EnCase
Transforming digital forensic investigations
In the modern landscape of digital forensics, investigators must navigate many challenges stemming from the exponential growth of digital data.
Getting to know your tools
OpenText™ EnCase™ Forensic software is one of the longest established digital forensic platforms on the market. It has been the primary tool of choice for…
Targeted DFIR evidence collections
During or after an incident, there may be a need for forensic analysis on the endpoints involved in a breach or compromise. This blog discusses…
Enabling collaboration in digital forensic investigations
A customer recently told me they could be at search warrants every day of the year and never make a dent in their case load. That’s…
Partnering with law enforcement to protect children
Forty one years ago this week, Adam John Walsh was abducted from a Florida department store and murdered at just six years old. As an outcome…
The superman of digital investigations
Meet the new and improved OpenText EnCase Forensic Recently, we’ve been talking about the evidence processing performance of OpenTextTM EnCaseTM Forensic and how it stacks…
Accelerating the pace of digital forensic investigations
Part two In a previous blog post, I shared some information that showed OpenTextTM EnCase Forensic processing evidence significantly faster – in this case 33%…
Putting OpenText EnCase Forensic to the test
They’re faster – fact or fiction? I was recently having a conversation with a customer at an industry forensics event. We were discussing what tools…
Introducing Bricata Network Detection & Response
Helping businesses and organizations keep operations in a trusted state In today’s digital world, enterprises and organizations of all sizes have one thing in common…
Top 5 benefits of endpoint security software
Virtually every organization today is facing a rapid increase in the number of endpoints connecting to their network. In addition to user devices – such…
Announcing OpenText Security & Protection Cloud CE 21.3
Headline-making events like SolarWinds, Colonial Pipeline, and JBS have exposed a major vulnerability for security teams – a lack of resources to effectively detect and…
Top 5 differences between information assurance vs. cybersecurity
There are many ways to help safeguard sensitive and confidential information within an enterprise. Amongst the most popular are information assurance and cybersecurity. Often these…
Announcing OpenText Security and Protection Cloud CE 21.1
Large-scale cyberattacks have recorded a 5-fold increase during the pandemic. The recent SolarWinds breach, potentially the first of many such attacks, is also among the…
Stay in the loop!
Get our most popular content delivered monthly to your inbox.