Page 87 - Publication6
P. 87
CYBER DEFENSE AWARDS
BEST PRODUCT
MALWARE ANALYSIS
SOLUTION 2015
CDM Second Look
www.cyberdefensemagazine.com
Raytheon�s Second Look is a tool that uses memory forensics to acquire and analyze volatile memory from Linux systems
providing malware detection using an integrity verification approach to validate that all soft- ware running is known and
unaltered. When responding to a confirmed or potential computer security incident on a Linux system, Second Look will
quickly determine where to focus your efforts by highlighting stealth malware, unknown, or unauthorized programs running
on the system, and other potential indicators of compromise and vulnerability, saving you time, money and loss of business
opportunities.
The Enterprise Security version of Second Look monitors Linux workstations and servers using live remote memory analysis
to verify the integrity of the kernel and processes. It provides notifications to system administrators and security teams
when alerts indicate a compromise has been detected and enables quick, in-depth investigation and response. Second Look
was designed to automate Linux memory forensics on thousands of geographically distributed systems enabling system
administrators and other users to meet tight performance, reliability, and timing requirements.
About Raytheon
Raytheon Company, with 2014 sales of $23 billion and 61,000 employees worldwide, is a technology and innovation leader
specializing in defense, security and civil markets throughout the world. With a history of innovation spanning 93 years,
Raytheon provides state-of-the-art electronics, mission systems integration and other capabilities in the areas of sensing;
effects; and command, control, communications and intelligence systems, as well as cyber security and a broad range of
mission support services. Raytheon is head- quartered in Waltham, Massachusetts.
�The Best Malware Analysis Solution for 2015� - CDM
CYBER DEFENSE MAGAZINE - ANNUAL EDITION 3