Toll Free: 877-877-4224
Your cart

You have no items in your shopping cart.

The product quantity has been updated
Show cart


Gargoyle Investigator FLASH

Be the first to review this product


Availability: In stock



What is Gargoyle Investigator FLASH?

 Gargoyle Investigator™ FLASH is our tool designed to simplify your investigation, breach, and incident response activities. G-FLASH allows you to perform a rapid search for known contraband, hostile, or "bad" programs, lost or leaked corporate assets and allows you to retrieve significant information regarding activities, motives and intent of suspects or potential insiders.

 What is included in the package?

  • Delivered on a 2GB encrypted USB device
  • Multiple system and mobile scanning
  • 24/7 access to our customer support portal
  • One year of software maintenance and monthly updates of the malware datasets

System Requirements:


  • Microsoft Windows® 2000, Windows® XP, Windows® Vista, Windows®
  • 2003 Server, Windows® 7, Windows 2008 Server
  • 1 GB RAM
  • Pentium® 1 GHz processor or better
  • An available USB port


  •  Per USB Token


Is Gargoyle court approved?

Yes Gargoyle is court ready for criminal, civil or employee related actions, with the easy to read HTML time stamped reports that contain detailed results of discovery operations along with vital operational records for each scanned end-point. Click here to read our customer testimonials.

What is a dataset?

A dataset can be a collection of malware signatures, contraband signatures or signatures of lost or leaked corporate assets. Our signature set contains over 20 categories, including Botnets, Trojans, Steganography, Encryption, Keyloggers and many more. Today our standard datasets includes over 20,000 malicious threats.



Key Features:


  • Ability to conduct scans on a stand-alone system or network resource for known contraband and hostile programs
  • 20 datasets containing over 20,000 types of malicious software
  • Interoperable with popular forensic tools such as EnCase™
  • 32-Bit and 64-Bit drive mounting and management integration
  • Detailed forensic evidence reports with secure source timestamping, XML based, and customizable 
  • Timelining feature
  • Ability to scan within archive files (.zip, .rar, .jar, .bh, .arj. lha, .lzh, .tar, .war, .enc, .bz2)
  • Windows Vista, XP, 7 Support
  • Fibonacci driven discovery engine that delivers>200MB/sec performance on most platforms

Technical Specs





If you would like to request information on multiple products, please use the add to quote button located on each product page and submit by clicking the quote request link in the menu.


If you would like more information about this product, please contact us and a sales representative will get back to you within 48 hours.

Request Additional Information

* Required Fields