No more typing reviews! Try our Samantha, our new voice AI agent.

What does the Log4j/Log4Shell vulnerability mean for your company?

EB
Director of Community at PeerSpot (formerly IT Central Station)
  • 4
  • 100
PeerSpot user

5 Answers

Last answered Dec 21, 2021
SimonClark - PeerSpot reviewer
Cyber Security Advisor - Director at Fort Net UK
Real User
Top 5
Dec 14, 2021
EB
Director of Community at PeerSpot (formerly IT Central Station)
Real User
Dec 14, 2021

@SimonClark thank you for your answer and for the advice!

PeerSpot user
Search for a product comparison in Application Security Tools
ITSecuri7cfd - PeerSpot reviewer
IT Security Coordinator at a healthcare company with 10,001+ employees
Real User
Dec 13, 2021
Jairo Willian Pereira - PeerSpot reviewer
Information Security Manager at a retailer with 10,001+ employees
Real User
Top 5
Dec 13, 2021
EB
Director of Community at PeerSpot (formerly IT Central Station)
Real User
Dec 15, 2021
PeerSpot user
VG
Chief Architect at Peristent Systems
Real User
Dec 21, 2021
EB
Director of Community at PeerSpot (formerly IT Central Station)
Real User
Dec 21, 2021

@reviewer1572348 what have you been doing or what do you recommend to mitigate the issue? 

PeerSpot user
EB
Director of Community at PeerSpot (formerly IT Central Station)
Real User
Dec 14, 2021
Find out what your peers are saying about SonarSource Sàrl, Checkmarx, Veracode and others in Application Security Tools. Updated: February 2026.
885,667 professionals have used our research since 2012.
Application Security Tools
Application Security Tools are essential for organizations looking to protect their software applications from vulnerabilities that could lead to breaches or exploits. These tools provide automated solutions for identifying, managing, and mitigating risks associated with application vulnerabilities.These tools have gained recognition for their ability to integrate seamlessly into development pipelines, providing security teams with real-time data on potential risks. They support multiple...
Download Application Security Tools ReportRead more

Related Q&As