EnCase Endpoint Security Product Overview



Similar documents
SECURITY BEGINS AT THE ENDPOINT

EnCase Analytics Product Overview

Guidance Software Whitepaper. Best Practices for Integration and Automation of Incident Response using EnCase Cybersecurity

Guidance Software Whitepaper. Point-of-Sale Systems Endpoint Malware Detection and Remediation

Corporations Take Control of E-Discovery

Guidance Software Whitepaper. Best Practices for Integration and Incident Response Automation Using EnCase Endpoint Security

EnCase Cybersecurity. Network-enabled Incident Response and Endpoint Data Control through Cyberforensics. GUIDANCE SOFTWARE EnCase Cybersecurity

EnCase Forensic Product Overview

Whitepaper BEST PRACTICES FOR INTEGRATION AND AUTOMATION OF INCIDENT RESPONSE USING ENCASE ENDPOINT SECURITY

EnCase Enterprise For Corporations

IBM QRadar Security Intelligence April 2013

Whitepaper MANAGING INSIDER THREATS THROUGH ENDPOINT DETECTION AND RESPONSE

SANS Top 20 Critical Controls for Effective Cyber Defense

Cisco Cyber Threat Defense - Visibility and Network Prevention

EnCase Cybersecurity In Action

EnCase Portable. Extend Your Forensic Reach with Powerful Triage & Data Collection

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Advanced Threat Protection with Dell SecureWorks Security Services

IBM Security Intelligence Strategy

Carbon Black and Palo Alto Networks

Guidance Software Training

Under the Hood of the IBM Threat Protection System

GUIDANCE SOFTWARE EnCase Portable. EnCase Portable. A Data Collection and Triage Solution that Anyone can Use

IBM SECURITY QRADAR INCIDENT FORENSICS

QRadar SIEM and FireEye MPS Integration

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

End-user Security Analytics Strengthens Protection with ArcSight

CyberArk Privileged Threat Analytics. Solution Brief

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

GUIDANCE SOFTWARE EnCase Cybersecurity Complement Guide. EnCase Cybersecurity. Complement Guide

The webinar will begin shortly

How To Monitor Your Entire It Environment

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

IBM Security re-defines enterprise endpoint protection against advanced malware

Strengthen security with intelligent identity and access management

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Protecting against cyber threats and security breaches

How To Create An Insight Analysis For Cyber Security

Endpoint Security for DeltaV Systems

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

IBM Global Technology Services Preemptive security products and services

Stay ahead of insiderthreats with predictive,intelligent security

Advanced Threats: The New World Order

IBM Security QRadar Risk Manager

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Win the race against time to stay ahead of cybercriminals

How To Buy Nitro Security

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

EnCase ediscovery. Automatically search, identify, collect, preserve, and process electronically stored information across the network.

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Boosting enterprise security with integrated log management

The Symantec Approach to Defeating Advanced Threats

Cisco Advanced Malware Protection

Integrating MSS, SEP and NGFW to catch targeted APTs

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Requirements When Considering a Next- Generation Firewall

IBM Security QRadar Risk Manager

Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

IBM Security IBM Corporation IBM Corporation

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

Security Intelligence Services.

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Leverage security intelligence for retail organizations

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Endpoint Threat Detection without the Pain

Combating a new generation of cybercriminal with in-depth security monitoring

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

Cisco Advanced Malware Protection for Endpoints

Using LYNXeon with NetFlow to Complete Your Cyber Security Picture

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Cisco Advanced Malware Protection for Endpoints

IBM Internet Security Systems products and services

Breaking down silos of protection: An integrated approach to managing application security

AMPLIFYING SECURITY INTELLIGENCE

Endpoint Security: Moving Beyond AV

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Incident Response. Six Best Practices for Managing Cyber Breaches.

CAS8489 Delivering Security as a Service (SIEMaaS) November 2014

Security Analytics for Smart Grid

Reducing the cost and complexity of endpoint management

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

The Benefits of an Integrated Approach to Security in the Cloud

North American Electric Reliability Corporation (NERC) Cyber Security Standard

IBM Security QRadar Vulnerability Manager

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

Securing Remote Vendor Access with Privileged Account Security

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Unified Security, ATP and more

INFORMATION PROTECTED

Transcription:

GUIDANCE SOFTWARE EnCase Endpoint Security EnCase Endpoint Security Product Overview Detect Sooner. Respond Faster. Recover Effectively.

