Investigator™ Enterprise Module (GEM)
call for US Law Enforcement and Education discounts
enterprise wide collection of malicious code hashes on
multiple targets simultaneously
a single user license of Gargoyle Investigator™
datasets containing over 10,000 types of malicious
Creator™-create and build your own categories for
created datasets to search for known documents that
only you should have access to
with popular forensic tools such as EnCase™ and FTK™
enterprise discovery reports for each target suspected
MB free disk space
III 1 GHz processor
license with 10 scan option, additional scans of 25,
50 and 100 are available
is Gargoyle Investigator Enterprise Module (GEM)?
GEM allows customers to execute malware discovery across their
enterprise to root out malicious code infiltration and use. GEM
is simple to use, investigators can quickly target systems for
investigation, simultaneously launch the discovery agent and
perform remote malware discovery. Once identified, Gargoyle also
maps the detected files to the associated cyber weapons, and
classifies them into a category of malware. With the ability to
identify potentially hostile or suspicious programs based on the
loaded datasets, the classification of those hostile programs,
and the ability to view the suspect from a new aspect, while
ascertaining incriminating behaviors or methods; this becomes a
core tool for your investigation.
Gargoyle court approved?
Gargoyle has been taken to court and used for several cases.
With the easy to read HTML, timestamped reports, Gargoyle
provides detailed evidence that is court ready. Click
here to read our customer testimonials.
is included in the package?
Each scan option of GEM includes a copy of Gargoyle Investigator
Forensic Pro, the selected scan option, an enterprise license
and one year of free software maintenance.
many systems can I scan?
Depending on the size of your network, the GEM is available to
support simultaneous scans up to 100 computer systems. We offer
options of 10, 25, 50, and 100 simultaneous scans.
can be identified?
Gargoyle provides the investigator with the ability to glean
important suspect characteristics from the information revealed.
The suspect's sophistication, covert behaviors, and paranoia
levels (has the suspect tried to delete incriminating programs?)
can all be derived when searching for applications with a common
theme. These behaviors can assist in assessing suspect
capability, activities, intent, threat or "consciousness of
is a dataset?
A Dataset is simply a collection of malware applications and
files, organized into a relational database. The database is
formatted similarly to the NSRL distributions. One dataset
(database file) is created for each malware category.
datasets can be created for various classifications of malware
(i.e., encryption software, steganography software,
vulnerability assessment tools, network sniffers, port scanners,
hacker tools, password cracking tools, Denial of Service tools,
etc.). Many of these datasets are currently available within
Gargoyle. Additional Datasets updates are released about every
our current datasets
GEM 10 - $1995.00
GEM 25 - $2995.00
GEM 50 - $3995.00
GEM 100 - $7995.00