SEE DEMO

February 9, 2022

Log4Shell Peace of Mind in Minutes, Not Weeks

by Dawn Slusher

Discovered on December 9, 2021, the log4Shell vulnerability is one of the most talked-about vulnerabilities in computing. Because simple text can be used to take control of a device and download anything that is Internet-accessible, companies are taking it seriously. As they should – log4Shell has the maximum CVSS score of 10 (CVSS, Common Vulnerability Scoring System, is an industry-standard for ranking vulnerabilities).

The threat is real, and so is the hunt for information – a Google search turns up almost 4 million results. It’s likely that every enterprise is impacted at some level, and most teams have taken the obvious steps to protect themselves. 

But given that most global enterprises have hundreds of devices that have simply been forgotten – it’s very likely that there are entry points lurking unbeknownst in your network. 

One of our customers, a global enterprise with 20 data centers and hundreds of thousands of devices, ran a scan to detect vulnerable devices. The scan turned up a vulnerable host, but the team didn’t know its physical location. When your network spans the globe, trying to find one IP address is like flying into a city trying to find one person by going door to door. It’s not a task many people would want, but the company needed to locate and remediate the host. 

The security leader responsible for remediation didn’t have weeks to track this device down. Instead, he ran a simple search in Forward Enterprise that located the device in seconds. It was a ghost server in a lab that everyone thought was decommissioned.

Rather than being vulnerable for weeks and spending countless hours trying to track the device down, they identified the problem, located the device, and powered it down the same day – and they were able to do all of this in a “self-service” fashion because the Forward interface is easy to use and understand. 

In addition to the saved hours – they know with mathematical certainty that the vulnerability is remediated and they are no longer at risk.  

Learn more about how Forward Enterprise can help your security operations team remediate log4Shell by reading the use case.

Or, if you have no time to waste (and who does?), request a demo and we’ll show you exactly how we can help in your situation.

Subscribe to our blog!

RELATED FORWARD CONTENT 
May 10, 2022
In Case You Missed It …

ONUG Spring 2022 is in the books. What a great event! Being able to meet with networking experts in person feels like such a treat after everything we’ve been through. The best thing about ONUG events is the cornucopia of informational sessions. Even if you were there, you probably didn’t get to go to all […]

Read More
April 20, 2022
If you are concerned about Cloud Security, visit us at ONUG Booth 43.

Spring is in the air and that means that ONUG Spring is right around the corner! At Forward Networks, it’s feeling a little like Christmas in April because we’re so excited to meet in-person, and we hope you feel the same. Our booth is polished, our presenters are on fire, and our capabilities for solving […]

Read More
March 30, 2022
How to decide if a network digital twin is right for your company – Consider these ten questions

Interest in digital twin technology is on the rise, likely driven by the pressure placed on IT teams to ensure that their networks are predictable, agile, and secure. Network and security operations teams are actively investigating how implementing a digital twin can help their teams become more proactive and provide confidence that the network will […]

Read More

Forward Networks

Mathematically-accurate network modeling trusted by the world's largest networks.
CONTACT SALES
crossmenu linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram