Virtual patching is a mechanism that excludes the possibility of using the vulnerability in software and does not require changes to the source code of the software. This mechanism is implemented in the security layer, which performs analysis and filtering of incoming traffic.

Virtual patching - protects the site applications from uncorrected vulnerabilities, detecting attempts to exploit vulnerabilities, which allows not to disrupt the operation of the web application. The application of virtual patching rules allows developers to quietly fix vulnerabilities, without the need for an urgent change of code (which can lead to security problems.) Virtual patching allows you to «on the fly» to block all attempts to exploit a known vulnerability by specifically controlling the attack zone.

Because virtual patches are created for a known vulnerability, this approach allows you to apply an individual set of security measures in the absence of false positives. Virtual patching rules are created for known vulnerabilities (for example, CMS), as well as for vulnerabilities revealed by Nemesida Scanner scanning.

While Nemesida WAF detects and blocks a wide range of vulnerabilities, the use of virtual patching can significantly narrow the scope of the blocking rule by minimizing false positives. Based on virtual patching, new signature methods for blocking attacks can be created.