Why is LevelBlue adding Web Application Shielding to its Managed Vulnerability Program?
LevelBlue Completes Acquisition of Cybereason. Learn more
Get access to immediate incident response assistance.
Get access to immediate incident response assistance.
LevelBlue Completes Acquisition of Cybereason. Learn more
This blog was written by a guest blogger.
Cybercriminals never sleep. Why? They're too busy looking for application vulnerabilities. In the world of cybercrime, a flawed application is a potential goldmine for them, but an onramp to disaster for most organizations.
The threat landscape has increased at a frightening speed. We've moved beyond merely dealing with basic threats to countering highly advanced and persistent attacks.
But how bad are things, really?
In an ideal world, following cybersecurity best practices, we find out that there is a vulnerability in the software we use or develop. We promptly apply a patch or remediate the issue, and the problem goes away.
In the real world, over 63% of all reported unpatched vulnerabilities are at least two years old. Some even date back to 2002.
Why is this? Why do so many organizations put themselves and their customers at risk by neglecting longstanding and known flaws?
Put simply; it's hard to stay on top of remediation. It takes enough time, money, and skilled resources to get the job done.
And it shows. On July 28, 2021, together the U.S. Cybersecurity and Infrastructure
Security Agency (CISA), the Australian Cyber Security Centre (ACSC), the United Kingdom’s National
Cyber Security Centre (NCSC), and the U.S. Federal Bureau of Investigation (FBI) all issued a joint advisory on the world’s top routinely exploited vulnerabilities. The key point being that
“Cyber actors continue to exploit publicly known—and often dated—software vulnerabilities against broad target sets, including public and private sector organizations worldwide…”
Yet, remediating known vulnerabilities remains one of the biggest challenges for organizations, with Bitdefender’s business telemetry revealing:
Frighteningly, Gartner says that 99% of vulnerabilities exploited will continue to be ones organizations know about, but have not yet addressed at the time of the incident. So, why are remediation times so slow?
Fixing vulnerabilities is time-consuming and expensive, so as a result often gets delayed, deprioritized, or even ignored. Why? Factors impacting remediation range from a lack of resources, to challenging environments with inconsistent DevSecOps practices, to haphazard scanning frequency and security testing. Development teams are often consumed by their most pressing projects, and so are short on the resources needed to address flaws that haven't (yet) caused a problem, or aren't spending adequate time on the legacy applications. The traditional reliance on developers to remediate application vulnerabilities is no longer viable.
In short, they have too much to do, and not enough time or specialist security skills to do it.
In responding to this market need, LevelBlue has added another layer of capability to their highly-regarded Managed Vulnerability Program (MVP) – Web Application Shielding.
How does Web Application Shielding work?
Shields are code designed to fix otherwise exploitable vulnerabilities in applications. The shields modify and transform requests and responses in the traffic flow, making the vulnerabilities undiscoverable, or nullify the associated exploits. And best of all, as shields are deployed on an edge compute platform in front of your application, vulnerabilities are remediated without touching your underlying application code. In fact, access to the code isn't even required, so shields can work for third-party applications, frameworks, and hosting platforms.
The power of Web Application Shielding is that it gives you room to breathe. As an LevelBlue MVP customer, you can now rapidly remove vulnerability risk across all your web applications – whether they are legacy, third-party, or custom built.
For example, if a third-party or vendor patch isn't available, it’s now no longer a problem—you can just shield it. If a component or platform upgrade is the only way to address a vulnerability (due to an outdated application no longer serviced by security patches) and it's too expensive or disruptive to upgrade, shield it. And if you require internal customer development resources or external vendors to deliver a fix, which could divert resources away from revenue-generating activities – now you’ve got the solution - shield it.
For more information on how Web Application Shielding works in the LevelBlue Managed Vulnerability Program, download the product brief to learn more.
LevelBlue is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.