SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
IBM Software                                      February 2011
Thought Leadership White Paper




Rewriting the rules of patch
management
IBM Tivoli Endpoint Manager shifts the patching
paradigm
2    Rewriting the rules of patch management




Contents                                                  Introduction
                                                          Malware attacks are in a race against time to exploit vulnerable
    2 Introduction
                                                          computer systems before software vendors publish patches and
    3 The patch management conundrum                      their customers can apply them. When malware wins the race,
                                                          organizations lose productivity and risk loss of sensitive data,
    4 Changing the patch management paradigm              potential litigation and regulatory fines. The sheer enormity of
                                                          the problem is alarming—the ongoing battle between hackers
    9 Why it works
                                                          and software companies costs the U.S. economy an estimated
10 Continuous compliance                                  $266 billion annually, according to the Cyber Secure Institute, a
                                                          Washington, D.C.-based advocacy group.1
11 How customers are using it
                                                          To combat this threat, more and more software vendors are issu-
12 A comprehensive portfolio of compliance and security
   solutions                                              ing more and more patches in attempts to keep pace with
                                                          the frenzy of malware exploits. Unfortunately, most organiza-
13 Conclusion                                             tions are not equipped to handle this onslaught of patches in a
                                                          time- and cost-effective manner. Because of organizational
13 For more information
                                                          processes, it takes most IT departments weeks or even months to
13 About Tivoli software from IBM                         deploy patches throughout the environment. According to some
                                                          estimates, it can take organizations as long as four months to
                                                          achieve a 90 to 95 percent patch compliance rate. By then,
                                                          countless additional patches have been issued, meaning that
                                                          organizations are perpetually at high risk and out of compli-
                                                          ance—and the situation only gets worse over time.
IBM Software   3




Patch management has always been an uphill climb because of            The patch management conundrum
the massive complexity involved. Despite the risks, some organi-       Patch management seems straightforward and yet is one of the
zations are reluctant to patch because of the time and labor           most complex and critical challenges an organization faces. The
required, plus the potential of disrupting business operations. In     nuances of effective patch management run much deeper than
an organization with a heterogeneous hardware and software             simply having a system administrator push out patches or relying
environment, staying on top of the multitude of patches—and            on vendor-supplied patch mechanisms, hoping that they will be
issuing them in a timely manner—can overextend IT staff and            successfully applied but never knowing for sure. The patch man-
budgets. What is needed is a rapidly deployable, cost-effective,       agement conundrum raises questions that many organizations
policy-based patch management solution that:                           may find difficult—if not impossible—to answer. For example:

●   Works for all endpoints in organizations of all sizes, including   ●   How should an organization deploy critical “out-of-band”
    the very largest.                                                      patches that arrive urgently and off the routine patch
●   Supports multiple vendors, operating systems, applications and         schedule?
    platforms.                                                         ●   How can system administrators keep track of patches in an
●   Works over low-speed connections and supports devices that             environment with hundreds or hundreds of thousands of end-
    roam outside of the organizational network.                            points running a variety of operating systems and applications?
●   Minimizes the demand on IT staff.                                  ●   How are system administrators supposed to monitor the status
●   Operates in real time, deploying patches organization-wide in          of roaming laptops and other mobile devices?
    hours.                                                             ●   How long will the patching process take from start to finish,
                                                                           and how will system administrators confirm (and prove) that
IBM Tivoli® Endpoint Manager, built on BigFix® technology,                 every endpoint in their infrastructure has been properly
combines the separate pieces of the patch management puzzle                patched—and stays that way?
into an intelligent, simplified solution that streamlines and opti-     ●   How can system administrators quickly test patches before
mizes the process of researching, assessing, remediating, con-             deploying them and roll them back if they cause problems?
firming, enforcing and reporting on patches.                            ●   How can patches be deployed without interfering with end-
                                                                           user experience and productivity?
4   Rewriting the rules of patch management




While surveys show that patch management is one of the most
important security priorities for organizations, these questions                   Patch management process
indicate just how many barriers organizations face when imple-
menting effective patch management practices. Between a lack of
visibility and personnel, potential business impact, network
bandwidth limitations, lack of manageability, long remediation                                       Research
times, scalability issues, and coverage for different platforms,
third-party applications and roaming endpoints, the hurdles are
many.
                                                                            Report
                                                                                                                              Assess
Fortunately, these hurdles are surmountable. Tivoli Endpoint
Manager removes these obstacles with a comprehensive solution
that is purpose-built for highly distributed, heterogeneous envi-
                                                                                      IBM Tivoli Endpoint Manager
ronments. With this solution, organizations can finally see,
change, enforce, and report on patch compliance status in real
time, on a global scale, through a single console.
                                                                         Enforce
                                                                                                                           Remediate




                                                                                                Confirm




                                                                    With Tivoli Endpoint Manager, patch management becomes a fully unified,
                                                                    closed-loop process that helps enhance security and save money.
IBM Software   5




Changing the patch management                                        Step 1: Research
paradigm                                                             Before: The first step in the patch management process involves
While there is no single, official patch management best prac-       discovering which patches are available. This includes research-
tice, the general approach involves a closed-loop process with six   ing patch availability through vendor email messages, application
basic steps: research, assess, remediate, confirm, enforce, and       pop-up notifications, websites, blogs, and a variety of other
report. Historically, many of these steps were implemented via       sources. This process must be repeated weekly—or even daily—
separate, non-integrated technologies, making it virtually impos-    for hundreds of patches, across scores of operating system,
sible to create a closed-loop, real-time patch management            application and anti-malware vendors. One alternative—relying
process. Tivoli Endpoint Manager provides all of these steps as      on default vendor auto-updates—may lead to mistakes that can
part of a unified, fully integrated process that can help enhance     have negative consequences, because automating acceptance of
security and save money, time, and resources.                        patches without testing them can put organizations at huge risk,
                                                                     there is no enterprise control over timing or reporting, and rely-
Here is a before-and-after look at how this solution changes the     ing on users to apply updates is risky and unreliable.
rules for patch management.
                                                                     A better approach is to have a patch management vendor pro-
                                                                     vide a consolidated stream of the most common patches so that
                                                                     the organization only needs to evaluate each load of patches as
                                                                     they come in, test them for compatibility with the organizational
                                                                     environment, and then deploy them via highly granular policies
                                                                     targeted to specific machine profiles, because it allows specific
                                                                     patches to be applied only to the endpoints that need them. The
                                                                     problem with this approach is that if not automated, it requires
                                                                     significant time and resources that organizations may not have.
6   Rewriting the rules of patch management




After: IBM acquires, tests, packages and distributes patches from    Step 2: Assess
operating system, anti-malware and common third-party appli-         Before: For each identified patch, the IT organization must
cation vendors directly to customers, removing considerable          determine the applicability and criticality of the update, identify-
patch management research overhead. When a supported ven-            ing which endpoints need patching across the organization. In
dor releases a new patch, IBM receives the patch, conducts           the case of security updates, this critical data translates directly
preliminary analysis and creates patch policies, called              into risk, as business risk increases with the number of un-
IBM Fixlet® messages, which wrap the update with policy infor-       patched endpoints. Many organizations do not have access to the
mation such as patch dependencies, applicable systems, and           complete, current asset and configuration data set required to
severity level. Fixlets are then automatically sent to Tivoli        quantify the scope and impact of patches across the organization.
Endpoint Manager customer servers. The solution also provides        There are tools that can help acquire this data, but many require
a process wherein customers can configure the product to down-        days or weeks to collect and collate this information by scanning
load patches directly from vendor sites or store the patch content   every endpoint on the network—and many roaming endpoints
locally; customers may also create their own custom Fixlets using    are rarely connected to the network—a process which can take
a wizard-driven interface. This process works for virtually any      days to complete. This information must be immediately avail-
update, including internal application patches.                      able to system administrators at the time of patch release since
                                                                     many patches are time critical, and the process of risk assessment
                                                                     and patch prioritization must take place as quickly as possible.
IBM Software   7




