Waratek takes your application security program beyond a WAF without using heuristics. Based on patented virtualization technology, Waratek’s application security platform produces zero false positives, requires no code changes, tuning or instrumentation, and takes minutes to install – providing instant protection from the OWASP Top Ten as well as Zero Day attacks. These are benefits apply to new and legacy platforms and cannot be provided by your current WAF or emerging technologies like RASP based instrumentation or filters.
Learn more about a few of the unique approaches to security and application operations available exclusively from Waratek.
of web applications include open source code
(SOURCE: Black Duck)
of Java applications have a component with at least one known vulnerability
NO FALSE POSITIVES SECURITY
Applications today are generally protected by ineffective Web Application Firewalls (WAFs) and other tools that rely heavily on instrumentation or filters to guess if a request is a malicious attack or a permissible action. Such heuristic-based approaches often produce false positives at an unacceptably high rate. In a recent Cisco report, nearly 45% of organizations receive at least 1.8 million security alerts each year, 1.3 million of which are false alarms or never investigated.
Waratek’s patented virtualization-based security technology allows us to determine if an operation is an attack or a permissible request with 100% accuracy. During the two years our patented technology has been in global production, it has never produced a false positive.
Deserialization of Untrusted Data
Some of the most widespread security vulnerabilities to occur over the last couple years are related to when applications deserialize data from untrusted sources.
Waratek’s unique, patented virtualization approach to application security remediates Java object deserialization attacks using a secure runtime container and by turning on a single security rule. The full application stack is automatically protected against Java deserialization attacks, both known or unknown (Zero-Day), without:
- Source code changes
- Application profiling
- Black or white listing
- False positives or negatives
- Breaking existing functionality
The same deserialization vulnerability found in a version of Apache Commons Collections library used in 21% of Java applications was present in developer-authored code used in 25% of Java applications
Learn how we protect against Deserialization without black or white lists
Name Space Layout Randomization
Name Space Layout Randomization or NSLR is the equivalent of Address Space Layout Randomization (ASLR) for Java-based applications. Developed by Waratek, NSLR hardens the Java Virtual Machine (JVM) by randomizing the JDK namespace (Java packages), which makes code injection exploits so difficult to execute that they become unfeasible.
Attempts to brute force a system and retrieve the randomized package name will not work. Waratek’s standard configuration includes NSLR with a minimum level of security at 96-bit names, which would likely require several thousand years to crack the encryption. Names can be randomized up to 1024 bits.
Apache Struts 2 Virtual Patch
Waratek offers a Virtual Patch for customers to address the new high severity vulnerability – CVE-2017-5638 – that exposes organizations using the Struts 2 framework to any general code injection attack. The Waratek solution fully remediates this vulnerability with a virtual patch that can be live-updated without taking affected applications out of production.
“Struts 2 users need to take immediate action. Applying the binary patch offered by Apache requires some application downtime,” noted John Matthew Holt, Waratek’s Founder and CTO. “For users who have made custom changes on Struts source code, it could take days or weeks to upgrade. A virtual patch can be applied immediately while the application continues to run – with no code changes and without restarting the application.”
Even prior to the announcement of the vulnerability, Waratek’s core functionality protected against Proof-Of-Concept (POC) exploits of CVE-2017-5638 that perform remote-command execution. The new virtual patch is a specific one-line security rule that fully remediates this vulnerability and was developed in less than one-day after the vulnerability was announced.
First introduced in Struts 2.3.5 released in October 2012, the vulnerability identified in CVE-2017-5638 has been available for Zero Day exploits for more than four years.
Container security: How Waratek blocks Java exploits
Waratek relies on just-in-time compiling and focuses exclusively on one of the biggest security risks within most organizations: applications running Java.
Try A Demo
& Get Protected.
Get a 30 day free trial when you schedule now.