EnCase Enterprise For Corporations



Similar documents
EnCase ediscovery. Automatically search, identify, collect, preserve, and process electronically stored information across the network.

GUIDANCE SOFTWARE EnCase Portable. EnCase Portable. A Data Collection and Triage Solution that Anyone can Use

EnCase Portable. Extend Your Forensic Reach with Powerful Triage & Data Collection

EnCase Cybersecurity. Network-enabled Incident Response and Endpoint Data Control through Cyberforensics. GUIDANCE SOFTWARE EnCase Cybersecurity

EnCase Endpoint Security Product Overview

EnCase Cybersecurity In Action

EnCase Forensic Product Overview

Corporations Take Control of E-Discovery

AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN Siskiyou Boulevard Ashland OR 97520

Guidance Software Whitepaper. Point-of-Sale Systems Endpoint Malware Detection and Remediation

Sarbanes-Oxley Compliance for Cloud Applications

The World Leader in ediscovery & Digital Investigations. EnCase ediscovery

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

10 Building Blocks for Securing File Data

Stay ahead of insiderthreats with predictive,intelligent security

EnCase Analytics Product Overview

The Impact of HIPAA and HITECH

GUIDANCE SOFTWARE EnCase Cybersecurity Complement Guide. EnCase Cybersecurity. Complement Guide

Data Loss Prevention Program

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Information Security Incident Management Guidelines

How To Buy Nitro Security

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Security Incident Response Process. Category: Information Security and Privacy. The Commonwealth of Pennsylvania

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA

How To Implement Data Loss Prevention

RSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services

Compliance Management, made easy

CA Message Manager. Benefits. Overview. CA Advantage

IBM Unstructured Data Identification & Management An on ramp to reducing information costs and risk

Strengthen security with intelligent identity and access management

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

CORE Security and GLBA

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

Computer Forensics as an Integral Component of the Information Security Enterprise

Preemptive security solutions for healthcare

Supporting FISMA and NIST SP with Secure Managed File Transfer

IBM Unstructured Data Identification and Management

DATA BREACH COVERAGE

White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK. By James Christiansen, VP, Information Risk Management

Incident Response. Six Best Practices for Managing Cyber Breaches.

Best Practices in Contract Migration

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

10 Steps to Establishing an Effective Retention Policy

VENDOR MANAGEMENT. General Overview

Cloud Computing Questions to Ask

Standard: Information Security Incident Management

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

Reducing the cost and complexity of endpoint management

CA Technologies Healthcare security solutions:

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

AUTOMATED PENETRATION TESTING PRODUCTS

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

University of Colorado at Denver and Health Sciences Center HIPAA Policy. Policy: 9.2 Latest Revision: 04/17/2005 Security Incidents Page: 1 of 9

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

Credit Card (PCI) Security Incident Response Plan

Outbound Security and Content Compliance in Today s Enterprise, 2005

Real-Time Security for Active Directory

Integrated archiving: streamlining compliance and discovery through content and business process management

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

plantemoran.com What School Personnel Administrators Need to know

BEYOND THE HYPE: Understanding the Real Implications of the Amended Federal Rules of Civil Procedure. A Clearwell Systems White Paper

Privilege Gone Wild: The State of Privileged Account Management in 2015

Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER

Feature. Log Management: A Pragmatic Approach to PCI DSS

Case Study: Hiring a licensed Security Provider

IBM Tivoli Compliance Insight Manager

Privilege Gone Wild: The State of Privileged Account Management in 2015

SECURITY BEGINS AT THE ENDPOINT

SharePoint Governance & Security: Where to Start

AUTOMATED PENETRATION TESTING PRODUCTS

Transcription:

TM GUIDANCE SOFTWARE EnCASE ENTERPRISE EnCase Enterprise For Corporations An Enterprise Software Platform Allowing Complete Visibility Across your Network for Internal Investigations, Network Security, ediscovery and Policy Enforcement

