EnCase Cybersecurity

EnCase Cybersecurity

EnCase Cybersecurity Product Image

With the explosion of the digital world, organizations store their data in electronic format – from source code, stock trade transactions, and confidential emails to credit card data, personally identifiable information (PII) and HR data. Guidance Software’s EnCase Cybersecurity is designed for the information security, network defense and incident response teams that are tasked with protecting this information, and identifying and responding to network threats.

EnCase Cybersecurity features profiling and whitelisting capabilities that allow organizations that have identified suspicious behavior to zero in on the offending malware, which is often designed to evade end-point and perimeter detection defenses. Once the malware is discovered, EnCase Cybersecurity can detect file similarities between suspicious executables, allowing an organization to expose other iterations of the threat as is often required when dealing with polymorphic malware. Once the malware is located, EnCase Cybersecurity also kills running processes, wipes malware artifacts from the disk and resets registry keys, allowing for full recovery without taking machines offline.

EnCase Cybersecurity complements and augments existing information security tools that aim either to block or quarantine data - such as firewalls, intrusion prevention systems, antivirus, or data loss prevention tools - or that trigger or correlate alerts, such as intrusion detection systems, configuration management, or SIM and SIEM tools.

 

 

Expand for more details on this Product

Locality Cloud - Troubleshooting Mobile Broadband Issues

Product From NETMOTION WIRELESS

NetMotion Wireless announced a cloud-based solution that gives enterprises the ability to quickly identify and troubleshoot the root cause of connectivity problems on cellular networks for their mobile workers, greatly enhancing user productivity, reducing costs, ensuring mobile applications work as intended, and reducing support time. Locality Cloud is the new hosted version of the industry’s first software to provide detailed visibility into and performance metrics for the mobile broadband networks that companies don’t own or control, something traditional network management solutions can’t do.

Get Info Now

Encryptics Data Rights Management (DRM)

Product From Encryptics

With Encryptics Data Rights Management (DRM), public safety departments can set permissions governing access to and usage of their critical data. DRM enables the data owner (an agency or an individual) to specify authorized recipients; prevent forward, copy, print, and save functions; set file expirations; and recall data anytime. Coupled with powerful data encryption technology, Encryptics DRM protects critical data even when it resides outside the direct jurisdiction of the department. 

Get Info Now

VERIPATROL Video Evidence Management Software

Product From VIEVU

 

VIEVU announced a major upgrade to VERIPATROL, its secure, encrypted video management system for the storage, retrieval and management of video evidence. New features include advanced video “lock down” for case sensitive evidence, enhanced user interface with mobile viewing, and the ability to provide certified courtroom ready audio transcripts direct from the software for ongoing cases/trials.

Get Info Now

SAFE for Mobile Solutions

Product From QUANTUM SECURE

Quantum Secure, the leading provider of enterprise software to streamline physical identity and access management across multiple sites and systems, developed SAFE for Mobile Solutions to improve productivity and increase satisfaction for the end user.

Get Info Now

SAFE Software Suite

Product From QUANTUM SECURE

Further simplifying and automating complex security operations, Quantum Secure announces enhancements to their SAFE Software Suite. A simpler, faster reporting engine provides security management with insights needed to make better business security decisions, while new out-of-the-box templates automate a wide range of security operations.

Get Info Now

Shadow 3

Product From VOOM Technologies Inc.

To access a suspect’s computer, traditional procedure involves removing the hard drive, creating a forensic image (a duplicate copy) and then analyzing that copy using sophisticated industry-specific software. 

Get Info Now

ESP Cyber Solutions for Public Safety

Product From TELECOMMUNICATION SYSTEMS (TCS) INC.

TeleCommunication Systems, Inc. (TCS) introduced ESP Cyber Solutions for Public Safety, a security and protection portfolio developed by TCS' team of cyber intelligence and public safety technology experts to meet the specific needs of public safety organizations and the best practices of the industry's NG-SEC security guidelines. TCS is both a major contractor for cybersecurity training of defense and military personnel, and a leader in wireless, VoIP and next generation 9-1-1(NG9-1-1) technology.

Get Info Now

SAIFE Sentry Encryption Software

Product From HANDHELD

Handheld announced a new offering from business partner, Ascent Rugged Mobile. The SAIFE Sentry combines Cummings Engineering’s SAIFE encryption software with Handheld’s Nautiz X1 ultra-rugged smartphone, for a tough and secure mobile solution.

Get Info Now

Evidence Library Express (ELX)

Product From WatchGuard Video

WatchGuard Video has announced the release of Evidence Library Express (ELX), an all new video management software program designed to enable an agency to deploy the WatchGuard 4RE HD In-Car Video System without investing in any server computers or wireless infrastructure. ELX is designed to be simple enough for anyone to install and run on modest PCs, so even agencies with no IT staff or IT support can easily begin using the industry’s leading High Definition video solution after purchasing just one WatchGuard 4RE HD In-Car Video System.

Get Info Now

mSENTRY Mobile Security & Deterrence

Product From JetProtect Corp.

mSENTRY uses ground radar to monitor large outdoor areas and track moving objects.  The tactical software, Cortex, correlates radar targets to geo-zones that can initiate actions like pointing high zoom cameras at the intruder.  When deployed with a 4G LTE radio,

Get Info Now