After: With Tivoli Endpoint Manager, a single intelligent soft-       Step 3: Remediate
ware agent is installed on all managed endpoints to continuously      Before: After a patch is assessed and a determination is made to
monitor and report endpoint state, including patch levels, to a       distribute it across the organization, it must be packaged and
management server. The agent also compares endpoint compli-           tested to ensure that it will not conflict with other patches and
ance against defined policies, such as mandatory patch levels and      third-party software installed on the target endpoints. Patch pre-
standard configurations. This information is especially critical       requisites and dependencies, such as minimum service pack lev-
during emergency patch scenarios when a vendor releases a             els, must also be determined. This is usually accomplished by
highly critical, out-of-band patch, and organizations must rapidly    applying and testing the update on a select number of endpoints
quantify the overall magnitude and risk from the related              before a general release—a process that can take days or weeks
exploit(s). In one example, a customer using Tivoli Endpoint          to complete using manual tools. Once testing indicates that the
Manager installed agents on 5,100 endpoints and discovered that       patch is probably safe for organization-wide deployment, it is
over 1,500 (30 percent) of their endpoints were missing at least      applied to affected endpoints, typically in batches, further
one critical patch. Taken as a whole, endpoints across the institu-   extending the patch window. Long remediation times are prima-
tion were missing 20,033 “critical” patches—an average of             rily due to the inability to rely on patch quality, and secondarily
13 patches per endpoint. Once the total number of patches is          due to unreliable distribution mechanisms, both of which result
mapped to the endpoints that need them, and the business              in low first-pass patch rates. Most organizations are therefore
criticality is defined, the IT organization can proceed to the         forced to proceed slowly in case a patch causes an unforeseen
remediation step.                                                     problem, as well as to ensure that network links are not
                                                                      overwhelmed by the patch distribution process. As a result,
                                                                      remediation is often difficult to accomplish quickly and
                                                                      effectively on an organizational scale.
8   Rewriting the rules of patch management




Another major problem is that many patch management tools             After: When IBM publishes new patch Fixlets via Tivoli
only work for Microsoft® Windows® due to dependencies on              Endpoint Manager, organizations can determine the scope of the
Microsoft tools like Windows Server Update Services (WSUS).           update by creating a report in minutes that shows which end-
Many tools also require deep platform expertise and highly            points need the update. The patch Fixlets include distribution
trained personnel to operate them. Many of these tools do not         instructions, including OS, version, and prerequisite require-
work until endpoints are connected to a high-speed corporate          ments, eliminating the need for IT to “package” and thoroughly
network, leaving roaming laptops and other mobile endpoints           test the patch. Operators can then spend a few minutes deter-
out of the update cycle for long periods. Many do not provide         mining when the patch should go out, what notification to
the fine-grained, policy-based controls that operators need to         display to end users (if any), whether or not to allow users to
effectively deploy patches to all affected endpoints in the organi-   delay a patch implementation and for how long, and whether to
zation. Controls such as patch installation time windows,             force (or delay) reboots. Within minutes, the endpoint agent
whether or not a user must be present, reboot options, the            receives the new policy and immediately evaluates the endpoint
method of distribution (including bandwidth and CPU throt-            to determine if the patch is applicable, and if so, it downloads
tles), system type, and user notification options must be available    and applies the patch, reporting back success or failure within
inputs into the automated update processes.                           minutes. This approach, combined with Tivoli Endpoint
                                                                      Manager’s relay structure and ability to reach Internet-connected
                                                                      devices, significantly reduces network load and improves
                                                                      first-pass success rates to 95+ percent.
IBM Software   9




The solution also provides a highly secure mechanism that             Many products do not provide confirmation that patches are
employs cryptographic identities, ensuring that only authorized       applied—or if they do, it can take days or even weeks to obtain
administrators can create and distribute policies. Moreover, since    an organization-wide report. Even worse, some tools incorrectly
no Active Directory dependencies exist, Tivoli Endpoint               report that patches are applied when in fact the files were down-
Manager administrators do not need to be Active Directory             loaded but the patch was not actually applied. With this amount
domain administrators. The solution stores audit information          of delay and uncertainty, some endpoints are often left exposed,
that tracks who ordered which policies to be applied to which         leaving a significant window of vulnerability.
endpoints, and does not require specific operating system expert-
ise for operators that initiate the remediation process. Any Tivoli   After: Once a patch is deployed, the Tivoli Endpoint Manager
Endpoint Manager operator with a few hours of basic training          agent automatically and continuously reassesses the endpoint sta-
can safely and rapidly patch Windows, Linux®, UNIX®, and              tus to confirm successful installation, immediately updating the
Mac operating systems with no domain-specific knowledge or             management server in real time (or in the case of roaming
expertise.                                                            devices, at the earliest opportunity). This step is critical in sup-
                                                                      porting compliance requirements, which require definitive proof
Step 4: Confirm                                                        of continuous patch installation. With this solution, operators
Before: After patches are scheduled to be applied, successful         can watch the patch deployment process in real time via a cen-
installation must be confirmed so that IT knows when the patch         tralized management console, receiving confirmation of patch
cycle is complete, and to support compliance reporting require-       installation within minutes of initiating the patch process.
ments. This data should be communicated back to a central             Closing the loop on patch deployment enables organizations to
reporting system that updates personnel on the process, includ-       ensure patch compliance in a way that is smarter, faster and
ing exceptions, in real time. However, many patch management          much more reliable.
technologies do not effectively perform this process, requiring
weeks to re-scan all endpoints and even longer to correct excep-
tions. This lag time introduces significant uncertainty around the
organization’s overall business risk and compliance posture.
10 Rewriting the rules of patch management




Step 5: Enforce                                                       Administrators enjoy full control of their endpoints, allowing
Before: After the initial application, many updates do not always     them to handle many times the quantity of work of other prod-
“stick.” Users intentionally or accidentally uninstall patches, new   ucts that require significant manual intervention and introduce
applications or patches may corrupt existing updates, malware         significant time lags into the reporting process.
may deliberately remove patches, or problems created by the
update may necessitate a rollback. Patch management technolo-         Step 6: Report
gies must continuously monitor machines to ensure compliance          Before: Reporting is a critical component of the patch manage-
with update policies, providing rapid, policy-based rollback capa-    ment process. Compliance and corporate policies require highly
bilities in the event of a major patch problem. If a patch is         detailed, up-to-date dashboards and reports that indicate the
removed contrary to security policy, it must be immediately rein-     organization’s risk position and patch management status
stalled, and if a patch creates a major problem after application,    for a variety of consumers, including compliance auditors,
organizations must also be able to issue a rapid mass rollback.       executives, management and even end users. Without an overall
Without the proper tools, this step becomes next to impossible.       solution, there is no clear-cut way to report on patch status
                                                                      organization-wide.
After: The Tivoli Endpoint Manager intelligent agent continu-
ously enforces patch policy compliance, ensuring that endpoints       After: Tivoli Endpoint Manager’s integrated web reporting
remain updated. If a patch is uninstalled for any reason, the pol-    capabilities allow end users, administrators, executives, manage-
icy can specify that the agent should automatically reapply it to     ment and others to view up-to-the-minute dashboards and
the endpoint as needed. In the event of problems with a patch,        reports that indicate which patches were deployed, when they
Tivoli Endpoint Manager administrators can quickly and easily         were deployed, who deployed them, and to which endpoints.
issue a rollback to endpoints—either en masse or to a select few.     Special “click through” dashboards show patch management
Through the same centralized console, endpoint compliance sta-        progress in real time.
tus is reported in real time, allowing IT administrators to easily
monitor the state of all managed endpoints in the organization.
IBM Software 11




