{"id":1621,"date":"2013-05-20T00:00:00","date_gmt":"2013-05-20T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/20\/new-security-intelligence-solution-encase-analytics-unveiled-by-guidance-software\/"},"modified":"2021-12-30T11:39:42","modified_gmt":"2021-12-30T11:39:42","slug":"new-security-intelligence-solution-encase-analytics-unveiled-by-guidance-software","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/20\/new-security-intelligence-solution-encase-analytics-unveiled-by-guidance-software\/","title":{"rendered":"New Security Intelligence Solution, EnCase\u00ae Analytics, Unveiled by Guidance Software"},"content":{"rendered":"<p>&nbsp;&nbsp;Guidance Software (NASDAQ: GUID), the World Leader in Digital Investigations\u2122, today announced EnCase\u00ae Analytics, a complete security intelligence solution that leverages endpoint analytics to produce a clear picture of security risk and exposure to unknown threats. EnCase Analytics focuses on the endpoints (end-user devices and servers) \u2013 the targets of threats and where they ultimately hide \u2013 and assesses risks and threats with a bird\u2019s-eye view of the activity of every endpoint and server, enterprise-wide. \u201cFor those of us on the front-line responsible for catching new, hard-to-detect security threats that bypass the perimeter, time to detection is very important,\u201d said Colby Clark, director of Incident Management for FishNet Security. EnCase Analytics addresses this challenge by delivering a complete security intelligence solution that collects the appropriate data from the enterprise endpoints, assembles it in a security-oriented data structure, and through the use of pre-built and ad-hoc intuitive reports, provides the security analyst with deep insights into lurking threats.<\/p>\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cOne of the main goals of big data security analytics is to improve operations and accelerate incident detection\/response,\u201d said Jon Oltsik, senior principal analyst at the Enterprise Strategy Group. There is a need for solutions to easily discover changes in the system, trends and patterns, and other anomalous behavior that may expose signs of risks and threats.\u201d<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">With EnCase Analytics, we are leveraging this expertise to empower organizations to derive useful insights from the noise that endpoint data produces,\u201d said Victor Limongelli, chief executive officer, Guidance Software, Inc. \u201cUnlike other endpoint security solutions, EnCase Analytics does not rely on signatures, heuristics or indicators, but instead leverages big data analytics to draw useful connections between seemingly unrelated activities in disparate data types.\u201d EnCase Analytics leverages data from across all your endpoints from the kernel level instead of trusting a compromised operating system, resulting in a repository of the most reliable and useful data for insights into undetected risks and threats.<\/p>\n<p>\nLink: <a href=\"http:\/\/www.it-analysis.com\/technology\/security\/news_release.php?rel=38406\">http:\/\/www.it-analysis.com\/technology\/security\/news_release.php?rel=38406<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1621","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1621","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1621"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1621\/revisions"}],"predecessor-version":[{"id":4108,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1621\/revisions\/4108"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1621"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1621"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}