Digital Investigations and Forensics

OpenText EnCase Endpoint Security

Detect, analyze, triage and respond to malicious attacks with complete endpoint visibility

of detections are made in real-time with EnCase Endpoint Security[1]


See how EnCase Endpoint Security provides accurate, real-time threat detection

OpenText™ EnCase™ Endpoint Security, a leading endpoint detection and response (EDR) solution, empowers security analysts to quickly detect, validate, analyze, triage and respond to incidents. EnCase Endpoint Security comprehensively tackles the most advanced endpoint attacks, whether from internal or external threats.

Why choose OpenText EnCase Endpoint Security?

  • Comprehensive detection and recovery

    Instantly detect and take action against threats with the most comprehensive, context-driven response and recovery.

  • Industry-leading endpoint visibility

    Comprehensively detect advanced malware, insider activity and other threats across hybrid and remote workforces.

  • Powerful flexibility and configuration

    Easily adapt and customize detection rules and stay ahead of the latest tactics, techniques and procedures (TTPs).

How EnCase Endpoint Security can benefit your business

Discover the advantages of using EnCase Endpoint Security

  • Boost threat detection

    Confidently detect the latest threats with regularly updated, pre-filtered detection rules based on the MITRE ATT&CK™ framework.

  • Quickly identify root causes

    Create event timelines and use other threat-hunting capabilities to drive root-cause analysis and fully understand the extent and nature of any compromise.

  • Empower response teams

    Accelerate incident-response teams’ ability to validate, assess and remediate malicious activity, reducing triage time by up to 90 percent.

  • Rely on a proven endpoint agent

    Maximize visibility and support for the broadest range of operating systems to gain insights regardless of the underlying OS.


  • Continuous endpoint monitoring

    Uncovers cyber threats enterprise-wide with real-time, behavior-based detections, inspired by industry-leading frameworks, such as MITRE ATT&CK.

  • Orchestrated workflows and operations

    Integrates with third-party security solutions through open, documented RESTful APIs to optimize security operations and automate workflows.

  • Integrated threat intelligence

    Automatically prioritizes alerts by severity, leveraging BrightCloud® Threat Intelligence to complete file and IP reputation analyses and display results in a single view.

  • Powerful remediation

    Enables users to wipe malicious files, kill processes, reset Registry keys and isolate affected endpoints while allowing response activities to continue.

  • Advanced agent anti-tampering

    Deploys the latest anti-tampering capabilities to defend against malicious attacks and prevent agents from being disabled or otherwise manipulated.

Take advantage of OpenText and partner services


OpenText offers deployment choice and flexibility for EnCase Endpoint Security.

Professional Services

OpenText Consulting Services combines end-to-end solution implementation with comprehensive technology services to help improve systems.


OpenText helps customers find the right solution, the right support and the right outcome.


Comprehensive enablement and learning programs to accelerate knowledge and skills.


Explore our OpenText communities. Connect with individuals and companies to get insight and support. Get involved in the discussion.

Leaders trust OpenText

See how customers are succeeding with EnCase Endpoint Security

See more success stories

Banner Health transforms information discovery and security with OpenText EnCase solutions

Learn more

EnCase Endpoint Security resources

MITRE Endpoint Security Testing: Interpreting Results

Read the position paper

The Importance of Digital Forensics for Effective Enterprise Incident Response

Read the position paper

Triage Malicious Endpoint Activity

Watch the demo

Incident Response Automation

Watch the video

Detection & Response to Unauthorized Devices

Watch the video

Data collection as a force for overcoming supply chain challenges

Watch the video

In Search Of Log4J

Watch the video

Maintaining heightened cyber safety during uncertain times

Read the blog

Enabling collaboration in digital forensic investigations

Read the blog

What’s new in OpenText EnCase Endpoint Investigator

Read the blog



  1. [1] MITRE Engenuity, ATT&CK Evaluation Round 3, April 2021