Address enterprise risk, information security and digital investigation needs with industry-leading forensic-grade solutionsContact us
What are Enterprise Information Security solutions?
With cybercrime evolving rapidly, data security software is no longer optional. Privacy and risk management leaders know that cybersecurity solutions are essential to good information management and critical to protecting one of their business’s most valuable assets—their enterprise data.
The best enterprise information security solutions provide deep visibility into data security and investigate potential risk across all endpoints and devices as it emerges. They also allow for greater automation and contextualization of security events for faster triage, more informed decision-making, data loss prevention and effective remediation.
OpenText Security Suite overview
OpenText™ Security Suite, powered by OpenText™ EnCase™, provides 360-degree visibility across laptops, desktops and servers for proactive discovery of sensitive data, identification and remediation of threats and discreet, forensically-sound data collection and investigation.
With agents deployed on more than 40 million endpoints, clients that include 78 of the Fortune 100 and more than 6,600 EnCE™ certified users, Security Suite delivers the industry gold standard for incident response and digital investigations.
EnCase solutions help enterprises, government agencies and law enforcement address a range of needs around risk and compliance, file analytics, endpoint detection and response (EDR) and digital forensics with the most trusted digital forensics and cybersecurity software. Solving problems that often go undetected or unsolved on the endpoint, Security Suite restores the confidence of companies and their customers with unparalleled reliability and breadth of coverage.
Security Suite is augmented by OpenText Professional Services, providing consulting and implementation services, managed services and learning services for Security products.
Protect against threats
Don't fight today's threat with yesterday's strategies. Read the latest white paper by OpenText CEO & CTO Mark J. Barrenechea to learn how a Zero Trust approach to security helps safeguard information.Get the CEO white paper learn how a Zero Trust approach to security helps safeguard information
What's new in Security
Find needed evidence to get to the truth faster
Leverage cloud-enabled security, investigations and information assurance (eDiscovery)
Get new threat intelligence capabilities, such as file, IP and DNS
Collect data from Microsoft Teams and Slack
Deploy anomaly detection rules based on MITRE ATT&CK
OpenText Security features
Access data on Apple Computers with T2 Chip
Uses the EnCase Agent in EnCase Forensic and Endpoint Investigator to remotely preview and acquire data from Apple computers equipped with a T2 Security chip.
Available for EnCase eDiscovery, Forensic, and Endpoint Investigator, collect data from Microsoft OneDrive cloud and on-premise storage accounts for eDiscovery or digital forensic investigations.
Modernized web interface beta release
Provides a modern and intuitive user experience with functional, beta implementations of Legal Hold and Jobs workflow ready for customer validation.
Endpoint Security & Investigator integration
Unifies the incident response and forensic examination process with automated case creation in OpenText™ EnCase™ Endpoint Security. Streamlines triage process to bring the Investigator to the Security dashboard.
TX1 on secure 802.1X networks
Offers TX1 on networks locked down with 802.1X network access control policies. 802.1X support is required by some forensic labs, government agencies, and corporations.
OpenText Security benefits
Earlier threat detection and response
Detect elusive risks, threats and anomalous activity, exposing and addressing threats before they have a chance to harm the organization.
Expose data risks, no matter how well hidden, with the gold standard in digital investigations.
Align with the threat detection and response requirements of numerous regulations and mandates, such as PCI, HIPAA, PHI, and EU GDPR.
Complete, remote collection without disruption
Collect potentially relevant data from all sources efficiently and discreetly, with no impact on day-to-day business.
Spend more time investigating and less time analyzing data, with automatic processing and indexing functions.
Preserve collected evidence in the industry-standard EnCase Evidence File format, proven forensically-sound and accepted in courts worldwide.
How cybersecure are your edges?
A recent SANS survey shows 28 percent of respondents confirm that attackers had accessed endpoints. Learn why organizations struggle to observe or identify compromised computing assets that exist at the edge of IT infrastructures. Find out why endpoint detection and response are essential.Get the report learn why organizations struggle to observe or identify compromised computing assets
Security Suite products
OpenText™ EnCase™ Endpoint Security
Provides the deepest level of endpoint visibility to detect anomalous user and system activity, threat validation and intelligence and forensic-grade incident response. EnCase Endpoint Security is a truly integrated, best-of-breed EDR solution that positions organizations against the most advanced forms of attack at the endpoint.
OpenText™ EnCase™ Endpoint Investigator
Provides Digital Forensic Incident Responders (DFIR) and forensic investigators seamless, remote access to laptops, desktops and servers. The most powerful and easiest-to-use remote investigations solution available, EnCase Endpoint Investigator discreetly investigates all incidents, whether from external threats or internal actors, in a forensically-sound manner.
OpenText™ EnCase™ Forensic
Named the “Best Computer Forensic Solution” ten years straight by SC Magazine for its speed, flexibility and functionality, EnCase Forensic is the industry gold standard for scanning, searching, collecting and securing forensic data for internal investigations and law enforcement. Additionally, the EnCase evidence file format has been cited or mentioned in more than 100 court opinions.
OpenText™ EnCase™ Mobile Investigator
Augments the mobile acquisition capabilities of EnCase Forensic and Endpoint Investigator with the ability to intuitively view, analyze and report on mobile evidence. With mobile-first workflows, in-depth evidence analysis and flexible report generation, EnCase Mobile Investigator offers investigators confidence in their results.
OpenText™ EnCase™ Advanced Detection
Augments the forensic detection and response capabilities of EnCase Endpoint Security with comprehensive malware, active breach and insider threat detection coupled with end-to-end orchestration and automation capabilities. This agentless and cloud-based technology enables enterprise-wide threat assessments through a streamlined deployment with proven scalability and flexibility. Important alerts are passed to Endpoint Security to provide best-of-breed automated response capabilities.
OpenText™ Tableau Hardware
Includes duplicators, write-blockers, password recovery solution, adapters and accessories that are easy to use and deliver consistent results in any situation, giving investigators reliability and peace of mind when completing forensic investigations. Tableau offers reliable hardware solutions for forensic data acquisition that meet the needs of the digital forensic community worldwide and have been the tools of choice for well over a decade.
“To collect anything for forensic matters, cybersecurity matters, or e-discovery matters or investigations, it's always going to be OpenText EnCase. You know you're doing it right, and you know every court is signed off on it. You can go to bed and feel comfortable about that.”
Find out more
SANS Product Review—EnCase Endpoint Security 6
SANS Instructor Jake Williams (@malwarejake) reviews EnCase Endpoint Security 6, its features and how it performed under simulated attacks and investigations.Read the review Review EnCase Endpoint Security 6, its features and how it performed under simulated attacks
Navigating a Breach & Activating a Proven Incident Response Plan
The webinar provides valuable guidance on appropriate actions to take in the event of a data breach.Watch the webinar learn valuable guidance on appropriate actions to take in the event of a data breach
Champion effective information governance
Learn in this practical guide how to align security, compliance and privacy teams for compounded success.Download the white paper learn in this practical guide how to align security