Runtime Vulnerability Patching

It doesn't need to be difficult to patch legacy and critical enterprise applications

Speed is of the essence

Every security patch issued by Oracle, Microsoft, IBM, Apache or any other software developer starts a relay race. One team is the malicious hackers who seek web applications containing the new vulnerability to steal an organization’s data.
It may take attackers a few days or weeks to find a victim, but once inside a system, it will be nearly 200 days before the attack is noticed and another 60+ days before the attack is stopped.

Source: Ponemon Institute 2017 Cost of Data Breach Study

of all malicious attacks are aimed at the application layer

(SOURCES: DHS, Verizon)

of all successful exploits will be based on known vulnerabilities

(SOURCE: Gartner)

Binary Equivalent Security Without Code Changes

Traditional approaches to web application security that rely on heuristics cannot help you win the race against attacks from known (or unknown) software flaws. With Waratek, a virtual patch can be applied within hours of the release of a routine or emergency patch, dramatically reducing your risk profile and attack surface.
Easy

Waratek’s unique approach to application security allows teams to apply routine and emergency security updates without taking an app out of production.

Effective

Vulnerabilities are mitigated immediately and automatically – allowing Dev teams to focus on permanent fixes for the highest level vulnerabilities.

Fast

With Waratek you reduce the time and effort spent on patch updates, saving time and money and freeing your Dev team to work on innovation.

Safe

Application code is never touched and restarting the app is not required. This eliminates the risk associated with patching your mission critical apps.

Remediating years of vulnerabilities and updating an out-of-date Java JRE without changing a single line of code.

US BasedGlobal Media Company
Monitoring Application Security

Suggested Resources

Case Study

Virtual Patching while under attack

Download this Case Study to hear what our customers have to say

See it for yourself.

Schedule a demo

Patching News

April 15, 2020 in News, Patching, Technical

Oracle April 2020 CPU represents a double-digit increase in software patches

The April 2020 Oracle Critical Patch Update (CPU) includes 397 patches across Oracle’s product suite, an 18 percent hike over the January 2020 CPU and a 33% year-over-year increase. The…
Read More
April 10, 2020 in Alerts, Blog, Patching, Technical

Oracle Critical Patch Update Preview: April 2020 CPU could top 400 patches, a double-digit year-over-year increase

The April Oracle 2020 Critical Patch Update (CPU) could see a 37% increase in software patches across the Oracle product suite based on a pre-release of the quarterly update due…
Read More
January 15, 2020 in Alerts, Blog, Patching

Oracle January 2020 CPU includes fewer Java SE patches, but the severity base scores are higher

The number of Java SE patches in the quarterly Oracle Critical Patch Update (CPU) for January 2020 drops to 12 from the 20 included in October 2019's CPU. But, 1/3rd…
Read More
July 17, 2019 in Blog, Patching

Oracle July 2019 CPU shows a 6% increase

The number of patches in the quarterly Oracle Critical Patch Update (CPU) for July 2019 is 316 which is a 6% increase compared to the April 2019 CPU. Of the…
Read More