Wick Hill appointed Guidance Software distributor

Wick Hill appointed distributor for Guidance Software - a world leader in digital forensics, cyber security and e-discovery.

  • Monday, 16th September 2013 Posted 11 years ago in by Phil Alsop

Maintaining security in a network infrastructure which has more and more endpoints, rapidly increasing mobility and ever growing amounts of data is a huge challenge for organisations. Incident response, analytics, forensics and e-discovery become ever more crucial.


Ian Kilpatrick, chairman Wick Hill Group, which has just been appointed distributor for digital forensics and cyber security products specialist Guidance Software, commented: “In an increasingly dispersed and data-heavy network, seeing the wood for the trees becomes more difficult. For threat visibility, organisations need a security solution which provides a total overview, is increasingly granular, and can integrate with the existing security investment.


“Post-incident, companies need to easily and cost-effectively carry out forensic investigations to uncover any intellectual property theft, employee fraud, and employee policy violations, and they need to preserve the evidence. Guidance Software has considerable expertise and products in both these areas.”


Guidance Software is a world leader in digital forensics, cyber security and e-discovery products, which are used by 65% of Fortune 100 companies.
Sam Maccherola,VP Sales EMEA/APAC for Guidance Software, commented:
“The risk and cost of data breaches has grown significantly for both the public and private sectors, and mitigating the risk of critical data loss or theft is a top priority. Wick Hill and its ecosystem of VARs understand that unlimited visibility at the end point is a critical factor in mitigating the risk of critical user and customer data.”


Wick Hill will sell the full suite of EnCase® products from Guidance Software, including EnCase® Analytics, EnCase® Cybersecurity and EnCase® Enterprise.
Guidance Software solutions
EnCase Analytics


EnCase Analytics exposes hard-to-find risks and threats -
· Security insights via complete endpoint visibility
Instead of trusting a compromised operating system, EnCase Analytics uses data from across all of an organisation’s endpoints from the kernel level. This results in a repository of the most reliable and useful data for insights into undetected risks and threats.
· Proactive bird’s-eye view into security risks and threats
EnCase Analytics provides the ability to quickly visualise enterprise-wide endpoint data from multiple dimensions, regardless of how large or disparate the data sets may be.
· Quickly derive insights from visual representations of data
EnCase Analytics exposes suspicious patterns, commonalities, and anomalies through an interactive visual interface, allowing for on-the-fly adjustments to zero-in on threats.


Encase Cybersecurity
EnCase® Cybersecurity delivers visibility into endpoint activity across the network when an organisation has been hacked, when advanced threats are suspected but not identified, or when it’s necessary to expose and remove sensitive data from unauthorised locations. It enables real-time response to alerts generated by detection solutions.
· Exposes unknown or modified processes and errant PII or IP on endpoints,
· Analyses endpoints to determine source and scope of an incident,
· Assists in attack attribution
· Minimises time to remediation


EnCase Enterprise
· Forensic-level enterprise investigation
· The power to search, collect, preserve and analyse vast amounts of data
· Addresses issues such as intellectual property theft, employee fraud and employee policy violations
· Respond more easily to compliance requests
The enormous costs, regulatory risks and business disruption associated with the traditional methods of forensic-level enterprise investigations, incident response and e-discovery can handicap companies of any size.
EnCase Enterprise gives organisations and government bodies the ability to reduce exposure to risk by quickly and accurately addressing corporate policy violations such as intellectual property theft, employee fraud and employee policy violations.
It gives users the power to search, collect, preserve and analyse the vast amounts of data associated with doing business today. It can generate detailed reports on those findings, from a central location with minimal disruption to operations, no matter how large and complex the network environment. Organisations can also respond more easily to compliance requests.