GUIDANCE SOFTWARE EnCase Endpoint Security EnCase Endpoint Security In 2008, Guidance Software released its first endpoint security solution, leveraging the enterprise-proven EnCase platform to gain full access to the endpoint and help security teams like yours automatically or manually collect, validate, triage, investigate, and remediate all instances of a threat. EnCase Analytics followed in 2013, taking the knowledge gathered from years of automated incident response to provide the ability to detect unknown threats and anomalous behavior from one of the most under-utilized intelligence sources available, your organizational endpoints. Encase Endpoint Security is the evolution of the two market leading solutions, EnCase Analytics and EnCase Cybersecurity, to help security teams proactively address the gaps in their security framework, detect unknown risks or threats, respond to any events for validation, and recover endpoints to a trusted state through remediation all without the administrative and process overhead of managing two disparate solutions. Recently Gartner named Guidance Software the estimated 2013 market share leader for Endpoint Detection and Response (EDR) tools in their recent Competitive Landscape Report. What is an Endpoint? = Any machine on a network with the following operating systems: Microsoft Windows Apple Mac Linux IBM AIX SUN Solaris HP UX Novel Netware Any physical or virtual computer on a network: Servers Desktops or Workstations Laptops Any supported computer-based technology: Printers Automated Teller Machines (ATMs Point of Sales Terminals Ticketing Machines Industrial Control Systems (ICS) Computer Integrated Manufacturing (CIM) Complete Your Security Strategy with EnCase Endpoint Security Organizations have traditionally invested a large percentage of security budget in perimeter technology designed to identify and prevent the infiltration of the known bad. Despite the revenue allocated, the number of successful breaches has continually risen. The time to discovery and resolution of enterprise threats is still in the region of months while the attackers can gain access to your business systems in mere hours. Within your enterprise you have literally billions of data points, artifacts that can be used to understand your current security posture, your potential gaps, and the hidden threats lurking unseen due to the lack of visibility. EnCase Endpoint Security enables that visibility, collecting snapshots of data (smaller than a web page in size) to provide your security team with the ability to see into the fray and extract meaningful security intelligence from the endpoints where data ultimately resides, and is the target or vehicle of every attack.

0001 10 0111 000 001101 0 1101010 Not only does EnCase Endpoint Security let you proactively hunt unknown threats unique to your organization it also lets you respond if a genuine breach is identified, empowering your security team to identify, investigate, validate and eradicate those bad actors. Employing EnCase Endpoint Security while planning, implementing or optimizing a security strategy will provide your organization with the ability to understand your security posture, target security gaps, detect unknown threats and respond to any alert regardless of your current approach. Assess 2 Recover 4 Detect 1 Respond 3 Detect To gain insights into unknown threats, most security intelligence tools in the market focus on structured data such as log files or network packets. However, simply analyzing these data points from select systems or egress points is not sufficient to identify gaps within your security posture or detect the anomalous behavior of the emerging breed of threats. You need visibility into endpoints to get to the heart of the threats. EnCase Endpoint Security changes the security workflow from waiting for an alert to threat hunting, or proactively correlating endpoint data for anomalies indicative of a breach. In addition, EnCase Analytics can also identify gaps in your current security strategy, giving you a means of validating your security policies are being enforced and exposing areas not covered by existing controls or technology. EnCase Endpoint Security leverages the proven EnCase endpoint collection capability, adding security intelligence which exposes risk and threats that evade traditional detection technology. It provides a bird s-eye view of your endpoint risk through an interactive visual interface, so you can look for anomalous behavior in the system and quickly expose signs of intrusion. Key Features Ongoing and on-demand data collection from enterprise-wide endpoints Instant visualization of endpoint data and activities, no data scientists required Extensible architecture that allows for self-built applications and customization Integration with third-party data sources such as whitelists or threat intelligence Report-sharing & exporting as images, PDFs, or spreadsheet files

