Welcome!

News Feed Item

EnCase and ThreatGRID Integration Provides Deep Insight and Context Into Today's Cyber Threats

ThreatGRID Malware Analysis and Intelligence for EnCase Reduces Time for Investigation and Response

NEW YORK, NY -- (Marketwired) -- 05/19/14 -- Guidance Software, Inc. (NASDAQ: GUID), the World Leader in Digital Investigations™, and ThreatGRID®, the first unified malware analysis and threat intelligence solution, announced an integration today to provide customers with unprecedented insight into malware and cyber threats not addressed by traditional anti-malware solutions. ThreatGRID is delivering a new app, Malware Analysis and Intelligence for EnCase, available to EnCase users on EnCase® App Central that reduces incident responder time and effort to identify and analyze suspected malware.

"ThreatGRID is excited to offer EnCase customers access to our groundbreaking integrated malware analysis and threat intelligence solution through our no cost app," said Dov Yoran, CEO and Co-Founder at ThreatGRID. "Powered by ThreatGRID's unmatched threat content with global and historical context, Guidance Software customers can now rapidly and securely analyze and respond to unknown threats, discovered on the estimated 20 million endpoints deploying EnCase® technology."

Guidance Software is the leading provider of digital investigations software and hardware products. Guidance Software's EnCase® products are used extensively by government, corporate and law enforcement authorities worldwide for security, forensic, and e-discovery investigations. Guidance Software's EnCase App Central is an online community and marketplace for digital investigators that provides access to apps, best practices, and community support. EnCase App Central includes both free and paid apps built using the EnScript programming language. Each app is vetted and tested by a technical team at Guidance Software before it is made available at EnCase App Central.

"ThreatGRID Malware Analysis and Intelligence for EnCase is a great addition to the App Central marketplace, building value for users of our EnCase security and forensic products," said Alex Andrianopoulos, Vice President, Marketing for Guidance Software. "With over 100 apps to choose from, EnCase customers have used EnCase App Central to download apps more than 28,000 times since we launched the site just over a year ago."

ThreatGRID's malware analysis and threat intelligence platform is the first malware analysis and intelligence integration with EnCase, lowering the costs and risks of network breaches through a more automated workflow. It rapidly identifies key behavioral indicators, providing fast and accurate threat content enriched with global and historical context. It provides five key analysis and threat intelligence features for EnCase Enterprise, EnCase® Cybersecurity and EnCase® Analytics, enabling swift identification and response to unknown threats on endpoints. ThreatGRID Malware Analysis and Intelligence for EnCase provides powerful search and analysis capabilities, one mouse click away:

  • Search Highlighted IP Address within ThreatGRID
  • Search Highlighted Domain within ThreatGRID
  • Search File Hash Value within ThreatGRID
  • Search Tagged File Hash Values within ThreatGRID
  • Upload File to ThreatGRID for Analysis

The integration uses ThreatGRID's API to connect to its cloud-based threat intelligence platform, all of which is transparent and private to the end user to ensure an efficient user experience in the familiar EnCase interface.

ThreatGRID will showcase its Malware Analysis and Intelligence for EnCase at the Computer and Enterprise Investigations Conference (CEIC) to be held at Caesars Palace in Las Vegas, May 19-22, 2014. CEIC is the industry's premier cybersecurity, e-discovery, and digital forensics conference. Attendees can view a live demo of the combined ThreatGRID and EnCase solution at ThreatGRID's booth #313 and at the CEIC EnCase® App Central World. Attendees can also register for the following labs conducted by ThreatGRID experts for hands-on experience with the solution:

  • May 21, 8 am: Building an Integrated Response Capability with EnCase Cybersecurity (Cybersecurity and Incident Response Labs)
  • May 21, 2:30 pm: EnCase Malware Analysis Powered by ThreatGRID (Advanced Digital Forensics Labs)

ThreatGRID and Guidance will also host a webinar, Threat Intelligence for EnCase, on June 4th, 2014.

