Upcoming Webinar

Uncovering Mobile App Evidence
with EnCase Mobile Investigator
Tuesday, Aug 15, 2017, 11am PT

Presenters:
Rajan Udeshi, Product Management Specialist, Guidance Software
Jonathan Arias, Solutions Consultant, Guidance Software

Register Now

Types

Topics

Products

Languages

Webinar

Uncovering Mobile App Evidence with EnCase Mobile ...

EnCase Mobile Investigator makes it easy to acquire, view, analyze, and report on evidence from more than 25 types of mobile devices and more than 26,000 mobile device profiles. This webinar will show you how to use EnCase Mobile Investigator to unco...
Video
Product Video

Tableau TX1 Forensic Imager Product Overview

This video provides a high-level overview of the Tableau TX1 Forensic Imager, illustrating why the TX1 is the most powerful and flexible digital forensic hardware product available today.
Video
Product Video

Endpoint Detection and Response: How to be 1% Stro...

In this video, Guidance Software CEO Patrick Dennis explains the idea of continuous compromise, how we are witnessing the end of the traditional network perimeter, and why endpoint detection and response is critical to identify and respond to advance...
Video
Demo

EnCase Mobile Investigator Product Demo

Mobile Device investigations are on the rise. See how investigators can use EnCase Mobile Investigator to solve their biggest challenges involving mobile device evidence analysis.
Video
Webinar

Ransomware: Petya/NotPetya Now, But What About Tom...

Ransomware like Petya/NotPetya and WannaCry is here to stay. Join us in this webcast to learn tips and tricks to rapidly detect and respond to advanced malware.
Video
Product Video

EnCase Mobile Investigator Overview

This video provides a high level overview of EnCase Mobile Investigator, illustrating why EnCase Mobile Investigator is the most powerful and flexible mobile forensics solution available today.
Video
Webinar

The 2017 Verizon DBIR: Stories, Strategies & Solut...

Guidance and Verizon examine the latest Data Breach Investigations Report. The DBIR offers critical intelligence on the tools, tactics and procedures used in the most recent wave of security attacks from 2016.
Video
Webinar

Overcoming Smartphone Forensics: Introduction to E...

EnCase Mobile Investigator allow examiners to easily acquire, analyze, investigate, and report on evidence from the widest variety of devices - the most of any forensic mobile solution available today. This webinar provides a demo of EnCase Mobile In...
Video
Demo

What's New in EnCase Endpoint Investigator 8

We brought together the best practices and most common investigator requests into the newest release of EnCase Endpoint Investigator 8. This demo walks through the newest features available.
Video
Product Video

What's New in EnCase Endpoint Security 6

EnCase Endpoint Security 6 has been completely redesigned to automate incident response and streamline security workflows.
Video
Webinar

How to Complete More Efficient Investigations with...

We brought together the best practices and most common investigator requests into the newest release of EnCase Forensic 8. Built with feedback from our forensic community, you will learn those better ways during this webinar as we explore new capabil...
Video
Webinar

3 Ways To Accelerate Remote Digital Investigations

Whether you are an HR manager trying to discreetly monitor suspicious employee activity, or an IT auditor investigating for policy violations, you need a way to quickly investigate remote endpoints across your environment. EnCase Endpoint Investigato...
Video
Webinar

Efficient and Effective Investigations with EnScri...

EnCase Forensic investigators have always leveraged the power of EnScripts - the programs within EnCase Forensic that automate tasks for investigators. These little apps can save investigators time by instantly retrieving artifacts, cutting and pasti...
Video
Webinar

Whats New in EnCase Forensic 7.12

Digital investigation requires a powerful combination of software and hardware supporting expert investigators — who are often strained to their limits. These experts rely on EnCase® to piece together the digital crime scene and expose the critical e...
Video
Webinar

5 Things Your Board Needs to Know About Security

With the continued high profile nature of security, your Board of Directors is very interested in all things cyber. Thus you get called into the Board of Directors meeting to explain the exposure to your business, their personal exposure being Direct...
Video
Product Video

EnCase Endpoint Security Overview - Français

EnCase Endpoint Security Présentation du produit
Video
Product Video

EnCase Endpoint Security Overview - Español

EnCase Endpoint Security Descripción del producto
Video
Webinar

Digital Lab: EnCase Forensic v7 Workflows, Tips & ...

