The Patching Problem
The unfortunate reality for all of us is that bugs are simply part of the software lifecycle. A single Static Application Security Testing (SAST) report could identify hundreds—if not thousands—of instances for each vulnerability, but running SAST and Dynamic Application Security Testing (DAST) tools only identifies the vulnerabilities, it does not fix them.
Even if organizations are willing to find and fix the vulnerabilities in their own code, applications can still be vulnerable since only 10% – 20% of the code that runs on your application is written by application developers.
Vulnerabilities also occur throughout the rest of the code in the underlying frameworks, libraries, transient dependencies, servers, services and even the runtime platform itself (JVM, .NET, etc.).
Critical Patch Updates
Routine critical patches that come from Oracle and Microsoft represent a significant part of the burden teams face. Microsoft’s Patch Tuesday is an institutional event and Oracle’s quarterly Critical Patch Updates (CPU) have more than doubled in size since April 2016 – from the 130s to the 300s per CPU in July 2017. The July 2017 CPU reflected finding a new vulnerability every 68 hours (on average) based on the Java-related CVEs patched – 2/3rds of which had a High Severity CVSS score and 87 percent of which could be remotely exploited without authentication.
“My scanning tools give me a list of flaws as long as my arm on top of huge CPUs. My team can’t patch fast enough”.
A lightweight plugin agent to apply custom security rules as well as current and historical virtual patches for instant protection.
- Support for Java and .NET applications
- Create and apply custom virtual patches
- Virtual patches of Java and .NET critical patch updates
- Library of past CPUs to Java 4
- Instant protection
- No downtime
- No code changes
- Functional equivalent physical patches
- No break / No Exploit Guarantee
- Self-manage or use Waratek As A Service
Point. Click. Patch.
True Virtual Patching
A true virtual patch is the functional equivalent of a physical binary patch applied while the application runs with no source code changes. Flaws are fixed in the compilation pipeline of an applications’ runtime, reducing the time to patch to minutes without breaking the app.
No tuning required, no false positives, and no performance impact.
The process of applying new virtual patches across an entire application estate requires an administrator to select the patches to be applied and the rest is an automated function that takes minutes. Once under the protection of a virtual patch, resource and time constrained teams can prioritize which applications receive physical patches and which continue to run with virtual patches.
Easy to Install
- Simple plug-in agent to the Java JVM or .NET CLR
- Patch multiple applications at the click of a button
- No profile or tuning
Simple to Operate
- Simple patch configuration
- Simple deployment tool
- Central patch deployment
- No tuning
Save Time and Money
Reduced costs of:
- Ongoing Maintenance
- Increased ability to focus on higher priority items
- Improved compliance
Patching Subscription Service
Create your own virtual patches using the Waratek patch engine, or subscribe to our virtual patch service. You’ll receive routine and emergency virtual patches updates when they are issues by Oracle, Microsoft, IBM or other key software vendors like the Apache Foundation.
Custom Virtual Patching Service
Waratek offers a custom virtual patching service. Give us your scanning reports and we’ll create custom virtual patches on a subscription or a` la carte basis.
Waratek offers a library of Java Virtual Critical Patch Updates to ensure current and legacy applications are fully patched. Virtual patches for Java 7 and Java 8 are currently available. Java 5 and Java 6 will be available in Q2, and Java 4 will be available by Q3.