoint Security Présentation du produit
Video
Product Video

EnCase Endpoint Security Overview - Español

EnCase Endpoint Security Descripción del producto
Video
Product Video

Root Cause Analysis with EnCase Endpoint Security

Root Cause Analysis with EnCase Endpoint Security
Video
Product Video

Remediation with EnCase Endpoint Security

EnCase Endpoint Security and Remediation.
Video
Product Video

EnCase Endpoint Security Technical Overview

Technical overview of EnCase Endpoint Security
Video
Product Video

EnCase Endpoint Security and IOCs

EnCase Endpoint Security leverages IOCs, such as YARA & STIX, to detect threats across the enterprise.
Video
Product Video

Response Automation with EnCase Endpoint Security

EnCase Endpoint Security helps security teams validate and triage alerts and events created by monitoring technology to automate incident response
Video
Product Video

The EnCase Agent

EnCase Endpoint Security uses the Guidance Software passive agent to reduce the time and cost associated with identifying advanced persistent threats.
Video
Product Video

Detection with EnCase Endpoint Security

EnCase Endpoint Security is used by information security teams to detect unknown threats across the enterprise.
Video
Product Video

DFIR with EnCase Endpoint Security

EnCase Endpoint Security is the go-to tool for security teams who require forensic level visibility for incident response.
Video
Webinar

Guidance and Verizon Examine the 2016 DBIR: Taking...

Based on forensic evidence collected from 68 partner organizations as well as the Verizon caseload, the 2016 Verizon Data Breach Investigations Report (DBIR) presents a rare and comprehensive view into the world of corporate cybercrime. Now in its ni...
Video
Webinar

Whats New in EnCase Forensic 7.12

Digital investigation requires a powerful combination of software and hardware supporting expert investigators — who are often strained to their limits. These experts rely on EnCase® to piece together the digital crime scene and expose the critical e...
Video
Product Video

EnForce Risk Manager Overview

EnForce Risk Manager Product Overview
Video
Webinar

A Day in the Life of a SOC Analyst: Evolving Incid...

It’s not getting any easier to be a SOC analyst. With new attacks appearing daily and a significant skills gap, the existing approaches to validating alerts and handing those alerts off to the incident response team are neither particularly effective...
Video
Webinar

Security Cost Management: Dodge the Lightning or C...

Every organization worries about the rare, but high-impact breach that tarnishes corporate reputation and may even affect long-term business viability. But being ready when lightning strikes is only part of the challenge. Every day, going forward, or...
Video
Webinar

EnCase & Python–Extending Your Investigative Capab...

Digital investigations are constantly changing as new technologies are utilized to create, store or transfer vital data. Augmenting existing forensic platforms with innovative methods of acquiring, processing, reasoning about and providing actionable...
Video
Webinar

Actionable Intelligence from the 2015 Verizon DBIR

Get a rare and highly detailed view into the world of corporate cyber-attacks in this webinar featuring the director of the Verizon RISK team, Bryan Sartin
Video
Webinar

Efficient and Effective Investigations with EnScri...

EnCase Forensic investigators have always leveraged the power of EnScripts - the programs within EnCase Forensic that automate tasks for investigators. These little apps can save investigators time by instantly retrieving artifacts, cutting and pasti...
Video
Demo

T6u Introduction and Setup

This is a short informational video that covers the functionality and design of the Tableau T6u Forensic SAS Bridge. It also shows every item provided in the T8u Kit and walks through how to setup the T6u for use with step-by-step directions.
Video
Webinar

GPS Location Accuracy Triangulation vs Trilaterati...

Digital investigators are increasingly able to use GPS data in smartphones and pictures to uncover evidence and map the location of suspects and victims. However, gathering and understanding Exif data and other data can be difficult and time-consumin...
Video
Webinar

Fighting Cybercrime with EnCase and Cisco AMP Thre...

Phishing, fraud, child exploitation More crime is taking place in more digital places than ever before, and sometimes the digital devices are the weapons themselves. Along with the increase in digital crime and evidence has evolved the Trojan defense...
Video
Webinar

E-Discovery 201: Evidence Admissibility

Evidence is worthless if its not admissible. Just as with paper documents, the traditional rules of authentication, hearsay, and the best evidence rule apply to e-mail, social media, and other electronically stored information (ESI). In our one-hour ...
Video
Webinar

6 Keys to Conducting Effective Mobile Forensic Inv...

As smartphones get smarter, theyre used for all kinds of clever and sometimes nefarious purposeswhich means theyre increasingly the targets of digital investigations and will likely become even more critical in years to come. The investigation challe...
Video
Webinar

Enhancing Digital Investigations with Belkasoft

Cases like those of the Facebook and Craigslist killers show that evidence found in social-media artifacts can make a case for digital investigators. As the use of social media sites expands rapidly, so has the amount of potential evidence hidden wit...
Video
Webinar

The Internet Police

With nearly a decade of uncovering stories like the battle between HB Gary and Anonymous to the birth of digital forensic investigations, Ars Technica journalist Nate Anderson, author of The Internet Police, has a unique understanding of both the pas...
Video
Webinar

ESI in the Cloud: How to Collect, Preserve, Defend

The more data and emails and IP that our organizations push out to the cloud, the more critical our ability to defensibly search, collect, and preserve that electronically stored information (ESI) for e-discovery, compliance, and information governan...
Video
Webinar

Zero-Hour Response to a Data Breach

Someday you will get the call that no one wants to receive, notifying you that your perimeter has been breached and your data may have been compromised.
Video
Webinar

Conducting Remote Investigations with Tableau

When targets of digital data collections are located at a distance, conducting investigations gets more challenging. In most cases, the remote capability of EnCase Forensic lets IT perform collections from a central location, but time constraints, ba...
Video
Webinar

Increasing Functionality and Efficiency in EnCase ...

