Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

5/22/2012
07:18 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Guidance Software Launches Encas App Central

EnCase App Central is a new marketplace for digital investigation apps

LAS VEGAS, NV. - (May 22, 2012) – Guidance Software Inc. (NASDAQ:GUID), the World Leader in Digital Investigations™, today announced EnCase® App Central, a new marketplace for digital investigation apps along with a software development kit and other support for its developer network.

Click to Tweet: @EnCase Announces EnCase App Central, first online marketplace for digital investigation apps #CEIC2012

#EnCase #EnCaseAppCentral

Guidance Software chief executive officer Victor Limongelli made the announcement at the Computer Enterprise Investigation Conference (CEIC), being held through May 24th in Las Vegas.

EnCase App Central will include both free and paid EnScript® modules, which are applications that customize and automate functions in Guidance Software’s EnCase digital investigation software platform. Also available in the marketplace will be reporting templates, evidence processor templates and tools that help integrate EnCase with third-party applications.

Also at CEIC, Guidance Software Chief Technology Officer Shawn McCreight announced the EnCase SDK that enables software developers to update their existing EnScript modules or to build new ones for EnCase. With the EnCase SDK, developers can take advantage of improved memory performance, greater access to evidence and powerful new features such as tagging.

Developers who become members of EnCase App Central receive an EnCase developer license, the SDK and also get access to tech support and the ability to publish their resulting EnScript applications on EnCase App Central.

“EnCase App Central gives EnCase users, for the first time, one-stop shopping for the apps they need, and also gives EnCase software partners a new tool to market and monetize their work. It is a tremendous step forward for the EnCase ecosystem,” McCreight said. “Our mission right now is to tap into the creativity of our developer network for the best and most effective apps, so that the functionality available in EnCase App Central impresses our users when it opens in the fall.”

There are more than 40,000 EnCase users worldwide who can use EnScript modules to automate and augment the functionality of their EnCase software for more effective and streamlined forensic, e-discovery and cyber security investigations. The EnScript programming language has always been a key feature of EnCase, but until EnCase App Central, developers had no easy way to market and monetize their EnScript applications.

For more information, please visit:

EnCase App Central: http://www.guidancesoftware.com/appcentral

EnCase App Central Developer Network: http://www.guidancesoftware.com/appcentraldeveloper

About Guidance Software, Inc.

Guidance Software is recognized worldwide as the industry leader in digital investigative solutions. Its EnCase® platform, with more than 40,000 licenses distributed worldwide, provides the foundation for government, corporate and law enforcement organizations to conduct thorough, network-enabled, and court-validated computer investigations of any kind, such as responding to e-discovery requests, conducting internal investigations, responding to regulatory inquiries or performing data and compliance auditing - all while maintaining the integrity of the data. The EnCase Enterprise platform is used by numerous Federal Civilian and Defense agencies, more than 65 of the Fortune 100, and thousands attend Guidance Software's renowned training programs annually. For more information about Guidance Software, visit www.guidancesoftware.com.

EnCase®, EnScript®, FastBloc®, EnCE®, EnCEP®, CaseCentral®, CaseCentral eDiscovery Cloud® Guidance Software™ and Tableau™ are registered trademarks or trademarks owned by Guidance Software in the United States and other jurisdictions and may not be used without prior written permission. All other trademarks and copyrights referenced in this press release are the property of their respective owners.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
IoT Vendor Ubiquiti Suffers Data Breach
Dark Reading Staff 1/11/2021
The Data-Centric Path to Zero Trust
Altaz Valani, Director of Insights Research, Security Compass,  1/13/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7343
PUBLISHED: 2021-01-18
Missing Authorization vulnerability in McAfee Agent (MA) for Windows prior to 5.7.1 allows local users to block McAfee product updates by manipulating a directory used by MA for temporary files. The product would continue to function with out-of-date detection files.
CVE-2020-28476
PUBLISHED: 2021-01-18
All versions of package tornado are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configura...
CVE-2020-28473
PUBLISHED: 2021-01-18
The package bottle from 0 and before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with defa...
CVE-2021-25173
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory allocation with excessive size vulnerability exists when reading malformed DGN files, which allows attackers to cause a crash, potentially enabling denial of service (crash, exit, or restart).
CVE-2021-25174
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory corruption vulnerability exists when reading malformed DGN files. It can allow attackers to cause a crash, potentially enabling denial of service (Crash, Exit, or Restart).