Try our new research platform with insights from 80,000+ expert users
2021-12-13T05:32:00Z

What does the Log4j/Log4Shell vulnerability mean for your company?

EB
  • 5
  • 33
PeerSpot user
5

5 Answers

SimonClark - PeerSpot reviewer
Real User
Top 5Leaderboard
2021-12-14T09:39:07Z
Dec 14, 2021
EB
Real User
Dec 14, 2021

@SimonClark thank you for your answer and for the advice!

PeerSpot user
Search for a product comparison in Application Security Tools
ITSecuri7cfd - PeerSpot reviewer
Real User
2021-12-13T16:43:38Z
Dec 13, 2021
Jairo Willian Pereira - PeerSpot reviewer
Real User
Top 10
2021-12-13T11:53:51Z
Dec 13, 2021
EB
Real User
Dec 15, 2021
PeerSpot user
VG
Real User
Leaderboard
2021-12-21T08:01:45Z
Dec 21, 2021
EB
Real User
Dec 21, 2021

@reviewer1572348 what have you been doing or what do you recommend to mitigate the issue? 

PeerSpot user
EB
Real User
2021-12-14T07:41:29Z
Dec 14, 2021
Find out what your peers are saying about Sonar, Veracode, Checkmarx and others in Application Security Tools. Updated: January 2025.
838,533 professionals have used our research since 2012.
Application Security Tools
Application Security Tools are essential for safeguarding software applications from potential threats and vulnerabilities, ensuring data integrity and protection. These tools play a crucial role in the software development lifecycle by identifying, mitigating, and preventing potential security threats. They offer a range of functionalities, from static and dynamic analysis to runtime protection, allowing developers to maintain robust security postures. Many organizations leverage these...
Download Application Security Tools ReportRead more

Related Q&As

Related articles