The complexity of the Log4j vulnerability is still being unraveled as the Java-based logging utility represents another huge broadside to IT and security departments.
Watch the video to learn how Palo Alto Networks’ Unit 42 Log4Shell Compromise Assessment team can help your organization identify, investigate, and contain potentially affected systems. Contact a security consultant at Novalis to discuss flexible pricing and implementation options.