The EnScript scripting language has nearly unparalled power to customize and extend the functionality of EnCase to help you do better workfasterand the EnCase community has created over 120 EnScripts available in EnCase App Central to meet nearly eve...
Video
Webinar

Password Recovery and Decryption Techniques with P...

Join Guidance Software and partner Passware for solutions concerning how to detect and handle password-protected items in a digital investigation. Our webinar will illustrate: How cases go unsolved because evidence is protected with Truecrypt, B...
Video
Webinar

Using GREP Searches to Speed Investigations

One of the most underused tools in EnCase Version 7 is the GREP search. Learn powerful new GREP techniques in the second of two webinars featuring Suzanne Widup, president of the Digital Forensics Association and author of the recently released book,...
Video
Webinar

Earning Your EnCE®

With digital forensic investigations on the rise, credentialed digital investigators are in demand. Prove your forensic expertise and boost your professional standing by earning the EnCase Certified Examiner (EnCE) certification. Watch Now: In this w...
Video
Webinar

Investigating Social Media with Belkasoft

Facebook, Snapchat, Instagram, and other social media play a major role in the lives of many persons of interest in criminal and civil cases. This means forensic investigators like you need faster ways to acquire potential evidence from the artifacts...
Video
Demo

Tableau’s newest USB 3.0 Forensic Bridges

Forensic acquisition products based on USB 3.0 offer unmatched imaging speed. This video explains how Tableau built USB 3.0 support into three popular write blockers.
Video
Webinar

Using Image Analyzer with EnCase Forensic

Image Analyzer is well known to be a powerful tool for forensically analyzing large volumes of images for pornographic content. Join our webinar to see Image Analyzers Stephen Tye show how to use it with EnCase Forensic for faster investigations with...
Video
Webinar

Duplicators and Write-Blockers: Tableau Makes it E...

Forensic evangelist Jeff Hedlesky presents the very latest in forensic duplication and write-blocking technologies. Whether you are a Tableau user who wants to hear about the latest equipment available, or just looking for intel on the most advanced ...
Video
Webinar

EnCase® App Central: Highlighting the Best EnScrip...

EnCase Forensic investigators around the world are part of a thriving community that create case-cracking EnScripts and specialty appsall developed to make investigative teams more efficient at solving crimes. Until now, these apps and solutions have...
Video
Demo

T8u Introduction and Setup Video

This is a short informational video that covers the functionality and design of the Tableau T8u Forensic USB 3.0 Bridge. It also shows every item provided in the T8u Kit and walks through how to setup the T8u for use with step-by-step directions.
Video
Webinar

EnCase Forensic: Review Package

The EnCase Review Package is an easy way for forensic examiners to share their findings with detectives, D.A.s, field agents or anyone else interested in the case, providing visibility into the evidence to a wide range of people, allowing the examine...
Video
Demo

TD2 Forensic Duplicator: Introduction

The Tableau TD2 Forensic 1:2 Duplicator is fast, reliable, easy-to-use, and images to two drives simultaneously. Watch this video to see the TD2 in action.
Video
Demo

TD3 Forensic Imager: Introduction & Set Up

Not all forensic imaging solutions are created equal. Watch this video for a complete overview of the new and very unique Tableau TD3 Forensic Imager.
Video
Webinar

How to Catch an Insider Data Thief

A prominent health care provider hired me to determine if their employee had stolen their data. My attempts at forensics all failed: the suspect had
Video
Demo

Network Write Blocking with TD3

If your usage needs call for the use of a network based write blocker, you'll want to view this TD3 video.
Video
Demo

TD3 Graphical User Interface

This video features the TD3 Forensic Imagers intuitive, high-resolution, touch-screen user interface.
Video
Demo

T35u Forensic USB 3.0 SATA/IDE Bridge - Introducti...

This video describes the features of the T35u, how to perform setup and image a subject drive, and shows what's in the T35u kit provided by Guidance Software.
Video
Webinar

Tableau Password Recovery - A Closer Look

Join us for an up-close look at Guidance Software’s new product, Tableau Password Recovery (TPR). In recent years, the highly publicized leaks of sensitive
Video
Demo

TD2u Informational and Setup

This is a short informational video that covers the design of the new Tableau TD2u Forensic Duplicator. It also shows every item provided in the TD2u Kit and walks through how to setup the TD2u with step-by-step directions.
Video
Webinar

Demystifying IOCs Unlocking the Secrets of Threats...

TTPs, OSINT STIX, TAXII… Indicators of compromise can seem to be a baffling alphabet soup of widely varying objects, data types, and specifications.
Video
Webinar

5 Things Your Board Needs To Know About Security

With the continued high profile nature of security, your Board of Directors is very interested in all things cyber. Thus you get called into the Board of
Video
Demo

Protocol Modules: TDP4, TDP6, TDP8

This informative video will explain how investigators can expand the number and kind of drives which can be forensically examined on the Tableau TD1 or TD2 Forensic Duplicator, through the use of easy-to-connect Protocol Modules.
Video
Webinar

3 Data Trends Every Organization Needs To Know

The nature of Electronically Stored Information (ESI) is shifting and is constantly being redefined. New digital forces of information are requiring E-Discovery, Cybersecurity, and Information Management professionals to view information in exciting ...
Video
Product Video

EnCase eDiscovery Overview

EnCase eDiscovery Product Overview
Video
Product Video

EnCase Endpoint Security Overview

EnCase Endpoint Security Product Overview
Video