At Origina, we prioritize proactive security with a multi-layered approach that combines cutting-edge technology and strategic foresight. We ensure continuous protection against vulnerabilities and threats, all while eliminating forced upgrades and empowering you to take control of your IT ecosystem.
UPGRADE YOUR SECURITYOrigina employs a multi-layered security strategy, drawing on the best elements of leading cybersecurity frameworks to protect your software from emerging threats. This approach helps you avoid the risks of relying on vendor-supplied security patches that may never come, creating a robust system of checks and balances to minimize exposure and ensure lasting protection.
Origina’s layered approach to cybersecurity begins during onboarding with a service transition review. Each security incident is reviewed through a risk assessment to identify what the risk is, if the customer is affected and how Origina can mitigate the threat.
Origina’s holistic approach to cybersecurity starts on the journey to becoming a customer. The service transition review identifies potential concerns and threats to business operation before onboarding.
LEARN MOREProduct hardening guides enable security teams to identify and treat security and compliance issues at the architectural level of the software. Implementing these controls can vastly strengthen a product’s security and will limit exposure to 85 percent of all known vulnerabilities.
LEARN MOREStaying informed of the latest security vulnerabilities that impact a digital estate is critical to securing it. In the same way, companies are notified of application risks by the vendor, Origina’s proactive vulnerability advisories deliver timely notifications of emerging threats and actionable guidance on how to mitigate them.
LEARN MOREAdvisory support to help your team identify, verify, retrieve, and securely store entitled software versions and fixes within your environment before vendor support expiry.
LEARN MOREThe service transition review, product hardening and vulnerability advisories form a strong foundation for a layered approach to cybersecurity. Origina’s Independent Solutions fill any gaps that may still exist. Every security threat Origina encounters in a customer’s digital estate is treated through a risk-based approach. After identifying and assessing the vulnerability, Origina resorts to a series of possible solutions to resolve it. These include entitled fixes, vulnerability shielding*, workarounds and independent code.
*Available for IBM and HCL software products.
LEARN MOREOrigina’s first step in mitigating security risks is to determine whether an existing customer entitlement includes a relevant fix or update.
LEARN MORE
Before a customer leaves IBM, HCL, or VMware Subscription & Support, we provide guidance and checklists to help their team identify, retrieve, and securely store all entitled versions and patches within their environment. Where a customer is entitled to—and has downloaded—an OEM-supplied fix, the assigned Global Independent Expert will advise on validation and correct application to address the vulnerability.
Using the ModSecurity Web Application Firewall (WAF) and the Core Rule Set (CRS), Origina can shield companies’ IBM and HCL software products from known and unknown vulnerabilities.
LEARN MORE
The WAF monitors incoming traffic and parses out potential threats by matching the traffic against known indicators of vulnerabilities. Once it identifies behavior associated with exploiting vulnerabilities, it immediately stops that traffic – even if the vulnerability isn’t yet published or if a security patch isn’t yet available from the vendor.
When an entitlement to an existing OEM patch is not available, Origina’s Global Independent Experts will look to develop a workaround for the software weakness.
LEARN MORE
A workaround is a mitigation that does not use independently developed code. Workarounds can include secure reconfiguration, disabling nonessential features, or making changes in adjacent systems or infrastructure. In many cases, a well-designed workaround can provide timely and effective risk reduction.
Where a workaround can’t resolve a security vulnerability, Origina will turn to independent code. These are proprietary, bespoke scripts that function the same as the OEM software vendor’s security patch would.
LEARN MORE
These proprietary scripts function without infringing on the intellectual property of IBM, HCL, or VMware, and without modifying the software’s source code. Every independent code solution undergoes a tried and tested process to ensure the result successfully mitigates the cyber threat.
When a security vulnerability is identified, Origina takes a proactive, four-step, risk-based approach to assess its potential impact, prioritize the threat, and implement effective mitigation strategies to safeguard our customers’ systems.
A review and assessment of the identified vulnerability is conducted to evaluate if the customer is exposed.
The customer’s entitlement inventory is reviewed to confirm whether an applicable vendor patch exists and has already been retrieved and stored by the customer.
Where no applicable vendor patch exists, a workaround is designed and recommended by our Global Independent Experts to mitigate exposure.
Where a workaround is not feasible, an independent, non-invasive code-based mitigation is developed by our Global Independent Experts to address the issue.