Request a demo

Defending against Log4J

The Log4Shell is an internet vulnerability affecting millions of computers. It uses software called Log4j, which records all activities – or events – that take place on a computer system.

Since the legitimate use of Log4j is so widespread, it causes several serious concerns. One is that administrators often find it difficult to detect and remediate the vulnerability, and another is that hackers are still finding new ways to exploit it.

As part of our efforts to prepare your team against threats, we're offering FREE Log4j training. Learn how to defend confidently against Log4J vulnerabilities and Log4shell exploits (CVE-2021-44228 and CVE-2021-45046) using this free training module.

Getting started is simple:

  1. Fill out the form
  2. Check for an email with a link to the training module
  3. Click the link and complete the module
  4. Defend confidently

NOTE: The training module link is single-use only; once you click the link, you must complete the module before exiting your browser.

Fill out the form to receive your link to the Log4J training module