Respond Sensitive data is what drives your business, making loss of that data one of the largest risks your organization faces today. Adding to this vulnerability are the rising frequency of attacks, growing costs of remediation, and lengthening timeto-response. Key Features Increase overall efficiency of security tools that create alerts through integration and automated response scenarios Limited visibility into both the targets of attacks as well as where and how sensitive data is stored only compounds the problem. The warranted and needed investment in perimeter technology to solve the infiltration of the known bad has also created a resounding number of security alerts coming from those technologies. The proliferation of these tools along with the alerts they generate and the fact that actionable data related to the incident can decay in minutes or even seconds, further complicates the incident response challenge. EnCase Endpoint Security helps you implement both a rapid-response process and a sensitive data discovery plan that complement and extend your current security technologies. Leveraging the resources you already have and requiring no additional staff. Identify false positive and validate alerts detected by other security technologies Shorten response times by getting context to triage threats at the point of the alert and expand searches to identify the total impact to the organization Prioritize response based on incident scope as well as data and systems at risk Proactively and reactively run scans to find sensitive intellectual property (IP), personally identifiable information (PII), and classified or sensitive data, exposing systems that present a risk Web-based reporting offers a convenient way to swiftly review, act on, and present findings for small and large security teams Documented chain of custody lets you supply evidence of illicit activity on endpoints during prosecution Forensic detail of every endpoint for deep investigations and incident response

Benefits of EnCase Endpoint Security Baseline all endpoint activity and maintain a historical record Recover Once malware or a risk of sensitive data is exposed and identified, EnCase Endpoint Security lets you take definitive action and remove any reliance on traditional remediation processes like wiping and reimaging, which mean system downtime, loss of productivity and may incur potential data and revenue loss. Identify gaps in security policies and frameworks Detect previously unseen process threats Identify anomalous user activity Search for known potential threats Reduce risk by limiting sensitive data Prioritize and triage legitimate alerts Validate and remove false positive alerts Forensically investigate high priority events Key Features Kill running malware, morphed instances and related processes Forensically wipe malicious files and hard-disk artifacts to halt the spread of the threat Remotely delete sensitive data files from unauthorized locations Ensure deleted artifacts cannot be reconstituted Maintain uptime and productivity of infected systems during remediation Perform incident response at global scale Incorporate custom scripts and programs into one central platform Securely remediate bad actors or errant sensitive data Automation & Integration Partners More Information HP ArcSight ESM HP ArcSight Express FireEye NX Cisco Sourcefire NGIPS Cisco ThreatGrid IBM QRadar Blue Coat Security Analytics Palo Alto Networks WildFire and more Further information, whitepapers and webinars on Threat Detection and Incident Response available at www.guidancesoftware.com

www.guidancesoftware.com Our Customers Guidance Software s customers are corporations and government agencies in a wide variety of industries, such as financial and insurance services, technology, defense contracting, pharmaceutical, manufacturing and retail. Representative customers include Allstate, Chevron, FBI, Ford, General Electric, Honeywell, NATO, Northrop Grumman, Pfizer, SEC, UnitedHealth Group and Viacom. About Guidance Software (NASDAQ: GUID) Guidance Software is recognized worldwide as the industry leader in digital investigative solutions. Its EnCase Enterprise platform is used by numerous government agencies, more than 71 percent of the Fortune 100, and more than 47 percent of the Fortune 500, to conduct digital investigations of servers, laptops, desktops and mobile devices. Built on the EnCase Enterprise platform are market-leading electronic discovery and cyber security solutions, EnCase ediscovery, EnCase Endpoint Security, which empower organizations to respond to litigation discovery requests, perform sensitive data discovery for compliance purposes, conduct speedy and thorough security incident response, and reveal previously hidden advanced persistent threats or malicious insider activity. For more information about Guidance Software, visit www.guidancesoftware.com. EnCase, EnScript, FastBloc, EnCE, EnCEP, Guidance Software and Tableau are registered trademarks or trademarks owned by Guidance Software in the United States and other jurisdictions and may not be used without prior written permission. All other trademarks and copyrights referenced in this press release are the property of their respective owners.