                                                                     Why it works
                                                                     Traditional patch management approaches utilizing manual
                                                                     processes and cumbersome scan- and poll-based mechanisms are
                                                                     no longer fast or cost-effective enough to meet business and reg-
                                                                     ulatory requirements, leaving organizations with unacceptably
                                                                     high risk and costs. Many organizations that try to utilize “free”
                                                                     or low-cost vendor tools such as Windows Server Update
                                                                     Services (WSUS) quickly realize that these solutions are not
                                                                     enterprise-class. They are limited to a single vendor, do not pro-
                                                                     vide organizational control over what patches go where and
                                                                     when, are disruptive to the end user, and offer poor reporting
                                                                     that does not reflect real-time status. WSUS is a perfect example
                                                                     of a point product used to accomplish just one step in the patch
                                                                     management process outlined above, yet it is used because it is
                                                                     viewed as “free.”

                                                                     Microsoft has introduced regular patch release cycles, known as
                                                                     “Patch Tuesdays,” which have unfortunately also spawned “Hack
                                                                     Wednesdays,” during which cyber criminals are provided golden
                                                                     opportunities to exploit un-patched endpoints without having to
                                                                     work to uncover new vulnerabilities. Endpoints not immediately
                                                                     patched become a window of opportunity for criminals—and a
                                                                     window of organizational risk. Moreover, organizations need to
                                                                     manage updates for a wide variety of vendor products and hard-
                                                                     ware form factors—not just Windows.




Dashboard reports in Tivoli Endpoint Manager show patch management
progress in real time.
12 Rewriting the rules of patch management




Tivoli Endpoint Manager leads the market in terms of breadth           Another key aspect of the architecture is support for endpoints
of coverage, speed, automation and cost-effectiveness, providing       that are on and off the corporate network. Roaming devices like
comprehensive operating system and third-party application             laptops, for example, can receive patches via any Internet
patches. The solution, which includes deploying a single multi-        connection such as Wi-Fi or even dialup. The patch manage-
purpose, lightweight intelligent agent to all endpoints, supports a    ment process is virtually transparent to the user, and IBM Fixlet
wide variety of device types ranging from servers to desktop           messages control the total amount of bandwidth and CPU
PCs, “roaming” Internet-connected laptops, and specialized             consumed by the endpoint agent, which is location- and connec-
equipment such as point-of-sale (POS) devices, ATMs and self-          tion-aware to optimize network usage.
service kiosks.
                                                                       Continuous compliance
A single management server can support up to 250,000 end-              Many organizations need to establish, document and prove com-
points, regardless of their location, connection type and speed or     pliance with patch management processes in order to comply
status, and additional servers can provide virtually unlimited scal-   with governmental regulations, service level agreements (SLAs)
ability. Policy-based controls provide IT administrators with          and corporate policies. Regulations such as Sarbanes-Oxley, PCI
fine-grained, highly automated patch management capabilities,           DSS and HIPAA/HITECH require that a regular, fully docu-
and comprehensive reports support compliance requirements.             mented patch management process be in place, and proof of
Policy compliance is continuously assessed and enforced by the         continuous compliance is necessary in order to pass audits.
intelligent agent, regardless of endpoint connectivity to the net-     Unfortunately, many organizations spend an enormous amount
work. Other products are back-end heavy, requiring massive             of time and resources on patch management, yet still cannot
amounts of hardware and personnel to support deployments—in            meet compliance requirements. The ability of Tivoli Endpoint
many cases, dozens, scores or even hundreds of servers, multiple       Manager to enforce policies and quickly report on compliance
agents per endpoint, and an army of operators—to support the           can help improve an organization’s audit readiness and pass rates.
same environment that Tivoli Endpoint Manager handles with
one management server, one endpoint agent, and as little as
1/20th of the personnel.
IBM Software 13




How customers are using it                                         ●Entergy IT, which must comply with SLAs that require
Organizations are meeting the challenges of patch management        patch deployment across more than 22,000 endpoints within
head-on using Tivoli Endpoint Manager. For customers, the           a 10-day window of release, has deployed over 4.9 million
results have included faster deployment, better compliance,         patches across the enterprise since 2004—and has not missed a
reduced IT costs and shorter management cycles.                     single SLA during this time.
                                                                   Challenge: Reducing IT costs
Challenge: Deploying patch management in days or weeks—not         ●BGC Partners eliminated expensive travel to remote service
months or years                                                     branch offices across six continents, saving tens of thousands of
● Albany County, NY, consolidated a number of patch and con-        dollars.
  figuration management tools in just two days.                     ●Tax Tech reduced patch management full-time equivalents
● O’Charley’s Restaurants deployed patches to over 350 restau-      (FTEs) by 20 to one.
  rants in just four days.                                         ●Stena Lines achieved a 12:1 labor savings ratio by reducing
● SunTrust Banks implemented a solution to 50,000 endpoints         administrative overhead time for patch processes from
  spread across nearly 1,800 locations in three months with just    240 hours to 20 hours.
  two people.                                                      ●Western Federal Credit Union reported a 50 percent
● International Islamic University Malaysia completed a full        reduction in labor costs through automation and unified patch
  deployment on 7,000 fixed and mobile computers across seven        management.
  bandwidth-constrained university campuses in just six weeks.     Challenge: Reducing patch management cycles
Challenge: Achieving compliance with SLAs, corporate policies      ●Concord Hospital decreased patch cycles from weeks to just
and regulations                                                     15 minutes.
● Purolator achieved 100 percent compliance with a 24-hour         ●SunTrust Banks reduced patch cycles from two to three weeks
  SLA from their managed service provider.                          to two to three days.
● SunTrust Banks achieved 98.5 percent patch compliance across     ●Tax Tech fully automated overnight patch distribution to
  50,000 endpoints.                                                 1,000+ locations connected via VPN.
● Concord Hospital increased patch compliance from                 ●Entergy’s desktop and server management group installed
  40 to 60 percent, to 93 percent.                                  70,000 patches across the enterprise in 24 hours.
                                                                   ●Kronos distributes software updates, policies, and patches to all
                                                                    eligible endpoints within 15 minutes across the globe.
14 Rewriting the rules of patch management




