EnCase® Endpoint Security

Earlier Detection, Faster Decisions and Unprecedented Threat Response.


OpenText™ EnCase™ Advanced Detection

OpenText™ EnCase™ Endpoint Security add-on software

Augments the forensic detection and response capabilities of OpenText™ EnCase™ Endpoint Security by providing comprehensive malware, active breach, and insider threat detection coupled with end-to-end orchestration and automation capabilities. This agentless and cloud-based technology enables enterprise-wide threat assessments through a streamlined deployment with proven scalability and flexibility. Important alerts are passed to Endpoint Security to provide best-of-breed automated response capabilities.


OpenText EnCase Endpoint Security 6.06: Supports continuous monitoring with improved user experience

Advanced threat detection | Fearless Response | Continuous monitoring at scale

OpenText EnCase™ Endpoint Security 6.06 is now available with real-time continuous monitoring at scale for uninterrupted visibility into endpoints and their data for the largest and most demanding security environments. Also included is the ability to quarantine compromised endpoints – containing the threat to the source and preventing lateral spread. Paired with our unmatched response capabilities, these updates make Endpoint Security 6.06 the solution of choice for the savvy CISO’s across the globe.

The only 360° visibility into the endpoint


Security teams have been battling to stay ahead of the curve, but without deep and trusted visibility into your endpoints, we're expending more effort than reward. EnCase Endpoint Security enables you with:

Earlier Detection

Earlier Detection of elusive risks,threats and anomalous activity unique to your organization, reducing your mean-time-to-discovery.

Faster Decisions

With time-critical endpoint telemetry, you can validate or dismiss security events as they happen, eliminate the chance of missing that critical alert and ensure continual return from security investments.

Forensic-Grade Response

Single, flexible platform that delivers automated and on-demand response, simplifies workflow and readily returns your endpoints to a trusted state.


EnCase Endpoint Security is recognized by Gartner as the most widely used Endpoint Detection and Response Solution.

EnCase® Endpoint Security 6

Completely Redesigned. See What’s New.


the User Experience

A completely redesigned user interface that is deliberate and intended to enhance the security users’ end-to-end experience

Simplified workflows help security analysts and incident responders get started immediately with less training

Intuitive dashboards help quickly prioritize alerts and make evidence-based decisions to investigate or remediate threats

Request Demo

Raising the Bar with Detection & Response

Newly integrated threat intelligence instantly analyzes and responds to would-be threats

Conditional threat detection capabilities quickly identifies suspicious artifacts to verify potential intrusions

Real-time continuous monitoring of endpoint activities greatly improves security incident response

Provides deep visibility into almost every imaginable forensic artifacts on any given endpoint throughout your enterprise


Automation all day, Everyday

Enriched and contextualized endpoint data, reported as Threat Scores, allow users to quickly focus on suspicious activities without analyzing all telemetry

Process tree visualizations provide the means to quickly ascertain process relationships without the need for a deep dive

Distributed IOC searching and enhanced endpoint processing for faster performance and scalability

Create events, collect endpoint data, initiate scans, remediate, and more from third party security tools using open APIs

Product Video

Endpoint Detection and Response: How to be 1% Stro...

In this video, Guidance Software CEO Patrick Dennis explains the idea of continuous compromise, how we are witnessing the end of the traditional network perimeter, and why endpoint detection and response is critical to identify and respond to advance...

Ransomware: Petya/NotPetya Now, But What About Tom...

Ransomware like Petya/NotPetya and WannaCry is here to stay. Join us in this webcast to learn tips and tricks to rapidly detect and respond to advanced malware.

The 2017 Verizon DBIR: Stories, Strategies & Solut...

Guidance and Verizon examine the latest Data Breach Investigations Report. The DBIR offers critical intelligence on the tools, tactics and procedures used in the most recent wave of security attacks from 2016.

5 Things Your Board Needs to Know About Security

With the continued high profile nature of security, your Board of Directors is very interested in all things cyber. Thus you get called into the Board of Directors meeting to explain the exposure to your business, their personal exposure being Direct...
Product Video

What's New in EnCase Endpoint Security 6

EnCase Endpoint Security 6 has been completely redesigned to automate incident response and streamline security workflows.

Ready to Talk?

Let us answer your questions or schedule a demo.