This website uses cookies to ensure you get the best experience on our website. More info
Got It!
Close

Uila provides protection against Zero-day Log4Shell Vulnerability in Java log4j logging library

Santa Clara, California- (Dec 14 ,2021)- Uila Inc., the Full-Stack Observability company, today announced that its Observability Platform, is now able to automatically detect, classify and alert users to the critical zero-day vulnerability in the Apache Log4j logging utility, identify remote code execution attempts for the vulnerability and as always provide full-stack visibility into the performance of those critical applications in the infrastructure. With this latest update, Uila users can be protected from this vulnerability and be alerted to any attempts made against their organization.

Last week, a previously unknown zero-day vulnerability in the Apache Log4j library was reported. Any organization that deploys or uses Java applications or hardware running Log4j is impacted by this vulnerability. This vulnerability termed as Log4Shell (CVE-2021-44228) is a remote code execution vulnerability that allows attackers to exploit it on one of the servers, and gain the ability to execute specially crafted code and potentially take full control of the system.

“In this next normal, more than ever before, securing critical applications and systems is top of mind for every organization. This zero-day vulnerability just shows how a single vulnerability can impact operations of millions of organizations worldwide.” says Chia-Chee Kuan, CEO and Founder for Uila. “As organizations race to re-configure and patch their systems, it is equally important to identify any malicious attempts made by attackers who are trying to exploit it. Security tools used by any enterprise organization must counter these vulnerabilities with its own zero-day detection capabilities to identify it, in a timely manner, before any impact to the organization’s revenue and reputation. With Uila, you not only are you alerted to this vulnerability, but most importantly get visibility into the entire application and infrastructure stack to ensure that everything is operating at its optimum performance level.” 

Uila’s add-on Cyber Threat Monitoring module provides Real-time Detection for thousands of Advanced and Persistent threats including the log4j vulnerability and other Malware, Exploit Kits, Webshells, Port Scans, SMB Probes, Obfuscation, OS fingerprinting, etc. Uila employs multiple industry premier signature, behavior and anomaly-based databases to identify those threats and vulnerabilities, and has the built-in mechanism to automatically get the latest threat updates from these databases, including this latest log4Shell vulnerability.

Uila’s Cyber Threat protection, part of the Uila full-stack Observability platform provides:

  • Comprehensive application anomaly detection which identifies stealth actions by attackers with additions/removals of VMs/servers, as well as any dependency mapping relationship changes;
  • Identification of 1000s of cyber threats and vulnerabilities impacting your Hybrid enterprise environment;
  • Data traffic Exfiltration activity identification from your deployment to unauthorized or malicious locations directly on a world map;
  • Deep insights into the lateral east-west network traffic movement;
  • Built-in Automated & intelligent remediation to resolve any cyber threat.

This new vulnerability identification is available as part of Uila’s solution today. Security & Infrastructure teams can put Uila’s new solution to the test by signing up for a complimentary trial from https://www.uila.com/uila-free-trial

About Uila 

Uila resolves Complex IT Disruptions for Enterprise Organizations with its Intelligent Full-Stack Observability Platform, that correlates Application and Infrastructure Performance to isolate and remediate issues before business impact. With Uila, IT teams can visualize application workload dependencies across cloud platforms, rightsize infrastructure resources, troubleshoot disruptions for any onsite or remote VDI user due to application/network/infrastructure challenges, plan workload migration strategies for Cloud deployments and use AIOps to streamline troubleshooting and reduce MTTR with remediation actions. And most importantly, this is done WITHOUT any agents. Uila also allows security teams to combat advanced cyber threats, by providing comprehensive application anomaly insights, cyber threats & Data Exfiltration activities. Organizations use Uila to align themselves with their IT teams and cut MTTR from days to minutes to always keep End-User Experience at peak performance & secure, across cloud boundaries.

 






Read About Uila's Latest Industry Award

What did Uila win?
© 2024 Uila, Inc.  All rights reserved.