ThreatGRID Malware Analysis and Intelligence for EnCase is available for download at no cost to Guidance Software's customers from the EnCase App Central store, including a 30-day pilot of the full ThreatGRID solution with free malware sample submissions and contextual searches of the threat intelligence repository.

About Guidance Software
Guidance Software is recognized worldwide as the industry leader in endpoint investigation solutions for security incident response and forensic analysis. Its EnCase® Enterprise platform, deployed on an estimated 20 million endpoints, is used by more than 65 percent of the Fortune 100 and more than 40 percent of the Fortune 500, and numerous government agencies, to conduct digital investigations of servers, laptops, desktops and mobile devices. Built on the EnCase Enterprise platform are market-leading cyber security and electronic discovery solutions, EnCase® Cybersecurity, EnCase® Analytics, and EnCase® eDiscovery. They empower organizations to conduct speedy and thorough security incident response, reveal previously hidden advanced persistent threats or malicious insider activity, perform sensitive data discovery for compliance purposes, and respond to litigation discovery requests. For more information about Guidance Software, visit www.encase.com.

EnCase®, EnScript®, FastBloc®, EnCE®, EnCEP®, Guidance Software™ and Tableau™ are registered trademarks or trademarks owned by Guidance Software in the United States and other jurisdictions and may not be used without prior written permission. All other trademarks and copyrights referenced in this press release are the property of their respective owners.

About ThreatGRID
ThreatGRID is the first unified malware analysis and threat intelligence solution that is revolutionizing how organizations use accurate and context-rich intelligence to defend against advanced cyber attacks. ThreatGRID customers include large organizations across a number of verticals such as financial services, government, healthcare, energy, manufacturing and more. ThreatGRID securely crowdsources large volumes of malware and performs advanced analysis in the cloud, to identify key behavioral indicators enabling near real-time remediation. ThreatGRID empowers security teams with continuous real-time threat intelligence, enriched by global and historical context, to prevent future attacks. ThreatGRID's API simplifies sample submission and intelligence integration with EnCase® Enterprise and other security products to maximize the effectiveness of existing investments. Founded by entrepreneurs with deep security expertise, ThreatGRID is privately held and is based in New York City. For more information, visit www.threatgrid.com, read our blog, follow us on Twitter @ThreatGRID and LinkedIn.

