Waratek Solves the
Application Security Problems

That No One Else Can


Application Security with No Code Changes for Java and .NET


Patch. Secure. Upgrade.

The Latest News

July 18, 2018

Guidance on Oracle July 2018 Critical Patch Update

Runtime Application Self-Protection - RASP

Runtime Application Self-Protection – RASP – is a transformational application security technology securing an application’s runtime. Waratek RASP solution detects and prevents real-time attacks with zero false positives, doesn’t slow your applications’ performance, and increases the visibility into your apps’ operations – benefits not possible with traditional approaches to today’s threats.

Application Security Threats

New vulnerabilities uploaded each day to open source repositories (Source: Sonatype)
Flawed software component downloads in 2015 (Source: Sonatype)
Days on average to detect and remediate a successful exploit
(Source: Ponemon Institute Global Analysis)

What are your protection needs?

Traditional security approaches are not enough to protect your applications and your customers’ data from today’s threats. Waratek is a pioneer in the next generation of web application security solutions providing fast and accurate protection against known and unknown vulnerabilities in current and legacy software.

We need to patch application flaws faster and easier.

We need to protect against known and Zero-Day attacks.

We need to upgrade out of support web applications.

The Waratek Trans-formational Approach

Waratek is a fundamentally new approach to application monitoring and protection. Using a secure virtual container, Waratek’s Application Security Platform offers benefits no one else does. Providing instant protection without code changes – and helps lower costs.


Highly Accurate

  • Defense against the OWASP Top 10 and SANS top 25
  • Protects Java and .NET applications
  • The always on protections runs in block or detect mode
  • Full application stack protection, including 3rd party components
  • Protects legacy and current Java
  • No false positives

Easy to Install

  • Uses your existing runtime environment
  • No code changes
  • No prior application knowledge required
  • No compatibility issues
  • Installs in minutes

Simple to Operate

  • Does not slow application performance
  • Apply security patches without shutting down the application
  • Detailed monitoring & forensic data
  • No routine tuning required

Protection Guaranteed

Waratek offers Protection Guarantees that back our products


  • “No Break” Guarantee – Waratek’s virtual patches will not break your applications.

  • “No False Positive” Guarantee  – Waratek will not generate false positives against the OWASP Top Ten.

All of Waratek’s guarantees come with a $10,000 per unique event credit.


See how easy it is to apply a virtual patch

Secure your complete application stack with Waratek Enterprise

Waratek Installation

Waratek Application Security Products

Waratek makes it easy for security teams to instantly patch known flaws, virtually upgrade out-of-support applications, and protect 100% of their application code – all without time consuming and expensive code changes. Using patented virtualization technology, Waratek’s application security platform is highly accurate, easy to install, simple to operate and does not slow applications.

Waratek Patch

Waratek PatchA lightweight plugin agent to apply custom security patches as well as current and historical virtual patches for instant protection.

  • Create and apply custom virtual patches
  • Virtual patches of Java and .NET critical patch updates
  • Library of past CPUs to Java 4

Waratek Secure

Waratek Secure

A lightweight plugin agent that protects against the known vulnerabilities found in:

  • 2013 and 2017 OWASP Top Ten,
  • SANS Top 25
  • Other complex attack vectors.

Waratek Enterprise

Waratek Enterprise

A plugin agent that provides the full suite of Waratek benefits:

  • Virtual Patching
  • Full Stack Security
  • Virtual Platform Upgrade for Java

Try A Demo
& Get Protected.

Get a free POC when you schedule now.

The Latest News

July 9, 2018 in News

A Seismic Shift: What California’s New Privacy Law Means for Cybersecurity

Humans like patterns. In fact, the careers of everyone reading this article can likely be linked to a simple pattern: an attacker finds a flaw; they exploit that flaw; cybersecurity…

Read More
June 15, 2018 in News

We’re Losing the Race to Patch Known Security Flaws. Will GDPR help?

For 2,600 years we’ve been hearing the story of the Tortoise and the Hare, where slow and steady wins the race.  Aesop never met a hacker or a regulator. Attackers…

Read More
June 12, 2018 in News

Waratek’s Giannakidis: Removing Serialization from Java is Not the End of the Story

Last month, Oracle’s chief architect, Mark Reinhold, said during a conference Q&A that one of Oracle’s long-term goals is to change the way Java handles object serialization. In fact, he called the…

Read More

Upcoming Events

october 2018

9oct - 11All DayIT-SAHall 9/413

Application Security Webinar Series

Webinar now available to view on demand


How to end false positives

What if your application security platform didn’t cause false positives?  Too good to be true?  It’s not.

Available to view on demand: Deserialization Vulnerability

From The Blog

July 16, 2018 in Blog

July 2018 Oracle CPU Preview: Fewer Java SE patches may not mean fewer flaws

Q3 Oracle CPU Preview: The number of remotely executable flaws remains alarmingly high The July 2018 Oracle CPU (Critical Patch Update) is expected to set a new two-year high for…

Read More
July 11, 2018 in Blog

The deadline for retiring early TLS has passed. But, is it really gone?

In a summer of big security compliance deadlines, one slipped by virtually unnoticed.  While the world was fixated on meeting the strict requirements of GDPR by 25 May, there was…

Read More
May 31, 2018 in Blog

Serialization is dead! Long live serialization!

Oracle has declared an end to Java’s serialization approach, but that’s not the end of the story. Oracle has signaled there are big changes on the way for how Java…

Read More

Customer Technical Alerts

July 18, 2018 in Alerts

Guidance on Oracle July 2018 Critical Patch Update

Customer Alert 20180718 100% of the Java SE flaws in the Oracle July 2018 Critical Patch Update (CPU) can be exploited remotely The Oracle July 2018 Critical Patch Update (CPU)…

Read More
June 6, 2018 in Alerts

New Zip Slip Vulnerability Hits Java Apps

Other languages are also at risk Israel-based Synk Security has reported a new critical vulnerability with the name Zip Slip. It is an arbitrary file overwrite vulnerability via path traversal in…

Read More
April 18, 2018 in Alerts

Oracle April 2018 CPU: Most Java flaws can be remotely exploited

Half of the Java patches relate to Deserialization Flaws. Customer Alert 20180418 Oracle Critical Patch Update April 2018 Released Summary This Critical Patch Update patches 15 Java-related vulnerabilities including one…

Read More