Nearly every digital investigation presents unique and complicated challenges. In this webinar we address some of the most common and vexing questions. Well give you tips, ideas, and best practices, and well show you how EnCase Forensic v7 can be use...
Video
Webinar

What’s in Your Incident Response Toolkit?

How do your tools match up to those used by investigators in high-profile breaches? Learn the best incident response tools for finding and sharing data at rest, in transit, and shared outside the organization from Ondrej Krehel of LIFARS, who has wor...
Video
Webinar

Placing the Suspect Behind the Keyboard

"Placing the Suspect Behind the Keyboard" is one of the first books to provide a blueprint for digital forensic examininers to conduct criminal investigations. This presentation features the author Brett Shavers who will discuss key learnings from re...
Video
Webinar

Transitioning from EnCase Forensic v6 to v7 - Part...

Skilled EnCase Version 6 users can learn how to bring that expertise into the powerful new EnCase Version 7 environment in part 2 of our Transitioning from EnCase Version 6 to Version 7 webinar. Take a Guided Tour:In this one-hour webinar, senior tra...
Video
Webinar

Transitioning from EnCase Forensic v6 to v7 - Part...

Join our training manager and instructor for the EnCase Forensic v6 to v7 training class as she demonstrates key aspects of moving from EnCase Version 6 to Version 7. In this first of two live webinars, you will learn about key aspects of making a sm...
Video
Webinar

EnCase Forensic v7: The Best Practice in Digital I...

Join our webinar to get an introduction to or a refresher in best practices in digital investigations from our lead trainer, Manfred Hatzesberger. Youll benefit from material drawn from the award-winning EnCE training classes as he guides you through...
Video
Webinar

Creating an Investigative Timeline with Magnet For...

One of the toughest things in building a digital forensics is being able to prove a suspect was behind the keyboard when critically important activity took place. Learn how to develop an investigative timeline that incorporates clues and artifacts fr...
Video
Webinar

Seven Steps to a Successful Digital Investigation

Whether you're new to forensics or a seasoned examiner, understanding the principles of computer forensics can be the key to completing effective investigations. In this webinar, we will discuss the complex process of digital investigations, broken d...
Video
Webinar

EnCase + Lastline: Advanced Threat Intelligence fo...

EnCase Endpoint Security is the market leading EDR tool, helping InfoSec teams detect and respond to sophisticated threats with forensic-grade remediation. EnCase Endpoint Security now integrates with Lastline to provide security teams with rich thre...
Video
Webinar

EnCase + Demisto: Streamlining Incident Response

EnCase Endpoint Security is the market leading EDR tool, helping InfoSec teams detect sophisticated threats and then enabling those teams to respond definitely with forensic-grade remediation. By leveraging the Guidance integration with Demisto, sec...
Video
Product Video

EnCase Endpoint Investigator Overview

EnCase Endpoint Investigator Product Overview
Video
Product Video

EnCase Forensic Overview

This video provides a high level overview of EnCase Forensic, illustrating why EnCase Forensic is the market leading forensic investigation solution.
Video
Product Video

EnCase eDiscovery Overview

EnCase eDiscovery Product Overview
Video
Product Video

EnForce Risk Manager Overview

EnForce Risk Manager Product Overview
Video
Product Video

Tableau Password Recovery Overview

This short informational video provides a high-level introduction of the Tableau Password Recovery (TPR) solution. Learn how TPR can help you gain access to encrypted files more efficiently and how it compares to other password recovery solutions ava...
Video
Product Video

EnCase Endpoint Investigator Technical Overview

This is a technical whiteboard video of EnCase Endpoint Investigator, Guidance Software's best-of-breed remote digital investigations solution.
Video
Product Video

EnCase Endpoint Security and IOCs

EnCase Endpoint Security leverages IOCs, such as YARA & STIX, to detect threats across the enterprise.
Video
Product Video

The Enhanced EnCase Agent

This Whiteboard Video is a technical overview of Guidance Software's Enhanced Agent used for investigations with EnCase Endpoint Investigator, a best-of-breed digital investigation solution that remotely collects data, even from off-the-network endpo...
Video
Product Video

Root Cause Analysis with EnCase Endpoint Security

Root Cause Analysis with EnCase Endpoint Security
Video
Product Video

Remediation with EnCase Endpoint Security

EnCase Endpoint Security and Remediation.
Video
Product Video

EnCase Endpoint Security Technical Overview

Technical overview of EnCase Endpoint Security
Video
Product Video

The EnCase Agent

EnCase Endpoint Security uses the Guidance Software passive agent to reduce the time and cost associated with identifying advanced persistent threats.
Video
Product Video

