WetStone Labs
Digital forensics & malware detection software for enterprises and law enforcement.

WetStone Labs
Digital forensics & malware detection software for enterprises and law enforcement.
The Entire Cybersecurity Market, One Prompt Away
Connect your AI assistant to 10,000+ tools and 5,000+ vendors. Ask anything about the cybersecurity market.
WetStone Labs Description
WetStone Labs (WetStone Technologies) is a cybersecurity and digital forensics software company with over 25 years of experience serving enterprises and law enforcement agencies. The company develops specialized software tools focused on malware detection, digital forensic investigation, and covert threat discovery. Their product portfolio includes several distinct suites. The Gargoyle Suite provides malware discovery and classification capabilities, enabling detection of malicious software and potentially unwanted programs (PUPs). It supports enterprise security operations as well as digital forensics and incident response (DFIR) teams. The suite includes Gargoyle MP and Gargoyle Enterprise Manager components. The Stego Suite addresses steganography-based threats by identifying digital images, video, audio, and text files that have been manipulated to conceal malware or exfiltrate sensitive data covertly. It is designed for both high-volume enterprise environments and forensic investigations. SecureDICOM is a specialized security product targeting the healthcare sector, providing malware detection, real-time threat identification, quarantine capabilities, and compliance validation specifically for DICOM medical imaging files — a gap not addressed by general-purpose antivirus tools. The TDIR (Threat Defense and Incident Response) Bundle offers a combined suite of tools for acquiring volatile data from suspect machines, conducting forensic investigations, and understanding the intent and sophistication of malicious actors during incident response. WetStone's solutions are used by both corporate enterprises and law enforcement for cybercrime investigations.
POPULAR
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox