Techno World Inc - The Best Technical Encyclopedia Online!

THE TECHNO CLUB [ TECHNOWORLDINC.COM ] => Techno News => Topic started by: RealWire on September 12, 2013, 07:30:10 PM



Title: Wick Hill Named Distributor For Guidance Software
Post by: RealWire on September 12, 2013, 07:30:10 PM
Channel solution for security risks from an increasingly mobile and data-heavy network environment

Woking, Surrey: 12th September 2013 - VAD Wick Hill announced today that it has been appointed distributor for US-based Guidance Software. Guidance Software is a world leader in digital forensics, with incident response, analytics, forensic and e-discovery products, which are already used by 65% of Fortune 100 companies. Wick Hill will introduce Guidance Software’s products to channel partners in the UK, as well as providing marketing, training and technical support.

Ian Kilpatrick, chairman Wick Hill Group, commented: “Guidance Software has a suite of solutions which are well proven and used by many leading companies and public bodies worldwide. They provide the channel with an answer to maintaining security in a network infrastructure which has more and more endpoints, rapidly increasing mobility and ever growing amounts of data.”

He added: “Guidance solutions provide exceptional visibility into endpoint activity across the network, as well as sophisticated forensic tools, which include the ability to preserve forensic evidence post-incident.”

Sam Maccherola,VP Sales EMEA/APAC for Guidance Software, commented: “Guidance Software chose Wick Hill because of its distinguished track record as a leading distributor specializing in IT security in the major markets we address. Wick Hill has a fresh, innovative business model that will help us expand our reach in the UK market. Working with Wick Hill, we will recruit, train and sell into its network of VARs.”

Wick Hill will sell the full suite of EnCase® solutions from Guidance Software, including EnCase® Analytics, EnCase® Cybersecurity and EnCase® Enterprise.

Guidance Software solutions
EnCase Analytics 
EnCase Analytics exposes hard-to-find risks and threats -

Security insights via complete endpoint visibility
Instead of trusting a compromised operating system, EnCase Analytics uses data from across all of an organisation’s endpoints from the kernel level. This results in a repository of the most reliable and useful data for insights into undetected risks and threats.
Proactive bird’s-eye view into security risks and threats
EnCase Analytics provides the ability to quickly visualise enterprise-wide endpoint data from multiple dimensions, regardless of how large or disparate the data sets may be.
Quickly derive insights from visual representations of data
EnCase Analytics exposes suspicious patterns, commonalities, and anomalies through an interactive visual interface, allowing for on-the-fly adjustments to zero-in on threats.
EnCase Cybersecurity
EnCase® Cybersecurity delivers visibility into endpoint activity across the network, when an organisation has been hacked, when advanced threats are suspected but not identified, or when it’s necessary to expose and remove sensitive data from unauthorised locations. It enables real-time response to alerts generated by detection solutions.

Exposes unknown or modified processes and errant PII or IP on endpoints,
Analyses endpoints to determine source and scope of an incident,
Assists in attack attribution
Minimises time to remediation
EnCase Enterprise

Forensic-level enterprise investigation
The power to search, collect, preserve and analyse vast amounts of data
Addresses issues such as intellectual property theft, employee fraud and employee policy violations
Respond more easily to compliance requests
The enormous costs, regulatory risks and business disruption associated with the traditional methods of forensic-level enterprise investigations, incident response and e-discovery can handicap companies of any size.

EnCase Enterprise provides organisations and government bodies with the ability to reduce exposure to risk by quickly and accurately addressing corporate policy violations such as intellectual property theft, employee fraud and employee policy violations.

It gives users the power to search, collect, preserve and analyse the vast amounts of data associated with doing business today. It can generate detailed reports on those findings, from a central location with minimal disruption to operations, no matter how large and complex the network environment. Organisations can also respond more easily to compliance requests.