Virtual patching

Virtual patching is a security technique that enables the temporary mitigation of vulnerabilities in software or applications until a permanent patch is made available. It is used to provide a quick response to vulnerabilities that could potentially be exploited by attackers, especially in cases where it is not feasible or practical to wait for the vendor or software provider to issue a patch.

Virtual patching can be used to mitigate various types of attacks such as SQL injection, cross-site scripting, and file inclusion attacks, among others. By applying specific rules to incoming web requests, virtual patching helps prevent malicious traffic from reaching the targeted application.

Peakhour provides virtual patching for common application-specific vulnerabilities. This approach is especially useful when an application has a known vulnerability that is being actively exploited by attackers. Instead of waiting for a vendor patch, Peakhour can quickly provide a virtual patch that helps protect against the specific vulnerability.

One key advantage of virtual patching is that it can be implemented quickly, without the need to take the application offline. This means that organizations can maintain their application's availability while still providing a level of protection against known vulnerabilities.

The importance of timely virtual patching cannot be overstated. Attackers are always looking for new vulnerabilities to exploit, and once a vulnerability is discovered, attackers may move quickly to exploit it. In addition, the time it takes for a vendor to issue a patch can be significant, leaving the application vulnerable during that time. Peakhour addresses this issue by updating its rules every 5 minutes from upstream sources, ensuring that its clients have the most up-to-date protection against the latest threats.

In summary, virtual patching is a valuable security technique that helps provide temporary protection against known vulnerabilities in applications. Peakhour's use of virtual patching for common application-specific vulnerabilities, coupled with timely rule updates, ensures that its clients are well-protected against the latest threats.