GUIDANCE SOFTWARE EnCASE ENTERPRISE EnCase Enterprise saved us more than $1 Million in the first six months of its use. It also allowed us to complete a critical M&A discovery issue that would have been impossible with any other software or services options in the market today. - Ted Barlow, CSO & VP, Risk Management, McAfee, Inc. Explosive growth in the volume of electronic data stored on your organization s network coupled with the risks associated with malicious network activity and improper handling of private information such as credit card data has created the need to conduct discreet digital investigations over the network. The enormous costs, regulatory risks and business disruption associated with the traditional methods of forensic-level enterprise investigations, ediscovery and incident response can handicap corporations of any size. Armed with EnCase Enterprise, organizations and government entities have the capability to reduce exposure to risk by quickly and accurately addressing corporate policy violations such as intellectual property theft, employee fraud and employee policy violations. Organizations can also respond to regulatory data requests such as those required under Sarbanes-Oxley. EnCase Enterprise gives you the power to search, collect, preserve and analyze the vast amounts of data associated with doing business today and generate detailed reports on those findings all from a central location with minimal disruption no matter how large and complex the network environment might be. EnCase Enterprise also acts as a platform to establish a complete enterprise-wide investigative infrastructure by adding the capability to conduct audits for sensitive information such as personally identifiable information or intellectual property (EnCase Data Audit & Policy Enforcement) and respond to ediscovery requests in a method compliant with the Federal Rules of Civil Procedure (EnCase ediscovery). EnCase Enterprise provides a single platform to answer all your digital investigation and ediscovery needs COURT-VALIDATED EVIDENCE FILE NETWORK-ENABLED SCALABLE THE DEEPEST LEVEL OF FORENSIC ANALYSIS AVAILABLE DETAILED REPORTING AND ANALYSIS UNPARALLELED REMEDIATION CAPABILITIES

Here are some real world examples of EnCase Enterprise in action! Case Study #1: Corporate Fraud Investigation Recovery of previously deleted documents in investigation leads to terminations and criminal charges A large multinational corporation was accused of questionable financial reporting by the Securities and Exchange Commission, resulting in an investigation by a major independent consulting company. The goal of the investigation was to determine if the CFO had ordered his staff to alter or destroy transactions to help the company s financial position appear more favorable. EnCase Enterprise was used to perform an exhaustive search of all computer records within the company s large finance division. It was soon discovered that management had ordered staff to destroy key documents. However, some employees did not fully comply with the order, making the files easy to recover. The entire process occurred covertly, without impacting business operations or productivity. Enough information was recovered to reconstruct the actual events and prove that numerous high-level managers had schemed to alter the records of the company. The suspected staff members were terminated and criminal charges were brought against them. The company was left unscathed. Case Study #2: HR Investigation Investigation team uses EnCase Enterprise to verify reported allegations A large financial institution routinely uses EnCase Enterprise to investigate corporate computer usage policy violations. EnCase Enterprise is part of a process to discreetly investigate and verify allegations of computer usage policy violations, performance issues and other policy violations. On a case-by-case basis, Human Resources notifies the company s investigation team of reported allegations. Investigators then use EnCase Enterprise to investigate and analyze employee actions, which might include inappropriate material, email abuse, instant messaging and other non-business related activity. Only EnCase Software Can Do This: Ensure confidence in the defensibility of findings with court-validated evidence handling technology Scalable to cases from a few megabytes to petabytes of data Investigate individual or multiple machines running on Windows, Linux, Solaris or Mac OS X for sensitive information, unauthorized processes and network connections Investigate multiple machines with different operating systems simultaneously in a secure, consistent and forensically sound fashion EnCase software operates at the disk and memory levels, ensuring your investigation is not limited to what the OS is able to see Provide cutting-edge acquisition capabilities, including metadata preservation on individual files Create logical evidence files preserving only relevant data no need to capture the entire hard drive unless you wish to do so Capabilities map to GLBA 501b, Sarbanes-Oxley, SB1386, HIPPA and ISO27001 requirements EnCase Enterprise captures evidence, documents its findings and produces reports with supporting evidence that s submitted to relevant parties. This information is critical in proving or disproving the allegations against employees. The solution not only provides verifiable support of the allegations, but it enables the employee investigation process to be discreet and thorough, while minimizing the potential for any employee ill-will during investigations.

