The Patching Problem
The unfortunate reality for all of us is that bugs are simply part of the software lifecycle. A single Static Application Security Testing (SAST) report could identify hundreds—if not thousands—of instances for each vulnerability, but running SAST and Dynamic Application Security Testing (DAST) tools only identifies the vulnerabilities, it does not fix them.
Even if organizations are willing to find and fix the vulnerabilities in their own code, applications can still be vulnerable since only 10% – 20% of the code that runs on your application is written by application developers.
Vulnerabilities also occur throughout the rest of the code in the underlying frameworks, libraries, transient dependencies, servers, services and even the runtime platform itself (JVM, .NET, etc.).
Critical Patch Updates
Routine critical patches that come from Oracle and Microsoft represent a significant part of the burden teams face. Microsoft’s Patch Tuesday is an institutional event and Oracle’s quarterly Critical Patch Updates (CPU) have more than doubled in size since April 2016 – from the 130s to the 300s per CPU in July 2017. The July 2017 CPU reflected finding a new vulnerability every 68 hours (on average) based on the Java-related CVEs patched – 2/3rds of which had a High Severity CVSS score and 87 percent of which could be remotely exploited without authentication.
“My scanning tools give me a list of flaws as long as my arm on top of huge CPUs. My team can’t patch fast enough”.
A lightweight plugin agent to apply custom security rules as well as current and historical virtual patches for instant protection.
- Support for Java and .NET applications
- Create and apply custom virtual patches
- Virtual patches of Java and .NET critical patch updates
- Library of past CPUs to Java 4
- Instant protection
- No downtime
- No code changes
- Functional equivalent physical patches
- No break / No Exploit Guarantee
- Self-manage or use Waratek As A Service
Point. Click. Patch.
Most WAF and RASP vendors tell you they virtually patch your code.
Physically patching known software flaws is time consuming and risky. That’s why traditional virtual patching, also referred to as virtual shielding, is often mentioned as a way to quickly protect applications against known CVEs. But, traditional virtual patches still leave you vulnerable to attack.
Web Application Firewall (WAF) and RASP providers use techniques such as pattern matching or RegEx to shield a known CVE. These patches do not fix the flawed code and often result in false negatives and false positives. Routine tuning is also required for the patch to remain effective against attack.
Only Waratek can fix the vulnerable code of a CVE with no downtime, no source code changes, and no tuning.
Waratek’s runtime virtual patching is fundamentally different. A runtime virtual patch is the functional equivalent of a physical binary patch that is applied while the application runs with no source code changes and no tuning required.
The known CVE is fixed in the compilation pipeline of Java and .NET applications, reducing the time-to-patch across an enterprise from weeks, months, or years to a matter of minutes.
Waratek can also provide custom runtime virtual patches based on the output from vulnerability reports.
Easy to Install
- Simple plug-in agent to the Java JVM or .NET CLR
- Patch multiple applications at the click of a button
- No profile or tuning
Simple to Operate
- Simple patch configuration
- Simple deployment tool
- Central patch deployment
- No tuning
Save Time and Money
Reduced costs of:
- Ongoing Maintenance
- Increased ability to focus on higher priority items
- Improved compliance
Patching Subscription Service
Create your own virtual patches using the Waratek patch engine, or subscribe to our virtual patch service. You’ll receive routine and emergency virtual patches updates when they are issues by Oracle, Microsoft, IBM or other key software vendors like the Apache Foundation.
Custom Virtual Patching Service
Waratek offers a custom virtual patching service. Give us your scanning reports and we’ll create custom virtual patches on a subscription or a` la carte basis.
Waratek offers a library of Java Virtual Critical Patch Updates to ensure current and legacy applications are fully patched. Virtual patches for Java 7 and Java 8 are currently available. Java 5 and Java 6 will be available in Q2, and Java 4 will be available by Q3.
Other Waratek Products
A lightweight plugin agent that protects against the known vulnerabilities found in:
- 2013 and 2017 OWASP Top Ten
- SANS Top 25
- Zero Day Attacks