InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

The Log4j Vulnerability - Everything You Need to Know

Presented by

Yaniv Shechtman | Head of Product Management for Threat Detection, Check Point Software

About this talk

The Apache Log4j vulnerability exploit can be extremely dangerous for organizations. Log4j is the most popular Java logging library with over 400,000 downloads from its GitHub project and the Log4j library is embedded in almost every Internet service or application we are familiar with, including Twitter, Amazon, Microsoft, Minecraft, and more. Exploiting this vulnerability is simple and allows threat actors to control java-based web servers and launch remote code execution attacks. We’ve subsequently seen new variations of the original exploit being introduced rapidly - over 60 in less than 24 hours. Check Point’s Infinity architecture provides zero-day protection for our customers and prevented hackers from exploiting this vulnerability in our customer deployments. Watch this webinar to understand: 1. How to identify log4j attacks 2. Who is vulnerable to this exploit 3. How to keep your organization secure from this attack and future zero-day attacks
Check Point Software APAC - Channel

Check Point Software APAC - Channel

9393 subscribers10 talks
Secure Your Everything
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers a multilevel security architecture that defends enterprises’ cloud, network and mobile device held information, plus the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.
Related topics