IGI CyberLabs Releases Automatic Update to its Nodeware(R) Solution that Identifies Log4j Vulnerabilities
IGI CyberLabs, a subsidiary of IMCI, announced an update to its Nodeware solution, enhancing its ability to detect Log4j vulnerabilities (CVE-2021-44228 and CVE-2021-45046). The automatic update requires users to enable credentialed scanning, significantly improving the identification of both vulnerable assets and the offending Java applications. The FTC recently warned that U.S. organizations failing to secure data against Log4Shell could face legal repercussions. Experts highlighted that this development is crucial for SMBs as they can now utilize an integrated dashboard for vulnerability management.
- Nodeware now automatically detects Log4j vulnerabilities, enhancing security for users.
- Integration of Log4j scan results into the existing Nodeware dashboard improves overall vulnerability management.
- The update positions Nodeware as a critical tool for SMBs against the Log4j threat.
- None.
Nodeware's Industry-Leading Detection Technology
Helps Protect Against Log4j Vulnerabilities
PITTSFORD, NY / ACCESSWIRE / January 12, 2022 / IGI CyberLabs, a subsidiary of IGI (OTCQB:IMCI), announces that its Nodeware solution now includes industry-leading technology to automatically and thoroughly scan for Log4j vulnerabilities.
Nodeware Agents and Sensors check for Log4j vulnerabilities (CVE-2021-44228 and CVE-2021-45046) in the widely used Log4j Java logging library. This is an automatic update and users only need to enable credentialed scanning to utilize the new detection technology.
The Log4Shell vulnerability, exposed in December, remains a high-risk situation for companies as attackers continue to take advantage of the flaw that has been given the maximum 10.0 critical severity rating.
"Nodeware Agents and credentialed scans can now pick up the updates and additional content automatically with no user intervention required," said Stuart Cohen, President of IGI CyberLabs. "This level of identification of Log4j is critical for all companies as this flaw continues to enable attackers of any skill level to remotely take control of a vulnerable system and cause serious damages."
Nodeware will now identify not only the assets with issues, but also the offending Java applications. Results from the Log4j scans will be included alongside other vulnerability data in the Nodeware dashboard and reports.
"Nodeware‘s scanning capabilities coupled with a dashboard that combines Log4J scans with other vulnerability data is paradigm changing for SMBs," said Chuck Brooks, President of Brooks Consulting International and globally recognized cybersecurity expert. "Businesses will no longer have to rely on manually prepared scripts to fight the exploits. Instead, SMBs can now use a fully integrated and automated dashboard for Program Vulnerability Management to meet the threats posed by Log4J."
This week the FTC warned that all U.S. organizations that fail to secure customer data against Log4Shell could face legal repercussions, meaning that a continuous vulnerability management solution like Nodeware is more essential than ever.
"With this additional checking for Log4j vulnerabilities within the Nodeware platform-that we've been using for years-we can now add so much more value to our customers by protecting their environments from the latest threats," said Nicholas McCourt, vCISO at Integris.
IGI Cybersecurity built Nodeware to be the most efficient, cost-effective, and lightweight vulnerability management program management solution available in the market while addressing the critical need for accurate inventory of assets, and continuous inventory, and vulnerability scanning. Nodeware is available via its network of MSPs and channel partners nationwide.
"This development from Nodeware is a game-changer for MSPs trying to keep their clients' risk as low as possible," said Janet Schijns, CEO of the JS Group. "The ability for an MSP to provide authorized scans protecting against the risks of the Log4j vulnerability is a unique ability that only Nodeware offers to the channel."
Learn more or start a free trial at www.nodeware.comor contact your technology solutions provider.
If you believe you are facing a cyber incident or are concerned you have been targeted by cyber criminals, you can contact IGI Cybersecurity for help with incident response, penetration testing, and more.
Email IR@igius.com for investment inquiries.
Safe Harbor Statement
This release may contain forward-looking statements that are based upon current expectations or beliefs, as well as a number of assumptions about future events. Although we believe that the expectations reflected in the forward-looking statements and the assumptions upon which they are based are reasonable, we can give no assurance or guarantee that such expectations and assumptions will prove to have been correct. Forward-looking statements are generally identifiable by the use of words like "may," "will," "should," "could," "expect," "anticipate," "estimate," "believe," "intend," or "project" or the negative of these words or other variations on these words or comparable terminology. The reader is cautioned not to put undue reliance on these forward-looking statements, as these statements are subject to numerous factors and uncertainties, including but not limited to: adverse economic conditions, competition, adverse federal, state and local government regulation, international governmental regulation, inadequate capital, inability to carry out research, development and commercialization plans, loss or retirement of key executives and other specific risks. To the extent that statements in this press release are not strictly historical, including statements as to revenue projections, business strategy, outlook, objectives, future milestones, plans, intentions, goals, future financial conditions, events conditioned on stockholder or other approval, or otherwise as to future events, such statements are forward-looking, and are made pursuant to the safe harbor provisions of the Private Securities Litigation Reform Act of 1995. The forward-looking statements contained in this release are subject to certain risks and uncertainties that could cause actual results to differ materially from the statements made. Readers are advised to review our filings with the Securities and Exchange Commission that can be accessed over the Internet at the SEC's website located at http://www.sec.gov, as well as IMCI's website located at http://www.igicybersecurity.com.
About IGI
Headquartered in Rochester, NY with a remote workforce spanning across the United States, IGI Cybersecurity delivers people-driven cybersecurity for personalized, resilient cyber defense focused on individualized business strategy, enterprise-wide expertise, and unshakeable partnership. We are The Cybersecurity People™.
IGI is also the OEM of the Nodeware® vulnerability management solution, an award-winning SaaS platform that continuously scans networks to identify critical vulnerabilities. Learn more at igicybersecurity.com and nodeware.com.
Media Contact:
Megan Brandow, Director of Marketing
mbrandow@igius.com
(585) 727-0983
SOURCE: Infinite Group, Inc.
View source version on accesswire.com:
https://www.accesswire.com/683177/IGI-CyberLabs-Releases-Automatic-Update-to-its-NodewareR-Solution-that-Identifies-Log4j-Vulnerabilities
FAQ
What is the latest update from IMCI regarding Log4j vulnerabilities?
How does the Nodeware solution address Log4j vulnerabilities?
What are the implications of the FTC warning related to Log4j?
What benefits does the Nodeware update provide to SMBs?