What is virtual patching?

Virtual patching is a security measure that is used to immediately close security gaps in software or web applications without having to wait for official updates or patches from the provider. This is done by implementing virtual patches or security rules at the security infrastructure level, such as a Web Application Firewall (WAF) or a reverse proxy.

Unlike traditional patching methods that require time to develop, test and implement, Virtual Patching enables immediate protection against known vulnerabilities. This is particularly important because security vulnerabilities can often be quickly exploited by attackers before official patches are available. Virtual patching has particularly great advantages in the case of zero-day attacks, as the newly discovered vulnerability can be fixed immediately and digital services can continue to operate even if no official updates are yet available.

Implementing virtual patches is done by creating security rules that monitor traffic and detect and block specific attack patterns. These rules are dynamically and continuously updated to respond to new threats and ensure the security of the application.

Airlock Secure Access Hub offers Virtual Patching as part of its security features. Using a reverse proxy approach with multi-level filtering and dynamic whitelist filtering, Airlock enables effective implementation of virtual patching to protect applications from known and unknown security vulnerabilities. Learn more about Airlock Secure Access Hub's virtual patching capabilities at the following link: Airlock Secure Access Hub - Virtual Patching.

Information for you

-Our whitepapers-

Study Application and API Security 2022

In a recent study in cooperation with CIO, CSO and COMPUTERWOCHE, Ergon Airlock looked at application and API security in the container environment.

Request study

Zero Trust is a journey

The digital transformation of the world continues to progress, and it is profoundly affecting private life and job profiles in a manner that was hard to imagine just a few years ago.

This whitepaper covers the effects of continuous digitization and its implications.

Request free of charge

Toward DevSecOps

In this whitepaper, you will learn the most important insights into how you can successfully and efficiently implement DevSecOps, which security components are required for this, and what benefits a microgateway architecture brings.

Request free of charge

Airlock 2FA - Strong Authentication. Easy.

The two-factor authentication in the area of IT security offers double the security.

Find out more about strong authentication and the possibilities that Airlock offers in our whitepaper.

Request free of charge

Further whitepapers

We provide whitepapers on these and other topics free of charge:

  • successful IAM projects
  • Compliance
  • Data protection (GDPR)
  • Introduction of PSD2
  • PCI DSS requirements
Request free of charge