Waratek Solves the
Application Security Problems

That No One Else Can


Application Security with No Code Changes for Java and .NET


Patch. Secure. Upgrade.

The Latest News

May 8, 2018

Virtual Patching is in the Eye of the Beholder

Runtime Application Self-Protection - RASP

Runtime Application Self-Protection – RASP – is a transformational application security technology securing an application’s runtime. Waratek RASP solution detects and prevents real-time attacks with zero false positives, doesn’t slow your applications’ performance, and increases the visibility into your apps’ operations – benefits not possible with traditional approaches to today’s threats.

Application Security Threats

New vulnerabilities uploaded each day to open source repositories (Source: Sonatype)
Flawed software component downloads in 2015 (Source: Sonatype)
Days on average to detect and remediate a successful exploit
(Source: Ponemon Institute Global Analysis)

What are your protection needs?

Traditional security approaches are not enough to protect your applications and your customers’ data from today’s threats. Waratek is a pioneer in the next generation of web application security solutions providing fast and accurate protection against known and unknown vulnerabilities in current and legacy software.

We need to patch application flaws faster and easier.

We need to protect against known and Zero-Day attacks.

We need to upgrade out of support web applications.

The Waratek Trans-formational Approach

Waratek is a fundamentally new approach to application monitoring and protection. Using a secure virtual container, Waratek’s Application Security Platform offers benefits no one else does. Providing instant protection without code changes – and helps lower costs.


Highly Accurate

  • Defense against the OWASP Top 10 and SANS top 25
  • Protects Java and .NET applications
  • The always on protections runs in block or detect mode
  • Full application stack protection, including 3rd party components
  • Protects legacy and current Java
  • No false positives

Easy to Install

  • Uses your existing runtime environment
  • No code changes
  • No prior application knowledge required
  • No compatibility issues
  • Installs in minutes

Simple to Operate

  • Does not slow application performance
  • Apply security patches without shutting down the application
  • Detailed monitoring & forensic data
  • No routine tuning required

Protection Guaranteed

Waratek offers Protection Guarantees that back our products


  • “No Break” Guarantee – Waratek’s virtual patches will not break your applications.

  • “No False Positive” Guarantee  – Waratek will not generate false positives against the OWASP Top Ten.

All of Waratek’s guarantees come with a $10,000 per unique event credit.


See how easy it is to apply a virtual patch

Secure your complete application stack with Waratek Enterprise

Waratek Installation

Waratek Application Security Products

Waratek makes it easy for security teams to instantly patch known flaws, virtually upgrade out-of-support applications, and protect 100% of their application code – all without time consuming and expensive code changes. Using patented virtualization technology, Waratek’s application security platform is highly accurate, easy to install, simple to operate and does not slow applications.

Waratek Patch

Waratek PatchA lightweight plugin agent to apply custom security patches as well as current and historical virtual patches for instant protection.

  • Create and apply custom virtual patches
  • Virtual patches of Java and .NET critical patch updates
  • Library of past CPUs to Java 4

Waratek Secure

Waratek Secure

A lightweight plugin agent that protects against the known vulnerabilities found in:

  • 2013 and 2017 OWASP Top Ten,
  • SANS Top 25
  • Other complex attack vectors.

Waratek Enterprise

Waratek Enterprise

A plugin agent that provides the full suite of Waratek benefits:

  • Virtual Patching
  • Full Stack Security
  • Virtual Platform Upgrade for Java

Try A Demo
& Get Protected.

Get a free POC when you schedule now.

The Latest News

May 2, 2018 in News

Oracle WebLogic RCE Deserialization Vulnerability (CVE-2018-2628) Analysis

Critical Oracle WebLogic Server Flaw Still Not Patched On April 17, Oracle released the quarterly Critical Patch Update (CPU) advisory. Among the 254 new security fixes, the CPU also contained…

Read More
April 23, 2018 in News

Cybersecurity problems won’t be solved by regulations

If you look at the intersection of public policy and cybersecurity, it appears we are on the verge of a fundamental breakthrough that could result in greater cyber safety.  New…

Read More
April 18, 2018 in News

Waratek Issues Guidance on Oracle April 2018 CPU

Most Java flaws can be remotely exploited: Half of the Java patches relate to Deserialization Flaws.   DUBLIN and ATLANTA – April 18, 2018 – Waratek, the compiler-based application security company,…

Read More

Upcoming Events

june 2018

5jun - 7All DayInfoSecurity EuropeG110

Application Security Webinar Series

Webinar now available to view on demand


How to end false positives

What if your application security platform didn’t cause false positives?  Too good to be true?  It’s not.

Available to view on demand: Deserialization Vulnerability

From The Blog

May 8, 2018 in Blog

Virtual Patching is in the Eye of the Beholder

The race to patch known flaws is giving birth to the next buzz-worthy approach, but most “virtual patches” are neither Statistics have been around for years that point to known…

Read More
April 25, 2018 in Blog

A different RSA

It is always an interesting experience hanging out with 60,000 of your closest friends! This was my third RSA Conference. Somethings never change: The insanely crowded show floor causing “road-rage”…

Read More
April 13, 2018 in Blog

Q2 Oracle CPU Preview: Most Java flaws can be remotely exploited

Overall trends point to continued risks from vulnerable code The number of Java related patches in the Q2 Oracle Critical Patch Updates (CPU) continues to drift down off the all-time…

Read More

Customer Technical Alerts

April 18, 2018 in Alerts

Oracle April 2018 CPU: Most Java flaws can be remotely exploited

Half of the Java patches relate to Deserialization Flaws. Customer Alert 20180418 Oracle Critical Patch Update April 2018 Released Summary This Critical Patch Update patches 15 Java-related vulnerabilities including one…

Read More
April 11, 2018 in Alerts

Two New Critical Vulnerabilities found in Spring Framework

Apps Built on Spring Framework at Risk: Two new critical vulnerabilities brings the total to six new vulnerabilities in a week. Customer Alert 20180411. The popular web application development framework…

Read More
April 10, 2018 in Alerts

Remote Code Execution Flaw found in Spring Framework

Apps Built on Spring Framework at Risk: Four new Spring vulnerabilities range from Critical to Low. Customer Alert 20180410. The popular web application development framework Spring has released patches for…

Read More