What is Gargoyle Investigator FLASH?
Gargoyle Investigator™ FLASH (G-FLASH) is our tool designed to simplify your investigation, breach, and incident response activities. G-FLASH allows you to perform a rapid search for known contraband, hostile, or "bad" programs, lost or leaked corporate assets and allows you to retrieve significant information regarding activities, motives and intent of suspects or potential insiders.
- Ability to conduct scans on a stand-alone system or network resource for known contraband and hostile programs
- 20 datasets containing over 20,000 types of malicious software
- Interoperable with popular forensic tools such as EnCase®
- 32-bit and 64-bit drive mounting and management integration
- Detailed forensic evidence reports with secure source timestamping, XML based, and customizable
- Timelining feature
- Ability to scan within archive files (.zip, .rar, .jar, .bh, .arj. lha, .lzh, .tar, .war, .enc, .bz2)
- Fibonacci driven discovery engine that delivers>200MB/sec performance on most platforms
What is included in the package?
- A 2GB encrypted USB device equipped with 256-bit AES Encryption
- Multiple system and mobile scanning
- 24/7 access to our customer support portal
- One year of software maintenance and monthly malware dataset updates
- Microsoft Windows® 2000, Windows® XP, Windows® Vista, Windows®
- 2003 Server, Windows® 7, Windows® 8, Windows 2008 Server
- 1 GB RAM
- Pentium® 1 GHz processor or better
- An available USB port
Is Gargoyle court approved?
Yes. Gargoyle is court ready for criminal, civil or employee related actions, with easy to read HTML time stamped reports that contain detailed results of discovery operations along with vital operational records for each scanned end-point. Click here to read our customer testimonials.
What is a dataset?
A dataset can be a collection of malware signatures, contraband signatures or signatures of lost or leaked corporate assets. Our signature set contains over 20 categories including Botnets, Trojans, Steganography, Encryption, Keyloggers and many more. Today our standard datasets includes over 20,000 malicious threats.