Log4j: DriveLock offers scanner on Vulnerability Management Dashboard

Log4j Log4shell

Share post

Drivelock offers its customers about the Vulnerability Management Dashboard a scanner to check if they are affected by the Log4j or Log4shell vulnerability at all. All you have to do is add a test string.

Log4j has been on everyone's lips for several weeks. DriveLock had already commented on this in a detailed blog post on Log4j and Log4Shell. There are many descriptions of the vulnerability and criticality (CVE-2021-44228 in Apache Log4j 2) on the Internet. Nevertheless, many IT departments are challenged with the simple question: "Am I affected at all and if so, on which systems and in which application?"

Are you affected by Log4j at all?

There is a compilation of the affected applications on Github, for example, but does a company actually use them? Even if the IT department has the appropriate asset management, so-called shadow IT is left out. Comprehensive vulnerability scanning, such as that offered by DriveLock for end devices, can help here. This means that all systems can be scanned with little effort and it is clear in which application there is a need for action.

For users of DriveLock Vulnerability Management, there is a simple and clear dashboard that bundles the relevant information about Log4j.

This is how you put together the test string

In the DriveLock Vulnerability Management Dashboard you proceed as follows

  • In the DriveLock Operations Center select "Add new dashboard tab".
  • In the pop-up window for creating a dashboard, select "New dashboard from string". Then copy the test string provided by DriveLock into the input field (freely available on the website mentioned below).

This gives customers a dashboard that shows the relevant vulnerabilities in the upper area and the affected machines in the lower area.

More at DriveLock.com

 


About DriveLock

The German company DriveLock SE was founded in 1999 and is now one of the leading international specialists for IT and data security with branches in Germany, France, Australia, Singapore, the Middle East and the USA. In times of digital transformation, the success of companies depends to a large extent on how reliably people, companies and services are protected against cyber attacks and the loss of valuable data. DriveLock is committed to protecting corporate data, devices and systems. For this purpose, the company relies on the latest technologies, experienced security experts and solutions based on the zero trust model. In today's security architectures, zero trust means a paradigm shift based on the maxim "Never trust, always verify". In this way, data can be reliably protected even in modern business models.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more