Response Automation with EnCase Endpoint Security

EnCase Endpoint Security helps security teams validate and triage alerts and events created by monitoring technology to automate incident response
Video
Product Video

Detection with EnCase Endpoint Security

EnCase Endpoint Security is used by information security teams to detect unknown threats across the enterprise.
Video
Product Video

DFIR with EnCase Endpoint Security

EnCase Endpoint Security is the go-to tool for security teams who require forensic level visibility for incident response.
Video
Product Video

360 Threat Assessment

With our agentless and cloud-based technology, the 360° Threat Assessment provides security teams with a thorough forensic audit of their endpoints, to detect advanced threats existing in their environment at unprecedented speeds. After the assessmen...
Video
Product Video

v7 Transition Video

"The features and workflow built into EnCase Forensic Version 7 accommodate the modern and future nature of digital investigations. Version 7 keeps all of the power and usability EnCase is known for, while also accommodating the larger data sets, mob...
Video
Demo

Part 4: Making the Move to v7 - Taking Advantage o...

With workloads increasing and the clock always ticking, law-enforcement and other digital forensics investigators need to shorten their review process while getting better results from more devices and in more languages than ever before. In just minu...
Video
Demo

Part 2: Making the Move to v7 - Performing the Inv...

If you are an EnCase v6 user who is making the move to or is considering moving to v7, this webinar series is for you. In this four-part webinar series EnCase experts will walk you through each stage of the digital investigation process, from prepari...
Video
Demo

Part 1: Making the Move to v7 - Preparing for Your...

If you are an EnCase v6 user who has been waiting to make the move to v7, this webinar is for you. In this webinar EnCase experts will walk you through preparing for your investigation in v7. You will learn how to prepare for your case from setting y...
Video
Demo

Part 3: Performing the Investigation – Bookmarking...

If you are an EnCase v6 user who is making the move to or is considering moving to v7, this webinar series is for you. In this four-part webinar series EnCase experts will walk you through each stage of the digital investigation process, from prepari...
Video
Demo

TD2 Forensic Duplicator: Introduction

The Tableau TD2 Forensic 1:2 Duplicator is fast, reliable, easy-to-use, and images to two drives simultaneously. Watch this video to see the TD2 in action.
Video
Demo

Protocol Modules: TDP4, TDP6, TDP8

This informative video will explain how investigators can expand the number and kind of drives which can be forensically examined on the Tableau TD1 or TD2 Forensic Duplicator, through the use of easy-to-connect Protocol Modules.
Video
Demo

Tableau’s newest USB 3.0 Forensic Bridges

Forensic acquisition products based on USB 3.0 offer unmatched imaging speed. This video explains how Tableau built USB 3.0 support into three popular write blockers.
Video
Webinar

Achieving ROI Through EDR Technology

Senior security staff are often faced with the challenge of justifying ROI for their security purchases. EnCase Endpoint Security provides that ROI by seamlessly working with a wide variety of commonly used security tools to reduce workflow bottlene...
Video
Demo

New Features in EnCase Forensic 8

We brought together the best practices and most common investigator requests into the newest release of EnCase Forensic 8. This demo walks through the newest features available.
Video
Webinar

Splunk + EnCase: 3 Ways to Improve Operational Int...

In this critical webcast, learn how EnCase Endpoint Security can enhance the Splunk experience and how the combination of these powerful tools can close the gap between alert and response.
Video
Webinar

Where InfoGov Meets InfoSec: New Approaches to Dat...

It’s clear that advanced perimeter security tools like next-gen antivirus cannot provide 100% protection. Many organizations are now augmenting their perimeter tools with data-centric security solutions. We see Chief Privacy Officers working closer ...
Video
Webinar

2016 In Review: What 5 Significant Breaches Taught...

2016 was a busy year for security teams, with many notable compromise attempts, security incidents and data breaches. Executive teams and their senior management should understand what went right, what went wrong, and how to manage the risk before i...
Video
Webinar

Developing Your Protected-File Investigation Strat...

More and more criminals are trying to conceal their activities using passwords. When, as an investigator, you run into a password protected file your case progress can come to a grinding halt. To be effective you need to define your strategy for deal...
Video
Webinar

Mejores prácticas en Investigación Digital con EnC...