A comprehensive portfolio of endpoint                                           Tivoli Endpoint Manager is part of a comprehensive IBM secu-
management and security solutions                                               rity portfolio, helping organizations address security challenges
IBM offers patch management capabilities through a stand-alone                  for users and identities, data and information, applications and
product—IBM Tivoli Endpoint Manager for Patch                                   processes, networks, servers and endpoints, and physical infra-
Management—or as an integral part of two larger endpoint                        structures. By enhancing real-time visibility and control, and
management solutions—IBM Tivoli Endpoint Manager for                            improving endpoint security and management, the IBM portfo-
Lifecycle Management and IBM Tivoli Endpoint Manager for                        lio supports today’s ever-expanding, smarter data centers to
Security and Compliance. The Tivoli Endpoint Manager family                     facilitate the instrumented, interconnected and intelligent IT
all operates from the same console, management server and end-                  operations of a smarter planet.
point agent, enabling organizations to consolidate tools, reduce
the number of endpoint agents, and lower management costs.                      Tivoli Endpoint Manager technology provides:
                                                                                ●A single intelligent agent—Tivoli Endpoint Manager utilizes
                                                                                 an industry-leading approach that places a single intelligent
                                                                                 agent on each endpoint. This agent performs multiple
                                                                                 functions including continuous self-assessment and policy
                   IBM Tivoli Endpoint Manager                                   enforcement—yet it has minimal impact on system perform-
                                                                                 ance, using less than two percent of the endpoint CPU on
                                                                                 average. The agent initiates actions in an intelligent manner,
                                                                                 sending messages upstream to the central management server
        for                  for                 for            for              and pulling patches, configurations or other information to the
    Lifecycle            Security and          Patch          Power              endpoint when necessary to comply with a relevant policy.
   Management            Compliance          Management     Management
                                                                                 As a result of the agent’s intelligence and speed, the central
                                                                                 management server always knows the compliance and change
                                                                                 status of endpoints, enabling rapid and up-to-date compliance
                                                                                 reporting.
IBM Tivoli Endpoint Manager is a family of products that all operate from the
same console, management server and intelligent endpoint agent.
IBM Software 15




●   Instant answers—Whether it’s finding out how many                 In a world where seconds matter, Tivoli Endpoint Manager
    instances of Adobe® Acrobat are installed or validating which    can be the difference between a successful patch management
    laptops are impacted by a manufacturer recall, Tivoli Endpoint   strategy and one that leaves the organization at risk.
    Manager provides answers within minutes—across the organi-
    zation. Thanks to the intelligent agent, there is no need to     For more information
    wait for lengthy scans to complete, a centralized server to      To learn more about IBM Tivoli Endpoint Manager, contact
    churn on the details, or thousands of SQL queries to finish       your IBM sales representative or IBM Business Partner, or visit:
    running before dashboards and reports are generated. Each        ibm.com/tivoli/endpoint
    agent evaluates the relevance of the question, analyzes the
    information, reports back, and even takes action based on the    About Tivoli software from IBM
    analyses if desired.                                             Tivoli software from IBM helps organizations efficiently and
●   Coverage for roaming endpoints—The corporate-owned               effectively manage IT resources, tasks and processes to meet
    laptop has moved well beyond the confines of a corporate          ever-shifting business requirements and deliver flexible and
    office. Users are connecting from home, hotels, airports, and    responsive IT service management, while helping to reduce
    even airplanes. Always staying a step ahead, Tivoli Endpoint     costs. The Tivoli portfolio spans software for security, compli-
    Manager provides the unique ability to manage endpoints in       ance, storage, performance, availability, configuration, operations
    real time—even for roaming devices.                              and IT lifecycle management, and is backed by world-class
                                                                     IBM services, support and research.
Conclusion
Tivoli Endpoint Manager addresses key challenges that many           Additionally, financing solutions from IBM Global Financing
organizations currently face, providing a centralized, organiza-     can enable effective cash management, protection from technol-
tion-wide server, desktop and mobile device patch management         ogy obsolescence, improved total cost of ownership and return
solution that automates and alleviates much of the patch testing     on investment. Also, our Global Asset Recovery Services help
process from IT. Tivoli Endpoint Manager deploys in days, and        address environmental concerns with new, more energy-efficient
a single management server supports up to 250,000 endpoints,         solutions. For more information on IBM Global Financing, visit:
drastically increasing patch success rates, improving regulatory     ibm.com/financing
compliance and reducing expenditures.
© Copyright IBM Corporation 2011

                                                                                   IBM Corporation Software Group
                                                                                   Route 100
                                                                                   Somers, NY 10589
                                                                                   U.S.A.

                                                                                   Produced in the United States of America
                                                                                   February 2011
                                                                                   All Rights Reserved

                                                                                   IBM, the IBM logo, ibm.com, BigFix and Tivoli are trademarks or registered
                                                                                   trademarks of International Business Machines Corporation in the United
                                                                                   States, other countries, or both. If these and other IBM trademarked terms
                                                                                   are marked on their first occurrence in this information with a trademark
                                                                                   symbol (® or ™), these symbols indicate U.S. registered or common law
                                                                                   trademarks owned by IBM at the time this information was published. Such
                                                                                   trademarks may also be registered or common law trademarks in other
                                                                                   countries. A current list of IBM trademarks is available on the web at
                                                                                   “Copyright and trademark information” at ibm.com/legal/copytrade.shtml

                                                                                   Adobe is a registered trademark of Adobe Systems Incorporated in the
                                                                                   United States, and/or other countries.

                                                                                   Linux is a registered trademark of Linus Torvalds in the United States, other
                                                                                   countries, or both.

                                                                                   Microsoft and Windows are trademarks of Microsoft Corporation in the
                                                                                   United States, other countries, or both.

                                                                                   UNIX is a registered trademark of The Open Group in the United States
                                                                                   and other countries.

                                                                                   Other company, product and service names may be trademarks or service
                                                                                   marks of others.

                                                                                   References in this publication to IBM products and services do not
                                                                                   imply that IBM intends to make them available in all countries in which
                                                                                   IBM operates.

                                                                                   No part of this document may be reproduced or transmitted in any form
                                                                                   without written permission from IBM Corporation.

                                                                                   Product data has been reviewed for accuracy as of the date of initial
                                                                                   publication. Product data is subject to change without notice. Any statements
    The customer is responsible for ensuring compliance with legal                 regarding IBM’s future direction and intent are subject to change or
    requirements. It is the customer’s sole responsibility to obtain advice of     withdrawal without notice, and represent goals and objectives only.
    competent legal counsel as to the identification and interpretation of any
    relevant laws and regulatory requirements that may affect the customer’s       The information provided in this document is distributed “as is” without any
    business and any actions the customer may need to take to comply with          warranty, either express or implied. IBM expressly disclaims any warranties
    such laws. IBM does not provide legal advice or represent or warrant that      of merchantability, fitness for a particular purpose or noninfringement.
    its services or products will ensure that the customer is in compliance with   IBM products are warranted according to the terms and conditions of the
    any law or regulation.                                                         agreements (e.g. IBM Customer Agreement, Statement of Limited Warranty,
                                                                                   International Program License Agreement, etc.) under which they are
1
    http://cybersecureinstitute.org                                                provided.


                                                                                            Please Recycle




                                                                                                                                         TIW14065-USEN-00

Weitere ähnliche Inhalte

Was ist angesagt?

