Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

10/12/2018
09:00 AM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail

12 Free, Ready-to-Use Security Tools

There's no excuse for not knowing your exposure. These free tools can help you analyze what your company is up against and point ways to developing a more thorough security program.
1 of 9

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
KenT806
50%
50%
KenT806,
User Rank: Apprentice
12/3/2019 | 2:30:53 AM
Thanks for the Share
This is really very nice post you shared, thanks for sharing .. Rent Singapore
pheil300
100%
0%
pheil300,
User Rank: Apprentice
10/31/2018 | 9:26:46 PM
Re: Pending Review
I thought priorities were: People, Process then Products....in order. The best products in the world aren't going to help if you don't have the right people or the security/business processes to utilize them.
RicoF727
100%
0%
RicoF727,
User Rank: Apprentice
10/31/2018 | 11:23:42 AM
Here's the actual 12 tools
Here's the actual 12 tools

1.     Wombat Security - https://www.wombatsecurity.com/heroes

2.     https://www.wombatsecurity.com/bingo

3.     https://www.knowbe4.com/phishing-security-test-offer  -  lets companies run a simulated phishing test for up to 100 users. Within 24 hours, companies will receive a PDF with their phish-prone percentage and charts to share with management

4.     https://www.knowbe4.com/domain-doppelganger -  an option that KnowBe4 made available about two weeks ago. Participants will also receive a PDF within 24 hours of all their look-alike domains

5.     https://www.knowbe4.com/ransomware-simulator -  This tool simulates 13 ransomware infections and one cryptomining infection and will point out vulnerable workstations.

6.     https://erpmaestro.com/arm/?domain=erpmaestro.com - ERP Maestro, analyzes all existing insider threats within a company's SAP environment and issues monthly updates on the company's risk profile

7.     https://logrhythm.com/products/logrhythm-netmon-freemium/ - LogRhythm offers a free network analysis tool in which network managers can retain data for up to three days

8.     https://www.anomali.com/learn/staxx-access-stix-taxii-feeds - Anomali offers STAXX as a free client that lets users access any STIX/TAXII-compatible threat intelligence feed. STAXX supports STIX 1.0 and 2.0 standards, which are common languages for conveying data about threat intelligence

9.     https://www.neuralys.io/pricing -  The Neuralys platform offers a centralized dashboard for visualizing a company's vulnerability trends, security zoning for the prioritization of risk management tasks, and mitigation tracking for monitoring responses across a team's security operations.

a.    Neuralys can import/upload risks or vulnerabilities from existing security toolsets or penetration tests in seconds by using its native Nessus parser or the universal CSV importer

10.    Bizploit  - https://www.onapsis.com/research/free-solutions - Bizploit helps infosec pros with the discovery, exploration, vulnerability assessment, and exploitation phases of specialized SAP penetration testing

11.    Onapsis Integrity Analyzer - https://www.onapsis.com/research/free-solutions - The Integrity Analyzer for SAP was developed to help SAP customers protect their systems from unauthorized modifications of ABAP programs

12.   https://detexian.com/ -  Detexian has created a B2B SaaS product for small and midsize businesses that offers 24/7 threat detection.
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Ninja
10/26/2018 | 10:45:34 PM
Re: Free Tools
True, but it takes some vetting. Some of the free tools can be anxiety-inducing if they're offered by an independent developer or small organization with minimal rep. For a couple of free tools I use, I've had to do quite a bit of research just to make sure they were on the up and up -- when in the long run I might have been better off and more comfortable had they just asked to charge $10 to my credit card. ;)
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
10/25/2018 | 12:19:52 PM
Re: 12 tools ??
Headline is correct--There are 9 slides for each company but 12 tools mentioned in total! 
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
10/25/2018 | 11:50:42 AM
Re: 12 tools ??
Looking into that! Stay tuned. 
RSR555
50%
50%
RSR555,
User Rank: Strategist
10/25/2018 | 9:33:33 AM
12 tools ??
Only 8 tools listed, what happened to the other 4?
CallumLepide
50%
50%
CallumLepide,
User Rank: Apprentice
10/16/2018 | 6:11:37 AM
Free Tools
This article is absoultly right. IF you are unsure if you have a security threat in your system already but are low on budget. Download some free tools to help you find out where you need to direct fundsand see what solutions work best.

 

Its also a great way to trial a company's products and solution and to see how user friendly they are
rosiepage44
100%
0%
rosiepage44,
User Rank: Apprentice
10/13/2018 | 2:03:59 AM
Re: Pending Review
The security tools are the most important component of any system and those tools secure our data against any kind of scams over the system. There are several security tools available on the Internet and many of them are free. To get them all, consult with Microsoft Support Chat, it will help you to select the best option for your system. 
ronaldthomas
0%
100%
ronaldthomas,
User Rank: Apprentice
10/12/2018 | 9:49:17 AM
a
good post
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15570
PUBLISHED: 2020-07-06
The parse_report() function in whoopsie.c in Whoopsie through 0.2.69 mishandles memory allocation failures, which allows an attacker to cause a denial of service via a malformed crash file.
CVE-2020-15569
PUBLISHED: 2020-07-06
PlayerGeneric.cpp in MilkyTracker through 1.02.00 has a use-after-free in the PlayerGeneric destructor.
CVE-2020-7690
PUBLISHED: 2020-07-06
It's possible to inject JavaScript code via the html method.
CVE-2020-7691
PUBLISHED: 2020-07-06
It's possible to use <<script>script> in order to go over the filtering regex.
CVE-2020-15562
PUBLISHED: 2020-07-06
An issue was discovered in Roundcube Webmail before 1.2.11, 1.3.x before 1.3.14, and 1.4.x before 1.4.7. It allows XSS via a crafted HTML e-mail message, as demonstrated by a JavaScript payload in the xmlns (aka XML namespace) attribute of a HEAD element when an SVG element exists.