Discovered on December 9, 2021, the log4Shell vulnerability is one of the most talked-about vulnerabilities in computing. Because simple text can be used to take control of a device and download anything that is Internet-accessible, companies are taking it seriously. As they should – log4Shell has the maximum CVSS score of 10 (CVSS, Common Vulnerability Scoring System, is an industry-standard for ranking vulnerabilities).

The threat is real, and so is the hunt for information – a Google search turns up almost 4 million results. It’s likely that every enterprise is impacted at some level, and most teams have taken the obvious steps to protect themselves. 

But given that most global enterprises have hundreds of devices that have simply been forgotten – it’s very likely that there are entry points lurking unbeknownst in your network. 

One of our customers, a global enterprise with 20 data centers and hundreds of thousands of devices, ran a scan to detect vulnerable devices. The scan turned up a vulnerable host, but the team didn’t know its physical location. When your network spans the globe, trying to find one IP address is like flying into a city trying to find one person by going door to door. It’s not a task many people would want, but the company needed to locate and remediate the host. 

The security leader responsible for remediation didn’t have weeks to track this device down. Instead, he ran a simple search in Forward Enterprise that located the device in seconds. It was a ghost server in a lab that everyone thought was decommissioned.

Rather than being vulnerable for weeks and spending countless hours trying to track the device down, they identified the problem, located the device, and powered it down the same day – and they were able to do all of this in a “self-service” fashion because the Forward interface is easy to use and understand. 

In addition to the saved hours – they know with mathematical certainty that the vulnerability is remediated and they are no longer at risk.  

Learn more about how Forward Enterprise can help your security operations team remediate log4Shell by reading the use case.

Or, if you have no time to waste (and who does?), request a demo and we’ll show you exactly how we can help in your situation.

There’s a lot of upside to becoming an application-centric business. You can increase collaboration, work more effectively with your data, deliver an optimal customer experience, and much more. One major downside, though, is that your network and security operations teams are under intense pressure to provision new applications both quickly and securely.


Despite the business’s need to move fast, verifying that new applications adhere to corporate security policy is typically a manual process that can cause significant delays. Worse, even after thorough consultation of the SecOps playbook or a spreadsheet-based security matrix, security risks with apps can still arise. And we all know how much today’s attackers love to exploit vulnerabilities in applications.


Here’s a thought: To ease the burden on security teams, increase the speed of app deployment, and improve accuracy in the verification process, why not provide application developers a self-service platform that lets them confirm their apps are compliant?


We believe in making hard things easy, and ensuring that enterprise networks are agile, predictable, and secure. Forward Enterprise is designed to help enterprises speed up application deployment while ensuring security through automated secure application provisioning. Our platform curates firewall security rules and presents them in an easy-to-read matrix that enables rapid compliance assessments, so the teams responsible for developing and provisioning apps can catch issues early and remediate them fast.


And don’t worry — your app developers don’t need advanced networking knowledge to use automated secure application provisioning. Once security teams write an intent check to automatically ensure an application is within policy, developers can use the check to verify their app meets security policy connectivity guidelines. If the app passes the check, they can deploy with confidence. And if it fails, they’ll get details why so they can quickly make the right adjustments.


One tip: Be prepared to condense your timelines for new app deployment after teams start using automated secure application provisioning. One customer we work with said that it allowed them to launch a new credit card business in three months versus one year — talk about acceleration!


To learn more about how this time-saving functionality in Forward Enterprise works, see our use case.

Top cross