Are you faced with a security problem on a Linux system?
Respond with Second Look. Preserve evidence in volatile memory. Uncover malware and other signs of compromise.
Do you want to make sure your Linux systems are secure?
Verify with Second Look. Gain unprecedented visibility into what's running on Linux systems throughout the enterprise. Detect intrusions and unauthorized execution.
Second Look: The Leading Tool for Linux Incident Response and Enterprise Security
Second Look is memory forensics software providing powerful, easy-to-use memory acquisition and automated analysis capabilities for Linux systems. It is used to respond to and investigate computer security incidents, and to ensure the security of Linux systems and detect intrusions.
Whether they're fully stock or highly customized, Second Look makes sure Linux systems are running only expected and approved software, alerting you to any executable code in memory that is unknown, unauthorized, or maliciously modified. It supports all Linux distributions, including Red Hat Enterprise Linux (RHEL), Ubuntu, CentOS, Fedora, Debian, and more.
Our customers include the IT security teams of major corporations, firms which have investigated numerous high-profile security breaches, and government agencies responsible for protecting highly-sensitive data. Contact us now to get Second Look and start using it, too. Or read on for more details on our Incident Response and Enterprise Security products.