N central 10 - AutoTask PSA Integration
N central 10 - AutoTask PSA IntegrationN central 10 - AutoTask PSA Integration
N central 10 - AutoTask PSA IntegrationSolarwinds N-able
 
10 Warning Signs of Weak Requirements Management
10 Warning Signs of Weak Requirements Management10 Warning Signs of Weak Requirements Management
10 Warning Signs of Weak Requirements ManagementPerforce
 
Adapt and Thrive: Secrets to Food Manufacturing Operations in a Post-COVID World
Adapt and Thrive: Secrets to Food Manufacturing Operations in a Post-COVID WorldAdapt and Thrive: Secrets to Food Manufacturing Operations in a Post-COVID World
Adapt and Thrive: Secrets to Food Manufacturing Operations in a Post-COVID WorldSafetyChain Software
 
SAP Solution Manager Biggest Guns
SAP Solution Manager Biggest GunsSAP Solution Manager Biggest Guns
SAP Solution Manager Biggest GunsTony de Thomasis
 
Comprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber securityComprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber securityJasonTrinhNguyenTruo
 
Google Cloud Summit - Solving Reliability Fears with SRE
Google Cloud Summit - Solving Reliability Fears with SREGoogle Cloud Summit - Solving Reliability Fears with SRE
Google Cloud Summit - Solving Reliability Fears with SREChun-Chiao Li
 
SanerNow a platform for Endpoint security and systems Management
SanerNow  a platform for Endpoint security and systems ManagementSanerNow  a platform for Endpoint security and systems Management
SanerNow a platform for Endpoint security and systems ManagementSecPod Technologies
 
Greg Hallam, SoftwareONE Audit Defence Workshop
Greg Hallam, SoftwareONE Audit Defence Workshop Greg Hallam, SoftwareONE Audit Defence Workshop
Greg Hallam, SoftwareONE Audit Defence Workshop Martin Thompson
 
Safeguard Commercial Success with a Strategic Monitoring Approach
Safeguard Commercial Success with a Strategic Monitoring ApproachSafeguard Commercial Success with a Strategic Monitoring Approach
Safeguard Commercial Success with a Strategic Monitoring Approachmadelinestack
 
Webinar manage risk using traceability fnl (2)
Webinar   manage risk using traceability fnl (2)Webinar   manage risk using traceability fnl (2)
Webinar manage risk using traceability fnl (2)Perforce
 
Support @SUSE: The Entire Chain from an Incident to a Fix
Support @SUSE: The Entire Chain from an Incident to a FixSupport @SUSE: The Entire Chain from an Incident to a Fix
Support @SUSE: The Entire Chain from an Incident to a FixSUSE
 
STEP 7 Lite V3.0 including Service Pack 4 (SP4)
STEP 7 Lite V3.0 including Service Pack 4 (SP4)STEP 7 Lite V3.0 including Service Pack 4 (SP4)
STEP 7 Lite V3.0 including Service Pack 4 (SP4)Cartiman Iman
 
What Patterns to Avoid in Agile Ceremonies?
What Patterns to Avoid in Agile Ceremonies?What Patterns to Avoid in Agile Ceremonies?
What Patterns to Avoid in Agile Ceremonies?Inflectra
 
Learn fast to build fast, Le Monde case study by Ismaël Hery - Lean IT Summit...
Learn fast to build fast, Le Monde case study by Ismaël Hery - Lean IT Summit...Learn fast to build fast, Le Monde case study by Ismaël Hery - Lean IT Summit...
Learn fast to build fast, Le Monde case study by Ismaël Hery - Lean IT Summit...Institut Lean France
 
Next-Gen Business Transaction Configuration, Instrumentation, and Java Perfor...
Next-Gen Business Transaction Configuration, Instrumentation, and Java Perfor...Next-Gen Business Transaction Configuration, Instrumentation, and Java Perfor...
Next-Gen Business Transaction Configuration, Instrumentation, and Java Perfor...AppDynamics
 
Growing as a software craftsperson (part 1) From Pune Software Craftsmanship.
Growing as a software craftsperson (part 1)  From Pune Software Craftsmanship.Growing as a software craftsperson (part 1)  From Pune Software Craftsmanship.
Growing as a software craftsperson (part 1) From Pune Software Craftsmanship.Dattatray Kale
 
Mule soft meetup_th_no1
Mule soft meetup_th_no1Mule soft meetup_th_no1
Mule soft meetup_th_no1WendyTey4
 
RayPack 2.0 - Packaging at the Speed of Light
RayPack 2.0 - Packaging at the Speed of LightRayPack 2.0 - Packaging at the Speed of Light
RayPack 2.0 - Packaging at the Speed of LightStefanie Böger
 

Was ist angesagt? (20)

N central 10 - AutoTask PSA Integration
N central 10 - AutoTask PSA IntegrationN central 10 - AutoTask PSA Integration
N central 10 - AutoTask PSA Integration
 
10 Warning Signs of Weak Requirements Management
10 Warning Signs of Weak Requirements Management10 Warning Signs of Weak Requirements Management
10 Warning Signs of Weak Requirements Management
 
Adapt and Thrive: Secrets to Food Manufacturing Operations in a Post-COVID World
Adapt and Thrive: Secrets to Food Manufacturing Operations in a Post-COVID WorldAdapt and Thrive: Secrets to Food Manufacturing Operations in a Post-COVID World
Adapt and Thrive: Secrets to Food Manufacturing Operations in a Post-COVID World
 
SAP Solution Manager Biggest Guns
SAP Solution Manager Biggest GunsSAP Solution Manager Biggest Guns
SAP Solution Manager Biggest Guns
 
First Steps to DevOps
First Steps to DevOpsFirst Steps to DevOps
First Steps to DevOps
 
Comprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber securityComprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber security
 
Google Cloud Summit - Solving Reliability Fears with SRE
Google Cloud Summit - Solving Reliability Fears with SREGoogle Cloud Summit - Solving Reliability Fears with SRE
Google Cloud Summit - Solving Reliability Fears with SRE
 
SanerNow a platform for Endpoint security and systems Management
SanerNow  a platform for Endpoint security and systems ManagementSanerNow  a platform for Endpoint security and systems Management
SanerNow a platform for Endpoint security and systems Management
 
Greg Hallam, SoftwareONE Audit Defence Workshop
Greg Hallam, SoftwareONE Audit Defence Workshop Greg Hallam, SoftwareONE Audit Defence Workshop
Greg Hallam, SoftwareONE Audit Defence Workshop
 
Safeguard Commercial Success with a Strategic Monitoring Approach
Safeguard Commercial Success with a Strategic Monitoring ApproachSafeguard Commercial Success with a Strategic Monitoring Approach
Safeguard Commercial Success with a Strategic Monitoring Approach
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
Webinar manage risk using traceability fnl (2)
Webinar   manage risk using traceability fnl (2)Webinar   manage risk using traceability fnl (2)
Webinar manage risk using traceability fnl (2)
 
Support @SUSE: The Entire Chain from an Incident to a Fix
Support @SUSE: The Entire Chain from an Incident to a FixSupport @SUSE: The Entire Chain from an Incident to a Fix
Support @SUSE: The Entire Chain from an Incident to a Fix
 
STEP 7 Lite V3.0 including Service Pack 4 (SP4)
STEP 7 Lite V3.0 including Service Pack 4 (SP4)STEP 7 Lite V3.0 including Service Pack 4 (SP4)
STEP 7 Lite V3.0 including Service Pack 4 (SP4)
 
What Patterns to Avoid in Agile Ceremonies?
What Patterns to Avoid in Agile Ceremonies?What Patterns to Avoid in Agile Ceremonies?
What Patterns to Avoid in Agile Ceremonies?
 
