Know when you're owned.
Second Look combines memory forensics and integrity verification to provide unparalleled assurance that the software running on Linux servers and workstations, from the kernel to system services and applications, is of known origin and has not been modified. There is no more powerful tool for uncovering malware, backdoors, and other signs of compromise on Linux systems.
Our customers include the IT security teams of major corporations, firms which have investigated numerous high-profile security breaches, and government agencies responsible for protecting extraordinarily sensitive data. We support all Linux distributions, including CentOS, Debian, Fedora, Red Hat Enterprise Linux (RHEL), and Ubuntu.