Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
12 Free, Ready-to-Use Security Tools
Newest First  |  Oldest First  |  Threaded View
pheil300
100%
0%
pheil300,
User Rank: Apprentice
10/31/2018 | 9:26:46 PM
Re: Pending Review
I thought priorities were: People, Process then Products....in order. The best products in the world aren't going to help if you don't have the right people or the security/business processes to utilize them.
RicoF727
100%
0%
RicoF727,
User Rank: Apprentice
10/31/2018 | 11:23:42 AM
Here's the actual 12 tools
Here's the actual 12 tools

1.     Wombat Security - https://www.wombatsecurity.com/heroes

2.     https://www.wombatsecurity.com/bingo

3.     https://www.knowbe4.com/phishing-security-test-offer  -  lets companies run a simulated phishing test for up to 100 users. Within 24 hours, companies will receive a PDF with their phish-prone percentage and charts to share with management

4.     https://www.knowbe4.com/domain-doppelganger -  an option that KnowBe4 made available about two weeks ago. Participants will also receive a PDF within 24 hours of all their look-alike domains

5.     https://www.knowbe4.com/ransomware-simulator -  This tool simulates 13 ransomware infections and one cryptomining infection and will point out vulnerable workstations.

6.     https://erpmaestro.com/arm/?domain=erpmaestro.com - ERP Maestro, analyzes all existing insider threats within a company's SAP environment and issues monthly updates on the company's risk profile

7.     https://logrhythm.com/products/logrhythm-netmon-freemium/ - LogRhythm offers a free network analysis tool in which network managers can retain data for up to three days

8.     https://www.anomali.com/learn/staxx-access-stix-taxii-feeds - Anomali offers STAXX as a free client that lets users access any STIX/TAXII-compatible threat intelligence feed. STAXX supports STIX 1.0 and 2.0 standards, which are common languages for conveying data about threat intelligence

9.     https://www.neuralys.io/pricing -  The Neuralys platform offers a centralized dashboard for visualizing a company's vulnerability trends, security zoning for the prioritization of risk management tasks, and mitigation tracking for monitoring responses across a team's security operations.

a.    Neuralys can import/upload risks or vulnerabilities from existing security toolsets or penetration tests in seconds by using its native Nessus parser or the universal CSV importer

10.    Bizploit  - https://www.onapsis.com/research/free-solutions - Bizploit helps infosec pros with the discovery, exploration, vulnerability assessment, and exploitation phases of specialized SAP penetration testing

11.    Onapsis Integrity Analyzer - https://www.onapsis.com/research/free-solutions - The Integrity Analyzer for SAP was developed to help SAP customers protect their systems from unauthorized modifications of ABAP programs

12.   https://detexian.com/ -  Detexian has created a B2B SaaS product for small and midsize businesses that offers 24/7 threat detection.
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Ninja
10/26/2018 | 10:45:34 PM
Re: Free Tools
True, but it takes some vetting. Some of the free tools can be anxiety-inducing if they're offered by an independent developer or small organization with minimal rep. For a couple of free tools I use, I've had to do quite a bit of research just to make sure they were on the up and up -- when in the long run I might have been better off and more comfortable had they just asked to charge $10 to my credit card. ;)
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
10/25/2018 | 12:19:52 PM
Re: 12 tools ??
Headline is correct--There are 9 slides for each company but 12 tools mentioned in total! 
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
10/25/2018 | 11:50:42 AM
Re: 12 tools ??
Looking into that! Stay tuned. 
RSR555
50%
50%
RSR555,
User Rank: Strategist
10/25/2018 | 9:33:33 AM
12 tools ??
Only 8 tools listed, what happened to the other 4?
CallumLepide
50%
50%
CallumLepide,
User Rank: Apprentice
10/16/2018 | 6:11:37 AM
Free Tools
This article is absoultly right. IF you are unsure if you have a security threat in your system already but are low on budget. Download some free tools to help you find out where you need to direct fundsand see what solutions work best.

 

Its also a great way to trial a company's products and solution and to see how user friendly they are
rosiepage44
100%
0%
rosiepage44,
User Rank: Apprentice
10/13/2018 | 2:03:59 AM
Re: Pending Review
The security tools are the most important component of any system and those tools secure our data against any kind of scams over the system. There are several security tools available on the Internet and many of them are free. To get them all, consult with Microsoft Support Chat, it will help you to select the best option for your system. 
ronaldthomas
0%
100%
ronaldthomas,
User Rank: Apprentice
10/12/2018 | 9:49:17 AM
a
good post


News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-11684
PUBLISHED: 2021-02-26
Improper Access Control in the RCP+ server of the Bosch Video Recording Manager (VRM) component allows arbitrary and unauthenticated access to a limited subset of certificates, stored in the underlying Microsoft Windows operating system. The fixed versions implement modified authentication checks. P...
CVE-2020-24686
PUBLISHED: 2021-02-26
The vulnerabilities can be exploited to cause the web visualization component of the PLC to stop and not respond, leading to genuine users losing remote visibility of the PLC state. If a user attempts to login to the PLC while this vulnerability is exploited, the PLC will show an error state and ref...
CVE-2021-23964
PUBLISHED: 2021-02-26
Mozilla developers reported memory safety bugs present in Firefox 84 and Firefox ESR 78.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 85, Thunder...
CVE-2021-23965
PUBLISHED: 2021-02-26
Mozilla developers reported memory safety bugs present in Firefox 84. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 85.
CVE-2021-23978
PUBLISHED: 2021-02-26
Mozilla developers reported memory safety bugs present in Firefox 85 and Firefox ESR 78.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 86, Thunder...