Learn fast to build fast, Le Monde case study by Ismaël Hery - Lean IT Summit...
Learn fast to build fast, Le Monde case study by Ismaël Hery - Lean IT Summit...Learn fast to build fast, Le Monde case study by Ismaël Hery - Lean IT Summit...
Learn fast to build fast, Le Monde case study by Ismaël Hery - Lean IT Summit...
 
Next-Gen Business Transaction Configuration, Instrumentation, and Java Perfor...
Next-Gen Business Transaction Configuration, Instrumentation, and Java Perfor...Next-Gen Business Transaction Configuration, Instrumentation, and Java Perfor...
Next-Gen Business Transaction Configuration, Instrumentation, and Java Perfor...
 
Growing as a software craftsperson (part 1) From Pune Software Craftsmanship.
Growing as a software craftsperson (part 1)  From Pune Software Craftsmanship.Growing as a software craftsperson (part 1)  From Pune Software Craftsmanship.
Growing as a software craftsperson (part 1) From Pune Software Craftsmanship.
 
Mule soft meetup_th_no1
Mule soft meetup_th_no1Mule soft meetup_th_no1
Mule soft meetup_th_no1
 
RayPack 2.0 - Packaging at the Speed of Light
RayPack 2.0 - Packaging at the Speed of LightRayPack 2.0 - Packaging at the Speed of Light
RayPack 2.0 - Packaging at the Speed of Light
 

Andere mochten auch

Realizing business value with iam
Realizing business value with iamRealizing business value with iam
Realizing business value with iamArun Gopinath
 
Centralizing security on the mainframe
Centralizing security on the mainframeCentralizing security on the mainframe
Centralizing security on the mainframeArun Gopinath
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_dsArun Gopinath
 
Ibm xiv storage your ideal cloud building block
Ibm xiv storage   your ideal cloud building blockIbm xiv storage   your ideal cloud building block
Ibm xiv storage your ideal cloud building blockArun Gopinath
 
Secure by design building id based security
Secure by design building id based securitySecure by design building id based security
Secure by design building id based securityArun Gopinath
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud securityArun Gopinath
 
Securing virtualization in real world environments
Securing virtualization in real world environmentsSecuring virtualization in real world environments
Securing virtualization in real world environmentsArun Gopinath
 
Cloud computing white paper who do you trust
Cloud computing white paper who do you trustCloud computing white paper who do you trust
Cloud computing white paper who do you trustArun Gopinath
 
Back to school2010 final
Back to school2010 finalBack to school2010 final
Back to school2010 finallaurieao
 
Presentacion de ineenbooh
Presentacion de ineenboohPresentacion de ineenbooh
Presentacion de ineenboohWIHUJEJU
 
Wspieraj inicjatywę OpenStreetMap z Navatarem
Wspieraj inicjatywę OpenStreetMap z NavataremWspieraj inicjatywę OpenStreetMap z Navatarem
Wspieraj inicjatywę OpenStreetMap z Navataremjacek_navatarski
 
Современные представления о структуре дыхательного центра
Современные представления о структуре дыхательного центраСовременные представления о структуре дыхательного центра
Современные представления о структуре дыхательного центраcrasgmu
 
長野市大岡地区 芦沼北菜園付き住宅が入居しやすくなります!
長野市大岡地区 芦沼北菜園付き住宅が入居しやすくなります!長野市大岡地区 芦沼北菜園付き住宅が入居しやすくなります!
長野市大岡地区 芦沼北菜園付き住宅が入居しやすくなります!長野市議会議員小泉一真
 

Andere mochten auch (17)

Realizing business value with iam
Realizing business value with iamRealizing business value with iam
Realizing business value with iam
 
Centralizing security on the mainframe
Centralizing security on the mainframeCentralizing security on the mainframe
Centralizing security on the mainframe
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_ds
 
Ibm xiv storage your ideal cloud building block
Ibm xiv storage   your ideal cloud building blockIbm xiv storage   your ideal cloud building block
Ibm xiv storage your ideal cloud building block
 
Secure by design
Secure by designSecure by design
Secure by design
 
Secure by design building id based security
Secure by design building id based securitySecure by design building id based security
Secure by design building id based security
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Securing virtualization in real world environments
Securing virtualization in real world environmentsSecuring virtualization in real world environments
Securing virtualization in real world environments
 
Cloud computing white paper who do you trust
Cloud computing white paper who do you trustCloud computing white paper who do you trust
Cloud computing white paper who do you trust
 
Back to school2010 final
Back to school2010 finalBack to school2010 final
Back to school2010 final
 
Presentacion de ineenbooh
Presentacion de ineenboohPresentacion de ineenbooh
Presentacion de ineenbooh
 
Wspieraj inicjatywę OpenStreetMap z Navatarem
Wspieraj inicjatywę OpenStreetMap z NavataremWspieraj inicjatywę OpenStreetMap z Navatarem
Wspieraj inicjatywę OpenStreetMap z Navatarem
 
Materi WWW
Materi WWWMateri WWW
Materi WWW
 
Современные представления о структуре дыхательного центра
Современные представления о структуре дыхательного центраСовременные представления о структуре дыхательного центра
Современные представления о структуре дыхательного центра
 
1 4
1 41 4
1 4
 
Didi
DidiDidi
Didi
 
長野市大岡地区 芦沼北菜園付き住宅が入居しやすくなります!
長野市大岡地区 芦沼北菜園付き住宅が入居しやすくなります!長野市大岡地区 芦沼北菜園付き住宅が入居しやすくなります!
長野市大岡地区 芦沼北菜園付き住宅が入居しやすくなります!
 

Ähnlich wie Rewriting the rules of patch management

Maveric - Automation of Release & Deployment Management
Maveric -  Automation of Release & Deployment ManagementMaveric -  Automation of Release & Deployment Management
Maveric - Automation of Release & Deployment ManagementMaveric Systems
 
Java deployments in an enterprise environment whitepaper - xebialabs
Java deployments in an enterprise environment   whitepaper - xebialabsJava deployments in an enterprise environment   whitepaper - xebialabs
Java deployments in an enterprise environment whitepaper - xebialabsXebiaLabs
 
Demystifying Middleware for DevOps
Demystifying Middleware for DevOpsDemystifying Middleware for DevOps
Demystifying Middleware for DevOpsjKool
 
Rational collaborative-lifecycle-management-2012
Rational collaborative-lifecycle-management-2012Rational collaborative-lifecycle-management-2012
Rational collaborative-lifecycle-management-2012Strongback Consulting
 
2021-10-14 The Critical Role of Security in DevOps.pdf
2021-10-14 The Critical Role of Security in DevOps.pdf2021-10-14 The Critical Role of Security in DevOps.pdf
2021-10-14 The Critical Role of Security in DevOps.pdfSavinder Puri
 
Future-Proof Your Security: Automate Patching and Minimize Vulnerabilities
Future-Proof Your Security: Automate Patching and Minimize VulnerabilitiesFuture-Proof Your Security: Automate Patching and Minimize Vulnerabilities
Future-Proof Your Security: Automate Patching and Minimize VulnerabilitiesHCLSoftware
 
DevOps Release management – Benefits & Best practices.pdf
DevOps Release management – Benefits & Best practices.pdfDevOps Release management – Benefits & Best practices.pdf
DevOps Release management – Benefits & Best practices.pdfEnov8
 
