Our cybersecurity and digital forensic software company has been
protecting enterprises and assisting law enforcement for over two decades.

Slide 1
Find and identify threats

Detection and classification of malicious software and potentially unwanted programs (PUPs) with Gargoyle MP and Gargoyle Enterprise Manager.

Slide 2
Capture volatile data during a live investigation

Efficient and user-friendly digital evidence collection from live systems with US-LATT.

Slide 3
Discover hidden threats

StegoHunt MP and StegoEnterprise assist with the detection of steganography, using advanced algorithms and forensic methods to identify possible carriers of concealed information or malware, such as digital images and other file types.

Slide 3
Safeguard the integrity of DICOM files

SecureDICOM is designed to enhance the security of DICOM files, detecting potential threats, uncovering hidden data, and ensuring integrity of the file to the DICOM format.

previous arrowprevious arrow
next arrownext arrow
Shadow

IMAGING FORENSICS FOR HEALTHCARE

SecureDICOM

Enhanced Healthcare Security for DICOM Files

Ensuring the security and integrity of DICOM files has become a complex challenge that requires specialized attention. General antivirus tools lack the nuanced understanding needed to protect these complex medical imaging files. SecureDICOM fills this gap by offering a solution specifically designed for the demands of healthcare data security.

Are you aware of potential threats, including malware, to DICOM files, and do you have real-time detection and quarantine or other mitigation processes in place?

Do you have measures in place to validate the alignment of DICOM files with established standards, ensuring both compliance and data security?

Targeted protection for DICOM files.

25+

Years Experience

IMAGING FORENSICS

Stego Suite

Unmask Covert Threats Hidden in Digital Images

A powerful suite of software tools designed to combat covert threats hidden in seemingly benign digital images and files. Ideal for both high-volume enterprise environments and digital forensic investigations, it employs advanced algorithms and techniques to efficiently identify files that have been manipulated to hide malware or to stealthily exfiltrate information.

Did you know that seemingly innocent image, video, audio, and text files can covertly conceal sensitive business data, intellectual property, and personal data, effectively bypassing traditional security measures?

Did you know that malicious actors can infiltrate your enterprise by exploiting image-based malware?

MALWARE DISCOVERY AND CLASSIFICATION

Gargoyle Suite

Essential Tools for Proactive Cybersecurity and Efficient Digital Forensics

Proactive identification of malicious software and potentially unwanted programs (PUPs) is crucial in today’s digital landscape. Gargoyle Suite by WetStone Technologies provides the tools needed to detect these threats, support enterprise security, and enhance the efficiency of digital forensics and incident response teams.

For law enforcement personnel engaged in Child Sexual Abuse Material (CSAM) investigations, Gargoyle Suite also offers a specialized feature that enables rapid search and categorization of CSAM images, streamlining investigative processes. With Gargoyle Suite, bolster your security and accelerate your response to digital threats.

Do you have a system in place for conducting effective and regular security checks to detect potentially unwanted programs and malicious software?

Do you have an effective strategy for insider threat identification and management? Can your organization benefit from better insight into internal activities to fortify your defense against these internal risks?

Fast search of malicious applications

“…Gargoyle has proven to be an important contribution to the suite of digital forensics software.”

Gary C. Kessler, Director Program Dir.

Computer & Digital Forensics Champlain College

Rapid capture of digital evidence

COMPUTER FORENSICS

US-LATT

Simplifying for Digital Evidence Collection from Live Systems

Swift action is crucial when responding to digital security incidents, particularly when it comes to collecting volatile data from live systems. This data holds the key to uncovering critical evidence that can make a significant impact in investigations, whether related to cybercrime or corporate misconduct. However, without the appropriate tools, this fleeting information is at risk of being lost or altered when the system is shut down or rebooted. That’s where WetStone Technologies’ USB Live Acquisition and Triage Tool (US-LATT) is specifically developed to address this challenge, offering rapid and efficient acquisition of volatile evidence from live systems, even in the hands of non-technical personnel.

Do you struggle with acquiring volatile evidence from live systems efficiently and effectively?

Do you want to reduce the burden on your specialized DFIR team by enabling other personnel to participate in evidence collection?

WetStone Forensic Software

Delivering Insight and Efficiency
to Cyber Crime Investigations

News

From Our Library

Some of our satisfied clients