Add the Following to EnCase Enterprise, Completing Your Investigative Infrastructure... Reduce Costs and Gain Control of the ediscovery Process with EnCase ediscovery Save up to 90% in ediscovery costs Cull data at the point of collection, or capture the entire hard drive if you choose Eliminate your processing costs post collection processing and pushbutton load file creation enable automated export to major review platforms Automate the reporting and auditing of all collection and processing activities In one large case, we were able to cull 9.2 million documents to 600,000 for collection. On that case, we saved approximately $3 million in processing and attorney review costs. Senior Counsel, Halliburton EnCase ediscovery streamlines and automates critical elements of the ediscovery process, and includes automated export to review platforms Reduce the Risk of Data Leakage with EnCase Data Audit & Policy Enforcement Fully mitigate risk exposure the only scalable, targeted, & forensic-level search technology that can find & purge sensitive information from the endpoint without disrupting business A single passive agent for all your investigative needs implement data-at-rest DLP by leveraging the same agent utilized by all EnCase products Deliver accurate audits results of audits include summary metrics and the precise physical and logical coordinates of sensitive data Audits can Scale from small regional offices to the largest global networks by utilizing optimized distributed search technology from a central location Rely on the same technology that has been implemented by federal government agencies to proactively identify, recover or purge errant classified and sensitive data The non-disruptive element of EnCase minimized the financial, commercial and operational impact of the leaked IP, and accelerated succesful resolution of the incident. CEO and President, Global 100 Entertainment Firm

Can you respond immediately to ediscovery requests, security breaches, regulatory inquiries and suspicion of fraud or policy violations NO Without EnCase Technology... Inability to accurately identify fraud, HR violations and insider threat risks due to lack of centralized visibility across entire network Inability to quickly and effectively respond to and remediate network security breaches High costs associated with conducting manual investigations and ediscovery on-site resulting in lost productivity With EnCase Technology... Complete visibility across the network exposes operational risks and mitigates threats Automated response to security alerts starts an investigation and stops potential data loss or corruption Reduce costs and increase productivity by performing investigation and collection from a central location YE S!

TM www.guidancesoftware.com Our Customers Guidance Software s customers are corporations and government agencies in a wide variety of industries, such as financial and insurance services, technology, defense contracting, pharmaceutical, manufacturing and retail. Our EnCase customer base includes more than 100 of the Fortune 500 and over half of the 50, including: Allstate, Chevron, Ford, General Electric, Honeywell, Mattel, Northrop Grumman, Pfizer, UnitedHealth Group, Viacom and Wachovia. About Guidance Software (GUID) Guidance Software is recognized worldwide as the industry leader in digital investigative solutions. Its EnCase platform provides the foundation for government, corporate and law enforcement organizations to conduct thorough, network-enabled, and court-validated computer investigations of any kind, such as responding to ediscovery requests, conducting internal investigations, responding to regulatory inquiries or performing data and compliance auditing - all while maintaining the integrity of the data. There are more than 30,000 licensed users of the EnCase technology worldwide, and thousands attend Guidance Software s renowned training programs annually. Validated by numerous courts, corporate legal departments, government agencies and law enforcement organizations worldwide, EnCase has been honored with industry awards and recognition from eweek, SC Magazine, Network Computing, and the Socha-Gelbmann survey. For more information about Guidance Software, visit www.guidancesoftware.com. 2008 Guidance Software, Inc. All Rights Reserved. EnCase and Guidance Software are registered trademarks or trademarks owned by Guidance Software in the United States and other jurisdictions and may not be used without prior written permission. All other marks and brands may be claimed as the property of their respective owners. EE BR 9030 10001