Don't miss Empower 2025: Innovating Without Boundaries.

Frequently Asked Questions (FAQ)

SECURITY AND VULNERABILITIES

How Does Origina Keep Software Secure?

Origina uses a layered approach to cybersecurity to protect customers software from security vulnerabilities and threats. As a part of the strategy, Origina leverages existing Fix Packs and security patches that customers are entitled to.

Origina’s layered approach to cybersecurity avoids placing the weight of software security solely on a security patch as a silver-bullet solution to preventing all vulnerabilities from being exploited. Relying only on vendors to deliver a security patch for a security threat can leave a company vulnerable during the period of time it takes to create the patch – or if the patch is never created.

Instead, Origina helps customers develop better software security from the ground-up through a variety of established and industry-recognized tactics, which includes:

  • Service transition reviews
  • Software product hardening guides
  • Proactive vulnerability advisories
  • Virtual patching (vulnerability shielding)
  • Entitled Fix Packs and security patches
  • Workarounds (changes to the way the software or external applications function)
  • Independent code fixes

These tactics provide better protection against common and emerging security threats by implementing stronger security controls. These security techniques are widely recognized by and leveraged as a part of security frameworks such as NIST, Cyber Essentials or the CIS Top 20.

In many cases, a security vulnerability can be mitigated without touching the source code of the application. In fact, software product hardening – which tweaks parts of the application to make it more difficult to exploit – can prevent up to 85 percent of known vulnerabilities.

Learn more about Origina’s approach to software security here.

What is a Security Vulnerability?

A security vulnerability is a flaw or weakness in a software application which can be exploited by threat actors to gain access to private systems or information.

There are over 50 software security vulnerabilities that are discovered each and every day, according to Imperva. These vulnerabilities can range from critical weaknesses which require patches from the software’s vendor to fix, to low-priority errors which can be mitigated through practical techniques like security hardening and stronger configurations. Access to the source code of the application isn’t always a requirement for protecting against a security vulnerability.

Origina protects customers from security vulnerabilities within their software through a layered approach to cybersecurity that’s consistent with advice from the leading cybersecurity frameworks in the world. Origina implements strong security controls through a variety of techniques which combine to provide greater protection against the most common security vulnerabilities.

With more comprehensive protection being applied to the endpoints which may be exploited, companies avoid using security patches as a silver bullet – i.e., the last line of defense against a vulnerability. In fact, a layered approach to defending against security vulnerabilities is akin to a proactive (or preventative) cybersecurity strategy. Security patches, in this regard, are associated with a reactive strategy.

Learn more about Origina’s layered approach to cybersecurity here.

Does Origina Have Access to the OEM’s Source Code?

No, Origina does not have access to OEM source code. Instead, our independent experts develop tailored independent fixes and workarounds.

What Happens if a Vulnerability is Identified in the Source Code?

Origina delivers custom fixes or compensating controls to mitigate vulnerabilities, ensuring your environment remains secure.

How Do You Test and Validate Your Independent Workaround Fixes?

Our workaround fixes are rigorously tested in non-developments environments and validated by Origina’s global team of product experts.

Will I Be Able to Get OEM Patches After My License Entitlements Expire?

Once your OEM license expires, you will no longer have access to OEM patches, but Origina provides alternative security solutions and support.

Where Does Origina Get its Threat Intelligence?

Origina leverages global threat intelligence from industry-leading sources and partners such as SecAlliance to stay ahead of emerging threats.

Does Origina Support Customers in Maintaining Regulatory Compliance? If So, How?

Yes, Origina helps customers maintain compliance by addressing security vulnerabilities and providing detailed evidence to meet regulatory standards.

What Are Some Examples of Compensating Controls?

Compensating controls may include network segmentation, monitoring, logging, and customized security configurations to protect systems.

Has Any Origina Customer Ever Failed to Maintain Regulatory Compliance While Under Support?

No, Origina customers have successfully maintained regulatory compliance while using our services.

What is the Vulnerability Advisory Portal?

Vulnerability Advisory Portal is an enhanced service that provides more frequent, detailed updates on product vulnerabilities and actionable recommendations.

Does Origina Have an API?

Origina provides APIs for integrating our support services into your existing workflows and systems.