Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

10/12/2018
09:00 AM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail

12 Free, Ready-to-Use Security Tools

There's no excuse for not knowing your exposure. These free tools can help you analyze what your company is up against and point ways to developing a more thorough security program.
5 of 9

4. LogRhythm
LogRhythm offers a free network analysis tool in which network managers can retain data for up to three days. NetMon Freemium connects to a test access point (TAP) or switched port analyzer (SPAN) port on a switch or router and can process and analyze packet capture (PCAP) data. LogRhythm has geared NetMon Freemium to the needs of network managers, allowing them to do deep packet analysis that can extract metadata related to a network session. It offers some very detailed metadata - for example, not just the HTTPS/SSL data, but information that ties the metadata to a specific website, such as Pandora or Buzzfeed. Network managers can also set alarms on high-risk traffic, such as Social Security numbers and credit card data.
Image Source: LogRhythm

4. LogRhythm

LogRhythm offers a free network analysis tool in which network managers can retain data for up to three days. NetMon Freemium connects to a test access point (TAP) or switched port analyzer (SPAN) port on a switch or router and can process and analyze packet capture (PCAP) data. LogRhythm has geared NetMon Freemium to the needs of network managers, allowing them to do deep packet analysis that can extract metadata related to a network session. It offers some very detailed metadata for example, not just the HTTPS/SSL data, but information that ties the metadata to a specific website, such as Pandora or Buzzfeed. Network managers can also set alarms on high-risk traffic, such as Social Security numbers and credit card data.

Image Source: LogRhythm

5 of 9
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
pheil300
100%
0%
pheil300,
User Rank: Apprentice
10/31/2018 | 9:26:46 PM
Re: Pending Review
I thought priorities were: People, Process then Products....in order. The best products in the world aren't going to help if you don't have the right people or the security/business processes to utilize them.
RicoF727
50%
50%
RicoF727,
User Rank: Apprentice
10/31/2018 | 11:23:42 AM
Here's the actual 12 tools
Here's the actual 12 tools

1.     Wombat Security - https://www.wombatsecurity.com/heroes

2.     https://www.wombatsecurity.com/bingo

3.     https://www.knowbe4.com/phishing-security-test-offer  -  lets companies run a simulated phishing test for up to 100 users. Within 24 hours, companies will receive a PDF with their phish-prone percentage and charts to share with management

4.     https://www.knowbe4.com/domain-doppelganger -  an option that KnowBe4 made available about two weeks ago. Participants will also receive a PDF within 24 hours of all their look-alike domains

5.     https://www.knowbe4.com/ransomware-simulator -  This tool simulates 13 ransomware infections and one cryptomining infection and will point out vulnerable workstations.

6.     https://erpmaestro.com/arm/?domain=erpmaestro.com - ERP Maestro, analyzes all existing insider threats within a company's SAP environment and issues monthly updates on the company's risk profile

7.     https://logrhythm.com/products/logrhythm-netmon-freemium/ - LogRhythm offers a free network analysis tool in which network managers can retain data for up to three days

8.     https://www.anomali.com/learn/staxx-access-stix-taxii-feeds - Anomali offers STAXX as a free client that lets users access any STIX/TAXII-compatible threat intelligence feed. STAXX supports STIX 1.0 and 2.0 standards, which are common languages for conveying data about threat intelligence

9.     https://www.neuralys.io/pricing -  The Neuralys platform offers a centralized dashboard for visualizing a company's vulnerability trends, security zoning for the prioritization of risk management tasks, and mitigation tracking for monitoring responses across a team's security operations.

a.    Neuralys can import/upload risks or vulnerabilities from existing security toolsets or penetration tests in seconds by using its native Nessus parser or the universal CSV importer

10.    Bizploit  - https://www.onapsis.com/research/free-solutions - Bizploit helps infosec pros with the discovery, exploration, vulnerability assessment, and exploitation phases of specialized SAP penetration testing

11.    Onapsis Integrity Analyzer - https://www.onapsis.com/research/free-solutions - The Integrity Analyzer for SAP was developed to help SAP customers protect their systems from unauthorized modifications of ABAP programs

12.   https://detexian.com/ -  Detexian has created a B2B SaaS product for small and midsize businesses that offers 24/7 threat detection.
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Ninja
10/26/2018 | 10:45:34 PM
Re: Free Tools
True, but it takes some vetting. Some of the free tools can be anxiety-inducing if they're offered by an independent developer or small organization with minimal rep. For a couple of free tools I use, I've had to do quite a bit of research just to make sure they were on the up and up -- when in the long run I might have been better off and more comfortable had they just asked to charge $10 to my credit card. ;)
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
10/25/2018 | 12:19:52 PM
Re: 12 tools ??
Headline is correct--There are 9 slides for each company but 12 tools mentioned in total! 
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
10/25/2018 | 11:50:42 AM
Re: 12 tools ??
Looking into that! Stay tuned. 
RSR55
50%
50%
RSR55,
User Rank: Apprentice
10/25/2018 | 9:33:33 AM
12 tools ??
Only 8 tools listed, what happened to the other 4?
CallumLepide
50%
50%
CallumLepide,
User Rank: Apprentice
10/16/2018 | 6:11:37 AM
Free Tools
This article is absoultly right. IF you are unsure if you have a security threat in your system already but are low on budget. Download some free tools to help you find out where you need to direct fundsand see what solutions work best.

 

Its also a great way to trial a company's products and solution and to see how user friendly they are
rosiepage44
100%
0%
rosiepage44,
User Rank: Apprentice
10/13/2018 | 2:03:59 AM
Re: Pending Review
The security tools are the most important component of any system and those tools secure our data against any kind of scams over the system. There are several security tools available on the Internet and many of them are free. To get them all, consult with Microsoft Support Chat, it will help you to select the best option for your system. 
ronaldthomas
0%
100%
ronaldthomas,
User Rank: Apprentice
10/12/2018 | 9:49:17 AM
a
good post
97% of Americans Can't Ace a Basic Security Test
Steve Zurier, Contributing Writer,  5/20/2019
How Security Vendors Can Address the Cybersecurity Talent Shortage
Rob Rashotte, VP of Global Training and Technical Field Enablement at Fortinet,  5/24/2019
TeamViewer Admits Breach from 2016
Dark Reading Staff 5/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-7068
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7069
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7070
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7071
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
CVE-2019-7072
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .