How are you responding to the Log4j vulnerability?
Recently the Java-based software vulnerability known as Apache Log4j, or Log4j, has caused global concern. According to leading cybersecurity analysts there are already millions of hacking attempts to exploit this vulnerability.
With the most critical severity rating available, organizations need to act quickly. OpenText has a Log4j Practice Team available to provide advice, guidance and assistance on assessing and remediating this immediate threat.
OpenText has solutions to protect all of your IT applications which can be applied regardless of where you are in your response plan. These solutions address vulnerability in your OpenText ecosystem and wider IT ecosystem:
- Vulnerability Testing and Penetration Scanning: Identify vulnerabilities from configuration and patch management processes using Open Web Application Security Project (OWASP) and other frameworks and determine their potential impact
- Threat Hunting: Perform in-depth analysis uncovering unknown threats
- Incident Response: Use top industry technologies with custom workflows, leveraging machine learning and MITRE ATT&CK framework. The Security Services breach response team can start within minutes notice of a breach
- Managed Detection and Response (MDR): Receive the detection and alerting needed to identify threats and provide rapid response to isolate and remediate in minutes not days
- Leverage the Security Services team’s extensive experience and knowledge of leading cybersecurity technologies and best practices
- Discover improper configurations or risky end-user behavior
- Support compliance requirements, such as OWASP, top-ten security controls, PCI or HIPAA
- Combat techniques attackers leverage to exploit web application servers and discover security gaps such as Log4j
Stay secure. Contact OpenText for assistance today.