Protecting against Log4j vulnerability and more

Protecting against Log4j vulnerability and more

Written by Browsium Founder - Matt Heller

By now, you’ve heard and read extensively about the log4j vulnerability. Given the success of Java and the generic need for logging….it’s easy to see how it’s everywhere. Browsium solutions don’t use log4j, so our products are not impacted or vulnerable to this issue.

While the best practice would be to upgrade or patch to a non-vulnerable version, we recognize that requires a few critical steps:

1)????Know if you’re impacted

2)????Find the vendor/software package impacted

3)????Get the update

4)????Test the update

5)????Deploy the update

None of those are easy steps, so this becomes a giant fire drill. We can help with that first item using our Browsium Proton inventory data, so they have a leg up on knowing the vendors to contact. But what do you do with older software packages that are out of support? Or the vendor is gone? Or the product upgrade is expensive (and time-consuming)?

That’s where our customers are in great shape. Because our Browsium Ion solution was built to manage web-based Java applets and JLNP applications, the mitigation is as easy. Customers?don’t have to do anything other than upgrade to 4.9.1 to enable this. That’s it.

Customers don’t need to scramble for that inventory. They don’t need to furiously contact vendors about vulnerability status—no need to get new software, no testing those new packages. The only deployment is updating their Browsium configuration. The existing client software is ready to go.

So if you’re scrambling to deal with log4j vulnerabilities now, we can help put some order back to the mess. And help your organization be prepared for the next time this kind of thing happens. Be ready to react and mitigate without the panic and fire drill. Our products were designed to provide the platform-tools needed to address problems so we can help you solve the known and the yet to be known issues impacting your enterprise applications.

Contact us today to learn more about our Browsium Suite and get started with the tools to help IT and Security staff manage the chaos.

#log4j

要查看或添加评论,请登录

Ben Katz的更多文章

  • The end of Internet Explorer. Again. For Real.

    The end of Internet Explorer. Again. For Real.

    June 15, 2022, is here. Internet Explorer is being retired.

    1 条评论
  • Internet Explorer 11 isn’t going away next week

    Internet Explorer 11 isn’t going away next week

    By Matt Heller: Read time 2 min 12 sec The timeline for Internet Explorer 11’s final demise is confusing. Microsoft…

    3 条评论
  • Windows 11 is on the way!

    Windows 11 is on the way!

    Microsoft introduced the world to Windows 11, and it looks like they’ve been focused on advancing the platform without…

  • Flash is finally, finally dead...

    Flash is finally, finally dead...

    Although the Adobe Flash EOL’s roadmap has been well documented and precise to the day, in traditional Microsoft…

    1 条评论
  • Spartan is dead, long live Spartan!

    Spartan is dead, long live Spartan!

    When Microsoft announced the end of Project Spartan (Edge Legacy), it seemed like yet another thing people would read…

    1 条评论
  • Edge Legacy End of Life

    Edge Legacy End of Life

    The web moves fast, but the lifetime for Edge ‘legacy’ was short by every measure. Not that we’d argue it should be…

    1 条评论
  • Just like that, Flash is gone

    Just like that, Flash is gone

    Adobe has been talking about the end of Flash support for a few years now. The once-dominant solution for interactive…

    4 条评论
  • Microsoft to force opening on Edge

    Microsoft to force opening on Edge

    In another step towards moving people from Internet Explorer to Edge, Microsoft will be introducing functionality in an…

  • Domain security runs through the browser

    Domain security runs through the browser

    By Matt Heller Founder of Browsium As previously discussed, the browser is at the center of the competitive efforts to…

    2 条评论
  • The Case for ITOM Visibility Into The Browser (Part 2)

    The Case for ITOM Visibility Into The Browser (Part 2)

    In case you missed it "The Case for ITOM Visibility Into the Browser (Part 1) The browser gets deployed without being…

社区洞察

其他会员也浏览了