Adopting DevOps: Overcoming Three Common Stumbling Blocks
Adopting DevOps: Overcoming Three Common Stumbling BlocksAdopting DevOps: Overcoming Three Common Stumbling Blocks
Adopting DevOps: Overcoming Three Common Stumbling BlocksCognizant
 
Cloud Scars: Lessons from the Enterprise Pioneers
Cloud Scars: Lessons from the Enterprise PioneersCloud Scars: Lessons from the Enterprise Pioneers
Cloud Scars: Lessons from the Enterprise PioneersDave Roberts
 
Cloud scars: Lessons from the Enterprise Pioneers
Cloud scars: Lessons from the Enterprise PioneersCloud scars: Lessons from the Enterprise Pioneers
Cloud scars: Lessons from the Enterprise PioneersServiceMesh
 
Best practices-in-lifecycle-management-white-paper-15663
Best practices-in-lifecycle-management-white-paper-15663Best practices-in-lifecycle-management-white-paper-15663
Best practices-in-lifecycle-management-white-paper-15663dbrea
 
Fortify Continuous Delivery
Fortify Continuous DeliveryFortify Continuous Delivery
Fortify Continuous DeliveryMainstay
 
Consequences of a Failed ECM Implementation
Consequences of a Failed ECM ImplementationConsequences of a Failed ECM Implementation
Consequences of a Failed ECM ImplementationiDatix
 

Ähnlich wie Rewriting the rules of patch management (20)

Many products-no-security (1)
Many products-no-security (1)Many products-no-security (1)
Many products-no-security (1)
 
Cots software
Cots softwareCots software
Cots software
 
ITIL Guide for DevOps
ITIL Guide for DevOpsITIL Guide for DevOps
ITIL Guide for DevOps
 
Maveric - Automation of Release & Deployment Management
Maveric -  Automation of Release & Deployment ManagementMaveric -  Automation of Release & Deployment Management
Maveric - Automation of Release & Deployment Management
 
Java deployments in an enterprise environment whitepaper - xebialabs
Java deployments in an enterprise environment   whitepaper - xebialabsJava deployments in an enterprise environment   whitepaper - xebialabs
Java deployments in an enterprise environment whitepaper - xebialabs
 
Demystifying Middleware for DevOps
Demystifying Middleware for DevOpsDemystifying Middleware for DevOps
Demystifying Middleware for DevOps
 
Patch management
Patch managementPatch management
Patch management
 
Rational collaborative-lifecycle-management-2012
Rational collaborative-lifecycle-management-2012Rational collaborative-lifecycle-management-2012
Rational collaborative-lifecycle-management-2012
 
2021-10-14 The Critical Role of Security in DevOps.pdf
2021-10-14 The Critical Role of Security in DevOps.pdf2021-10-14 The Critical Role of Security in DevOps.pdf
2021-10-14 The Critical Role of Security in DevOps.pdf
 
Future-Proof Your Security: Automate Patching and Minimize Vulnerabilities
Future-Proof Your Security: Automate Patching and Minimize VulnerabilitiesFuture-Proof Your Security: Automate Patching and Minimize Vulnerabilities
Future-Proof Your Security: Automate Patching and Minimize Vulnerabilities
 
DevOps Release management – Benefits & Best practices.pdf
DevOps Release management – Benefits & Best practices.pdfDevOps Release management – Benefits & Best practices.pdf
DevOps Release management – Benefits & Best practices.pdf
 
Adopting DevOps: Overcoming Three Common Stumbling Blocks
Adopting DevOps: Overcoming Three Common Stumbling BlocksAdopting DevOps: Overcoming Three Common Stumbling Blocks
Adopting DevOps: Overcoming Three Common Stumbling Blocks
 
Cloud Scars: Lessons from the Enterprise Pioneers
Cloud Scars: Lessons from the Enterprise PioneersCloud Scars: Lessons from the Enterprise Pioneers
Cloud Scars: Lessons from the Enterprise Pioneers
 
Cloud scars: Lessons from the Enterprise Pioneers
Cloud scars: Lessons from the Enterprise PioneersCloud scars: Lessons from the Enterprise Pioneers
Cloud scars: Lessons from the Enterprise Pioneers
 
Ppt cc
Ppt ccPpt cc
Ppt cc
 
Best practices-in-lifecycle-management-white-paper-15663
Best practices-in-lifecycle-management-white-paper-15663Best practices-in-lifecycle-management-white-paper-15663
Best practices-in-lifecycle-management-white-paper-15663
 
Fortify Continuous Delivery
Fortify Continuous DeliveryFortify Continuous Delivery
Fortify Continuous Delivery
 
DevOps explained
DevOps explainedDevOps explained
DevOps explained
 
Software modernization
Software modernizationSoftware modernization
Software modernization
 
Consequences of a Failed ECM Implementation
Consequences of a Failed ECM ImplementationConsequences of a Failed ECM Implementation
Consequences of a Failed ECM Implementation
 

Kürzlich hochgeladen

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Kürzlich hochgeladen (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Rewriting the rules of patch management