Guidance Software
Brigitte Engel
626-229-9191
Email Contact

ThreatGRID
Mike Spinney
781-672-3112
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
In his session at Cloud Expo, Alan Winters, an entertainment executive/TV producer turned serial entrepreneur, will present a success story of an entrepreneur who has both suffered through and benefited from offshore development across multiple businesses: The smart choice, or how to select the right offshore development partner Warning signs, or how to minimize chances of making the wrong choice Collaboration, or how to establish the most effective work processes Budget control, or how to m...
SYS-CON Events announced today that Juniper Networks (NYSE: JNPR), an industry leader in automated, scalable and secure networks, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Juniper Networks challenges the status quo with products, solutions and services that transform the economics of networking. The company co-innovates with customers and partners to deliver automated, scalable and secure network...
SYS-CON Events announced today that Interoute, owner-operator of one of Europe's largest networks and a global cloud services platform, has been named “Bronze Sponsor” of SYS-CON's 20th Cloud Expo, which will take place on June 6-8, 2017 at the Javits Center in New York, New York. Interoute is the owner-operator of one of Europe's largest networks and a global cloud services platform which encompasses 12 data centers, 14 virtual data centers and 31 colocation centers, with connections to 195 add...
SYS-CON Events announced today that SD Times | BZ Media has been named “Media Sponsor” of SYS-CON's 20th International Cloud Expo, which will take place on June 6–8, 2017, at the Javits Center in New York City, NY. BZ Media LLC is a high-tech media company that produces technical conferences and expositions, and publishes a magazine, newsletters and websites in the software development, SharePoint, mobile development and commercial UAV markets.
SYS-CON Events announced today that Cloudistics, an on-premises cloud computing company, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Cloudistics delivers a complete public cloud experience with composable on-premises infrastructures to medium and large enterprises. Its software-defined technology natively converges network, storage, compute, virtualization, and management into a ...
Historically, some banking activities such as trading have been relying heavily on analytics and cutting edge algorithmic tools. The coming of age of powerful data analytics solutions combined with the development of intelligent algorithms have created new opportunities for financial institutions. In his session at 20th Cloud Expo, Sebastien Meunier, Head of Digital for North America at Chappuis Halder & Co., will discuss how these tools can be leveraged to develop a lasting competitive advanta...
Building custom add-ons does not need to be limited to the ideas you see on a marketplace. In his session at 20th Cloud Expo, Sukhbir Dhillon, CEO and founder of Addteq, will go over some adventures they faced in developing integrations using Atlassian SDK and other technologies/platforms and how it has enabled development teams to experiment with newer paradigms like Serverless and newer features of Atlassian SDKs. In this presentation, you will be taken on a journey of Add-On and Integration ...
Now that the world has connected “things,” we need to build these devices as truly intelligent in order to create instantaneous and precise results. This means you have to do as much of the processing at the point of entry as you can: at the edge. The killer use cases for IoT are becoming manifest through AI engines on edge devices. An autonomous car has this dual edge/cloud analytics model, producing precise, real-time results. In his session at @ThingsExpo, John Crupi, Vice President and Eng...
There are 66 million network cameras capturing terabytes of data. How did factories in Japan improve physical security at the facilities and improve employee productivity? Edge Computing reduces possible kilobytes of data collected per second to only a few kilobytes of data transmitted to the public cloud every day. Data is aggregated and analyzed close to sensors so only intelligent results need to be transmitted to the cloud. Non-essential data is recycled to optimize storage.
"I think that everyone recognizes that for IoT to really realize its full potential and value that it is about creating ecosystems and marketplaces and that no single vendor is able to support what is required," explained Esmeralda Swartz, VP, Marketing Enterprise and Cloud at Ericsson, in this SYS-CON.tv interview at @ThingsExpo, held June 7-9, 2016, at the Javits Center in New York City, NY.
As businesses adopt functionalities in cloud computing, it’s imperative that IT operations consistently ensure cloud systems work correctly – all of the time, and to their best capabilities. In his session at @BigDataExpo, Bernd Harzog, CEO and founder of OpsDataStore, will present an industry answer to the common question, “Are you running IT operations as efficiently and as cost effectively as you need to?” He will expound on the industry issues he frequently came up against as an analyst, and...
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
Microservices are a very exciting architectural approach that many organizations are looking to as a way to accelerate innovation. Microservices promise to allow teams to move away from monolithic "ball of mud" systems, but the reality is that, in the vast majority of organizations, different projects and technologies will continue to be developed at different speeds. How to handle the dependencies between these disparate systems with different iteration cycles? Consider the "canoncial problem" ...
After more than five years of DevOps, definitions are evolving, boundaries are expanding, ‘unicorns’ are no longer rare, enterprises are on board, and pundits are moving on. Can we now look at an evolution of DevOps? Should we? Is the foundation of DevOps ‘done’, or is there still too much left to do? What is mature, and what is still missing? What does the next 5 years of DevOps look like? In this Power Panel at DevOps Summit, moderated by DevOps Summit Conference Chair Andi Mann, panelists l...
In their Live Hack” presentation at 17th Cloud Expo, Stephen Coty and Paul Fletcher, Chief Security Evangelists at Alert Logic, provided the audience with a chance to see a live demonstration of the common tools cyber attackers use to attack cloud and traditional IT systems. This “Live Hack” used open source attack tools that are free and available for download by anybody. Attendees learned where to find and how to operate these tools for the purpose of testing their own IT infrastructure. The...