Have a security problem on a Linux system?
Respond with Second Look®. Preserve evidence in volatile memory. Uncover malware and other indicators of compromise.
Think your Linux systems are secure?
Verify with Second Look®. Gain unprecedented visibility into what's running on your systems.
Second Look®: The Linux Memory Forensics Solution
Second Look® is memory forensics software providing powerful, easy-to-use memory acquisition and analysis capabilities for Linux systems. These capabilities can be used to respond to and investigate computer security incidents as well as to ensure the security of Linux systems and detect intrusions. Our customers include the IT security teams of major corporations, firms which have investigated numerous high-profile security breaches, and government agencies responsible for protecting highly-sensitive data.
Whether your systems are fully stock, or highly customized, Second Look® can make sure they're running only expected and approved software, alerting you to any executable code in memory that is unknown, unauthorized, or maliciously modified. It supports all Linux distributions, including Red Hat Enterprise Linux (RHEL), Ubuntu, CentOS, Fedora, Debian, and more. Second Look® is available in two editions: Linux Incident Response and Linux Enterprise Security.