Reunimos las mejores prácticas y los pedidos más solicitados por los investigador en la versión más reciente de EnCase Forensic 8. Diseñado a partir de la retroalimentación de nuestra comunidad forense, en este seminario en línea aprenderá las mejor...
Video
Webinar

Guidance and Verizon Examine the 2016 DBIR: Taking...

Based on forensic evidence collected from 68 partner organizations as well as the Verizon caseload, the 2016 Verizon Data Breach Investigations Report (DBIR) presents a rare and comprehensive view into the world of corporate cybercrime. Now in its ni...
Video
Webinar

A Day in the Life of a SOC Analyst: Evolving Incid...

It’s not getting any easier to be a SOC analyst. With new attacks appearing daily and a significant skills gap, the existing approaches to validating alerts and handing those alerts off to the incident response team are neither particularly effective...
Video
Webinar

Security Cost Management: Dodge the Lightning or C...

Every organization worries about the rare, but high-impact breach that tarnishes corporate reputation and may even affect long-term business viability. But being ready when lightning strikes is only part of the challenge. Every day, going forward, or...
Video
Webinar

EnCase & Python – Extending Your Investigative Cap...

Digital investigations are constantly changing as new technologies are utilized to create, store or transfer vital data. Augmenting existing forensic platforms with innovative methods of acquiring, processing, reasoning about and providing actionable...
Video
Webinar

Actionable Intelligence from the 2015 Verizon DBIR

Get a rare and highly detailed view into the world of corporate cyber-attacks in this webinar featuring the director of the Verizon RISK team, Bryan Sartin
Video
Demo

T6u Introduction and Setup

This is a short informational video that covers the functionality and design of the Tableau T6u Forensic SAS Bridge. It also shows every item provided in the T6u product kit and walks through how to setup the T6u for use with step-by-step directions.
Video
Webinar

GPS Location Accuracy Triangulation vs Trilaterati...

Digital investigators are increasingly able to use GPS data in smartphones and pictures to uncover evidence and map the location of suspects and victims. However, gathering and understanding Exif data and other data can be difficult and time-consumin...
Video
Webinar

Fighting Cybercrime with EnCase and Cisco AMP Thre...

Phishing, fraud, child exploitation More crime is taking place in more digital places than ever before, and sometimes the digital devices are the weapons themselves. Along with the increase in digital crime and evidence has evolved the Trojan defense...
Video
Webinar

E-Discovery 201: Evidence Admissibility

Evidence is worthless if its not admissible. Just as with paper documents, the traditional rules of authentication, hearsay, and the best evidence rule apply to e-mail, social media, and other electronically stored information (ESI). In our one-hour ...
Video
Webinar

6 Keys to Conducting Effective Mobile Forensic Inv...

As smartphones get smarter, theyre used for all kinds of clever and sometimes nefarious purposeswhich means theyre increasingly the targets of digital investigations and will likely become even more critical in years to come. The investigation challe...
Video
Webinar

Enhancing Digital Investigations with Belkasoft

Cases like those of the Facebook and Craigslist killers show that evidence found in social-media artifacts can make a case for digital investigators. As the use of social media sites expands rapidly, so has the amount of potential evidence hidden wit...
Video
Webinar

The Internet Police

With nearly a decade of uncovering stories like the battle between HB Gary and Anonymous to the birth of digital forensic investigations, Ars Technica journalist Nate Anderson, author of The Internet Police, has a unique understanding of both the pas...
Video
Webinar

ESI in the Cloud: How to Collect, Preserve, Defend

The more data and emails and IP that our organizations push out to the cloud, the more critical our ability to defensibly search, collect, and preserve that electronically stored information (ESI) for e-discovery, compliance, and information governan...
Video
Webinar

Zero-Hour Response to a Data Breach

Someday you will get the call that no one wants to receive, notifying you that your perimeter has been breached and your data may have been compromised.
Video
Webinar

Conducting Remote Investigations with Tableau

When targets of digital data collections are located at a distance, conducting investigations gets more challenging. In most cases, the remote capability of EnCase Forensic lets IT perform collections from a central location, but time constraints, ba...
Video
Webinar

Increasing Functionality and Efficiency in EnCase ...

The EnScript scripting language has nearly unparalled power to customize and extend the functionality of EnCase to help you do better workfasterand the EnCase community has created over 120 EnScripts available in EnCase App Central to meet nearly eve...
Video
Webinar

Password Recovery and Decryption Techniques with P...

