Wednesday, September 26, 2007

Encase Enterprise by Guidance Software

Encase Enterprise is an investigation system, created by Guidance Software Inc., that allows for complete network visibility, a response that is both comprehensive and immediate, and a forensic-level analyzing tool of workstations and systems anywhere in a given network in real-time. In short, the Encase system is the ultimate spy-ware. A usual infrastructure of network security includes an astounding collection of acronyms, including IDS (intrusion detection system), SIM (security information management) and CMS (central monitoring system), among others. These tools continuously examine data in a company’s network and detect suspicious patterns, events and keywords and then log any possible threats. The technology also has the capacity to analyze the data so only significant information goes on to further investigation processes done by hired security intelligence.

The Encase software has the capability to observe traffic inflow and outflow on any device hooked up to a particular network. This means that it has access to email, documents, music, phone calls, data and more. Can you guess the controversy that might surround this technology is yet? The reality is that companies have the right to this information. As long as an employee is using a device of their employer’s property, the company may rummage around as much as they wish. And this doesn’t just apply to PCs. If you are using a company cell phone, laptop, or even connecting an Ipod to a company device, your every move can be traced as long as you are doing it on your company’s VPN (Virtual Private Network). Of course, if you aren’t doing anything wrong, you should have nothing to worry about.
The system’s main objective is to assist many large companies, such as Halliburton and Price Waterhouse Coopers, in detecting and preventing external threats as well as internal threats, which are actually most likely and dangerous. To examine exactly what impacts this technology can have, I will compare the pros and cons of the system.

Pros:
• More efficient than having hired help try and keep track of network inflow and outflow
• Allows companies to see insiders who pose potential threat
• Allows companies to track external threats
• Although initially expensive, the benefits can be vast
• Done in real-time as the event are happening, therefore threats are dealt with immediately
• Cuts out redundant information
• Can help businesses track slacking employees and in turn save the company money
• Can deter bad behavior if employee know they are being watched
• Can simultaneously scan large amounts of data, this would take much more time if done manually


Cons:
• Since there is no such thing as an unreasonable search, the line between personal and privacy to many, may be crossed
• If employees feel like there is a lack of trust between themselves and their employers, they may be less efficient in their job
• Initial cost of software is expensive and not something that most small businesses could afford
• Spiteful co-workers may set you up as the submitter of questionable material
• If the software information falls into the wrong hands it can cause a lot of trouble, the people who have access to the software information must be very trustworthy
• No technology is absolutely perfect, if the system slips, it can have great costs to companies

Work Cited:
1. (2007). Guidance Software. Retrieved September 26, 2007, from FDR Forensic Data Recovery Inc. Web site: http://www.forensicdata.ca/pages/product_template.php?p_id=75&par_id=1
2. (2002-2007). Coporate Security. Retrieved October 2, 2007, from Guidance Software Web site: http://guidancesoftware.com/corp_sec/index.aspx
3. Derene, Glenn (2007, September 20). Is Your Boss Spying on You?. Retrieved October 2, 2007, from Popular Mechanics Web site: http://popularmechanics.com/technology/industry/4223564.html?page=1

No comments: