X Online Chat
please wait
close window
Allen Corporation of America, Inc.

Cyber Security Technologies


Advanced Threat Identification™ (ATI-Preemptive Defense)

ATI allows the user to enable preemptive defense on McAfee ePO-Managed Assets. ATI efficently enforces unauthorized use policies and protects against security threats.

By leveraging the investment organizations have made in McAfee Total Protection for Endpoint, extending the one security agent and centralized management view provided by McAfee’s ePolicy Orchestrator (ePO), and utilizing the enforcement features of McAfee Host Intrusion Prevention (HIPS), ATI helps companies protect their critical assets and save time and money.

top product

Gargoyle Investigator™ Forensic Pro Edition

Gargoyle Forensic Pro

Gargoyle Investigator Forensic Pro Edition includes our most advanced malware detection software package and malware datasets for rapid, in-depth forensic investigations. It is designed for forensic analysts, forensic laboratories, law enforcement personnel, corporate investigation teams, and advanced private investigators.


Gargoyle Investigator™ Enterprise Module (GEM)

Gargoyle Enterprise

Gargoyle Investigator Enterprise Module (GEM) allows customers to execute malware discovery across their enterprise to root out malicious code infiltration and use. GEM is simple to use, investigators can quickly target systems for investigation, simultaneously launch the discovery agent and perform remote malware discovery. Once GEM identifies the suspect systems, Gargoyle Forensic Pro maps the detected files to the associated cyber weapons, and classifies them into a category of malware. With the ability to identify potentially hostile or suspicious programs based on the loaded datasets, the classification of those hostile programs, and the ability to view the suspect from a new aspect, while ascertaining incriminating behaviors or methods; this becomes a core tool for your investigation.




US-LATT provides investigators and first-responders with the ability to collect vital live evidence that is lost in pull-the-plug actions. How this technology works is simple. Insert the U3 USB into the suspect system, acquire the most volatile and stateful evidence then remove the token and walk away. All acquisition results are written to the U3 case directory.


Stego Suite™

Stego Suite

Stego Suite provides investigators with advanced steganography investigation capabilities. This suite includes four software tools; Stego Hunter, StegoWatch, StegoAnalyst and StegoBreak, allowing investigators to detect, analyze and in certain circumstances recover hidden information.


email Contact Cyber Security