Since joining forces in July 2017, Patchman and SiteLock have shared the same vision of protecting every website on the internet. In November of 2017, that mission continued with the announcement of a partnership with the popular Content Management System (CMS) Joomla!. Now Patchman is proud to announce the next phase in that mission, by sponsoring a member of the Joomla! Security Strike Team (JSST). “The partnership with Patchman is very beneficial for the Joomla! security team, because it provides what our volunteer-based team needs the most: scheduled and continuous developer hours to triage new reports and develop patches,” says David Jardin, the JSST Team Lead.
Last December, Patchman announced it was bringing automated core CMS patching to eCommerce applications. Adding to their already robust eCommerce portfolio, we are pleased to announce that Patchman is now offering automated core CMS patching for PrestaShop. PrestaShop is a free open source eCommerce application designed to make online stores accessible to businesses of all shapes and sizes. The application boasts over 270,000 active sites and a community of over 1 million users in 195 countries. Through partnerships with industry leaders like Google and PayPal, PrestaShop’s mission is to help all businesses build a successful online storefront.
Patchman, best known for patching application vulnerabilities and helping hosts stop abuse before it begins, is expanding its product offering for the first time since being acquired by SiteLock in July 2017. Patchman, which is based in the Netherlands, was founded in 2015 with the goal of securing CMS applications from the hosting provider level to protect customers who did not update their applications in a timely manner. Up until now, Patchman has focused on the “Big Three” of open source content management systems – WordPress, Joomla!, and Drupal – covering core application vulnerability patches. Now, for the first time, Patchman is expanding their offerings into both ecommerce and plugins – offering patches for Magento core vulnerabilities and WooCommerce vulnerabilities.