Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Security Vendor Protects Java Apps at Runtime With New Technology

A new security company is pushing a product that monitors, detects and blocks threats from inside the Java Virtual Machine (JVM).

A new security company is pushing a product that monitors, detects and blocks threats from inside the Java Virtual Machine (JVM).

Headquartered in Dublin, Waratek pulled the covers away from its Java Application Security (JAS) product earlier this week. The idea behind Waratek JAS is to serve as a security-enabled version of JVM and monitor network packets, file system calls and CPU instructions to identify and block external attacks. It also allows users to virtually patch vulnerabilities at run-time without installing any agents or modifying applications and prevents attacks from hitting Java applications.

The product fits into a new category of security technology that the analyst firm Gartner refers to as “Runtime Application Self-Protection” (RASP). According to Gartner, RASP technologies are built or linked into an application or application runtime environment and are capable of controlling application execution and detecting and preventing real-time attacks.  

According to Waratek, the visibility offered by JAS allows the product to log and audit activity for compliance reporting, forensics and integration with security information event management (SIEM) systems. The technology does not require changes to application code or modifications to network configurations or hardware appliances.

To thwart SQL injection and other attacks, the product uses a set of customizable rules. The approach also works as a defense against zero-day vulnerabilities because it traps application behavior without the user having to wait for a patch to be released. A simple blacklist rule can be used to provide virtual patch protection against new vulnerabilities.

“According to industry sources, custom Java applications contain between five to 10 security vulnerabilities per 10,000 lines of code, which is a huge problem since many of these programs are used by financial institutions and large enterprises to run key pieces of their business,” said Brian Maccaba, CEO of Waratek, in a statement. “With Waratek JAS we have reduced the Java attack surface to a small well-defined space that allows us to monitor and protect against third party software vulnerabilities, internal threats and external attacks – all without making any changes to existing applications.”

The product will be generally available later this summer. 

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.