Join Guidance Software and partner Passware for solutions concerning how to detect and handle password-protected items in a digital investigation. Our webinar will illustrate: How cases go unsolved because evidence is protected with Truecrypt, B...
Video
Webinar

Using GREP Searches to Speed Investigations

One of the most underused tools in EnCase Version 7 is the GREP search. Learn powerful new GREP techniques in the second of two webinars featuring Suzanne Widup, president of the Digital Forensics Association and author of the recently released book,...
Video
Webinar

Earning Your EnCE

With digital forensic investigations on the rise, credentialed digital investigators are in demand. Prove your forensic expertise and boost your professional standing by earning the EnCase Certified Examiner (EnCE) certification. Watch Now: In this w...
Video
Webinar

Investigating Social Media with Belkasoft

Facebook, Snapchat, Instagram, and other social media play a major role in the lives of many persons of interest in criminal and civil cases. This means forensic investigators like you need faster ways to acquire potential evidence from the artifacts...
Video
Webinar

Using Image Analyzer with EnCase Forensic

Image Analyzer is well known to be a powerful tool for forensically analyzing large volumes of images for pornographic content. Join our webinar to see Image Analyzers Stephen Tye show how to use it with EnCase Forensic for faster investigations with...
Video
Webinar

Duplicators and Write-Blockers: Tableau Makes it E...

Forensic evangelist Jeff Hedlesky presents the very latest in forensic duplication and write-blocking technologies. Whether you are a Tableau user who wants to hear about the latest equipment available, or just looking for intel on the most advanced ...
Video
Webinar

EnCase® App Central: Highlighting the Best EnScrip...

EnCase Forensic investigators around the world are part of a thriving community that create case-cracking EnScripts and specialty appsall developed to make investigative teams more efficient at solving crimes. Until now, these apps and solutions have...
Video
Demo

T8u Introduction and Setup Video

This is a short informational video that covers the functionality and design of the Tableau T8u Forensic USB 3.0 Bridge. It also shows every item provided in the T8u product kit and walks through how to setup the T8u for use with step-by-step directi...
Video
Webinar

EnCase Forensic: Review Package

The EnCase Review Package is an easy way for forensic examiners to share their findings with detectives, D.A.s, field agents or anyone else interested in the case, providing visibility into the evidence to a wide range of people, allowing the examine...
Video
Demo

TD3 Forensic Imager: Introduction & Set Up

Not all forensic imaging solutions are created equal. Watch this video for a complete overview of the new and very unique Tableau TD3 Forensic Imager.
Video
Webinar

How to Catch an Insider Data Thief

A prominent health care provider hired me to determine if their employee had stolen their data. My attempts at forensics all failed: the suspect had
Video
Demo

Network Write Blocking with TD3

If your usage needs call for the use of a network based write blocker, you'll want to view this TD3 video.
Video
Demo

TD3 Graphical User Interface

This video features the TD3 Forensic Imagers intuitive, high-resolution, touch-screen user interface.
Video
Demo

T35u Forensic USB 3.0 SATA/IDE Bridge - Introducti...

This is a short informational video that covers the functionality and design of the Tableau T35u Forensic SATA/IDE Bridge.
Video
Webinar

Tableau Password Recovery - A Closer Look

Join us for an up-close look at Guidance Software’s new product, Tableau Password Recovery (TPR). In recent years, the highly publicized leaks of sensitive
Video
Demo

TD2u Informational and Setup

This is a short informational video that covers the design of the new Tableau TD2u Forensic Duplicator. It also shows every item provided in the TD2u product kit and walks through how to setup the TD2u with step-by-step directions.
Video
Webinar

Demystifying IOCs Unlocking the Secrets of Threats...

TTPs, OSINT STIX, TAXII… Indicators of compromise can seem to be a baffling alphabet soup of widely varying objects, data types, and specifications.
Video
Webinar

3 Data Trends Every Organization Needs To Know

The nature of Electronically Stored Information (ESI) is shifting and is constantly being redefined. New digital forces of information are requiring E-Discovery, Cybersecurity, and Information Management professionals to view information in exciting ...
Video
Product Video

EnCase Endpoint Security Overview

EnCase Endpoint Security Product Overview
Video
Video del producto

EnCase Endpoint Security Overview - Español

EnCase Endpoint Security Descripción del producto
Video
Vidéo sur le produit

EnCase Endpoint Security Overview - Français

EnCase Endpoint Security Présentation du produit
Video