Second Look®: Advanced Linux Threat Detection
Combating modern cyber adversaries with backward-looking signatures (indicators of their past activity) is a losing proposition. When an attack hasn't yet been uncovered by researchers and the malware involved hasn't yet been analyzed, signature-based detection isn't possible. Malware is virtually guaranteed an extended dwell time when you rely on signatures to detect it.
Malware detection based on verifying code in memory is a far more effective approach. With Second Look, you can ensure that Linux systems are running exactly the software they're supposed to be running, and nothing more. The power of memory forensics uncovers stealth malware and alerts on unknown or unexpectedly modified software. Second Look provides assurance that the programs and libraries in memory on Linux servers and workstations, from the kernel to system services and applications, are of known origin and have not been tampered with. Integrity verification detects both known and never-seen-before rootkits, backdoors, and other unauthorized processes.
Second Look can be particularly useful for detecting artifacts of malware in memory such as [code] injection and system call manipulation...
Read more from the Malware Forensics Field Guide for Linux Systems
Second Look operates at enterprise scale and is architected for scalable deployment and ease of integration. Whether you are investigating an incident now, or want to have the best shot at catching intrusions going foward: if you run Linux, Second Look is your tool. Use Second Look to minimize attacker dwell time, ascertain the scope of a compromise, gauge the success of remediation, and ensure that Linux systems throughout the enterprise are running the correct software load.
Our customers include the IT security teams of major corporations, firms which have investigated numerous high-profile security breaches, and government agencies responsible for protecting extraordinarily sensitive data. We support all Linux distributions, with extensive reference data collections to support the analysis and verification of systems running Amazon Linux, CentOS, Debian, Fedora, Oracle Linux, Red Hat Enterprise Linux (RHEL), and Ubuntu.