Unfortunately, our new website relies on browser features that are not available in older versions of Internet Explorer. As Microsoft has officially stopped supporting these browsers, we have chosen to do the same. Instead, we recommend that you upgrade Internet Explorer if you are running Windows 7, 8, or 10, or that you download a newer browser, like Mozilla Firefox or Google Chrome.

We at WetStone Technologies thank you for your interest and your patience.

About Us

At WetStone we develop software solutions that support investigators and analysts engaged in eCrime Investigation, eForensics and incident response activities. Our investigative software solutions focus on advanced tools and methods that support a wide range of investigator needs. Whether responding to an incident, performing audits or pen tests, mapping networks, discovering malicious code, time stamping digital evidence, exposing steganography usage or collecting evidence from live running systems, our solutions put high performance capabilities into the hands of our customers.

PHILOSOPHY:


Our philosophy is simple; we perform advanced research and development for our U.S. Government sponsors and rapidly transition the resulting core innovations into software products for our customers. An important byproduct of our research is the subject matter expertise that we gain. We leverage this expertise into advanced training programs that give our Defense, Law Enforcement and Commercial customers an advantage defending against cyber crime.

ALLEN CORPORATION OF AMERICA: 


In early 2007 WetStone was acquired by Allen Corporation of America with corporate headquarters located in Fairfax, VA. Employing more than 250 people throughout the United States, Allen is a dynamic, rapidly growing company that provides expertise in full information systems life cycle management.

SOFTWARE SOLUTIONS: 


Our investigative software solutions focus on advanced tools and methods that support a wide range of investigator needs. Whether responding to an incident, performing audits or pen tests, mapping networks, discovering malicious code, time stamping digital evidence, exposing steganography usage or collecting evidence from live running systems, our solutions put high performance capabilities into the hands of our customers.