  • 1. IBM Software February 2011 Thought Leadership White Paper Rewriting the rules of patch management IBM Tivoli Endpoint Manager shifts the patching paradigm
  • 2. 2 Rewriting the rules of patch management Contents Introduction Malware attacks are in a race against time to exploit vulnerable 2 Introduction computer systems before software vendors publish patches and 3 The patch management conundrum their customers can apply them. When malware wins the race, organizations lose productivity and risk loss of sensitive data, 4 Changing the patch management paradigm potential litigation and regulatory fines. The sheer enormity of the problem is alarming—the ongoing battle between hackers 9 Why it works and software companies costs the U.S. economy an estimated 10 Continuous compliance $266 billion annually, according to the Cyber Secure Institute, a Washington, D.C.-based advocacy group.1 11 How customers are using it To combat this threat, more and more software vendors are issu- 12 A comprehensive portfolio of compliance and security solutions ing more and more patches in attempts to keep pace with the frenzy of malware exploits. Unfortunately, most organiza- 13 Conclusion tions are not equipped to handle this onslaught of patches in a time- and cost-effective manner. Because of organizational 13 For more information processes, it takes most IT departments weeks or even months to 13 About Tivoli software from IBM deploy patches throughout the environment. According to some estimates, it can take organizations as long as four months to achieve a 90 to 95 percent patch compliance rate. By then, countless additional patches have been issued, meaning that organizations are perpetually at high risk and out of compli- ance—and the situation only gets worse over time.
  • 3. IBM Software 3 Patch management has always been an uphill climb because of The patch management conundrum the massive complexity involved. Despite the risks, some organi- Patch management seems straightforward and yet is one of the zations are reluctant to patch because of the time and labor most complex and critical challenges an organization faces. The required, plus the potential of disrupting business operations. In nuances of effective patch management run much deeper than an organization with a heterogeneous hardware and software simply having a system administrator push out patches or relying environment, staying on top of the multitude of patches—and on vendor-supplied patch mechanisms, hoping that they will be issuing them in a timely manner—can overextend IT staff and successfully applied but never knowing for sure. The patch man- budgets. What is needed is a rapidly deployable, cost-effective, agement conundrum raises questions that many organizations policy-based patch management solution that: may find difficult—if not impossible—to answer. For example: ● Works for all endpoints in organizations of all sizes, including ● How should an organization deploy critical “out-of-band” the very largest. patches that arrive urgently and off the routine patch ● Supports multiple vendors, operating systems, applications and schedule? platforms. ● How can system administrators keep track of patches in an ● Works over low-speed connections and supports devices that environment with hundreds or hundreds of thousands of end- roam outside of the organizational network. points running a variety of operating systems and applications? ● Minimizes the demand on IT staff. ● How are system administrators supposed to monitor the status ● Operates in real time, deploying patches organization-wide in of roaming laptops and other mobile devices? hours. ● How long will the patching process take from start to finish, and how will system administrators confirm (and prove) that IBM Tivoli® Endpoint Manager, built on BigFix® technology, every endpoint in their infrastructure has been properly combines the separate pieces of the patch management puzzle patched—and stays that way? into an intelligent, simplified solution that streamlines and opti- ● How can system administrators quickly test patches before mizes the process of researching, assessing, remediating, con- deploying them and roll them back if they cause problems? firming, enforcing and reporting on patches. ● How can patches be deployed without interfering with end- user experience and productivity?
  • 4. 4 Rewriting the rules of patch management While surveys show that patch management is one of the most important security priorities for organizations, these questions Patch management process indicate just how many barriers organizations face when imple- menting effective patch management practices. Between a lack of visibility and personnel, potential business impact, network bandwidth limitations, lack of manageability, long remediation Research times, scalability issues, and coverage for different platforms, third-party applications and roaming endpoints, the hurdles are many. Report Assess Fortunately, these hurdles are surmountable. Tivoli Endpoint Manager removes these obstacles with a comprehensive solution that is purpose-built for highly distributed, heterogeneous envi- IBM Tivoli Endpoint Manager ronments. With this solution, organizations can finally see, change, enforce, and report on patch compliance status in real time, on a global scale, through a single console. Enforce Remediate Confirm With Tivoli Endpoint Manager, patch management becomes a fully unified, closed-loop process that helps enhance security and save money.
  • 5. IBM Software 5 Changing the patch management Step 1: Research paradigm Before: The first step in the patch management process involves While there is no single, official patch management best prac- discovering which patches are available. This includes research- tice, the general approach involves a closed-loop process with six ing patch availability through vendor email messages, application basic steps: research, assess, remediate, confirm, enforce, and pop-up notifications, websites, blogs, and a variety of other report. Historically, many of these steps were implemented via sources. This process must be repeated weekly—or even daily— separate, non-integrated technologies, making it virtually impos- for hundreds of patches, across scores of operating system, sible to create a closed-loop, real-time patch management application and anti-malware vendors. One alternative—relying process. Tivoli Endpoint Manager provides all of these steps as on default vendor auto-updates—may lead to mistakes that can part of a unified, fully integrated process that can help enhance have negative consequences, because automating acceptance of security and save money, time, and resources. patches without testing them can put organizations at huge risk, there is no enterprise control over timing or reporting, and rely- Here is a before-and-after look at how this solution changes the ing on users to apply updates is risky and unreliable. rules for patch management. A better approach is to have a patch management vendor pro- vide a consolidated stream of the most common patches so that the organization only needs to evaluate each load of patches as they come in, test them for compatibility with the organizational environment, and then deploy them via highly granular policies targeted to specific machine profiles, because it allows specific patches to be applied only to the endpoints that need them. The problem with this approach is that if not automated, it requires significant time and resources that organizations may not have.
  • 6. 6 Rewriting the rules of patch management After: IBM acquires, tests, packages and distributes patches from Step 2: Assess operating system, anti-malware and common third-party appli- Before: For each identified patch, the IT organization must cation vendors directly to customers, removing considerable determine the applicability and criticality of the update, identify- patch management research overhead. When a supported ven- ing which endpoints need patching across the organization. In dor releases a new patch, IBM receives the patch, conducts the case of security updates, this critical data translates directly preliminary analysis and creates patch policies, called into risk, as business risk increases with the number of un- IBM Fixlet® messages, which wrap the update with policy infor- patched endpoints. Many organizations do not have access to the mation such as patch dependencies, applicable systems, and complete, current asset and configuration data set required to severity level. Fixlets are then automatically sent to Tivoli quantify the scope and impact of patches across the organization. Endpoint Manager customer servers. The solution also provides There are tools that can help acquire this data, but many require a process wherein customers can configure the product to down- days or weeks to collect and collate this information by scanning load patches directly from vendor sites or store the patch content every endpoint on the network—and many roaming endpoints locally; customers may also create their own custom Fixlets using are rarely connected to the network—a process which can take a wizard-driven interface. This process works for virtually any days to complete. This information must be immediately avail- update, including internal application patches. able to system administrators at the time of patch release since many patches are time critical, and the process of risk assessment and patch prioritization must take place as quickly as possible.
  • 7. IBM Software 7 After: With Tivoli Endpoint Manager, a single intelligent soft- Step 3: Remediate ware agent is installed on all managed endpoints to continuously Before: After a patch is assessed and a determination is made to monitor and report endpoint state, including patch levels, to a distribute it across the organization, it must be packaged and management server. The agent also compares endpoint compli- tested to ensure that it will not conflict with other patches and ance against defined policies, such as mandatory patch levels and third-party software installed on the target endpoints. Patch pre- standard configurations. This information is especially critical requisites and dependencies, such as minimum service pack lev- during emergency patch scenarios when a vendor releases a els, must also be determined. This is usually accomplished by highly critical, out-of-band patch, and organizations must rapidly applying and testing the update on a select number of endpoints quantify the overall magnitude and risk from the related before a general release—a process that can take days or weeks exploit(s). In one example, a customer using Tivoli Endpoint to complete using manual tools. Once testing indicates that the Manager installed agents on 5,100 endpoints and discovered that patch is probably safe for organization-wide deployment, it is over 1,500 (30 percent) of their endpoints were missing at least applied to affected endpoints, typically in batches, further one critical patch. Taken as a whole, endpoints across the institu- extending the patch window. Long remediation times are prima- tion were missing 20,033 “critical” patches—an average of rily due to the inability to rely on patch quality, and secondarily 13 patches per endpoint. Once the total number of patches is due to unreliable distribution mechanisms, both of which result mapped to the endpoints that need them, and the business in low first-pass patch rates. Most organizations are therefore criticality is defined, the IT organization can proceed to the forced to proceed slowly in case a patch causes an unforeseen remediation step. problem, as well as to ensure that network links are not overwhelmed by the patch distribution process. As a result, remediation is often difficult to accomplish quickly and effectively on an organizational scale.
  • 8. 8 Rewriting the rules of patch management Another major problem is that many patch management tools After: When IBM publishes new patch Fixlets via Tivoli only work for Microsoft® Windows® due to dependencies on Endpoint Manager, organizations can determine the scope of the Microsoft tools like Windows Server Update Services (WSUS). update by creating a report in minutes that shows which end- Many tools also require deep platform expertise and highly points need the update. The patch Fixlets include distribution trained personnel to operate them. Many of these tools do not instructions, including OS, version, and prerequisite require- work until endpoints are connected to a high-speed corporate ments, eliminating the need for IT to “package” and thoroughly network, leaving roaming laptops and other mobile endpoints test the patch. Operators can then spend a few minutes deter- out of the update cycle for long periods. Many do not provide mining when the patch should go out, what notification to the fine-grained, policy-based controls that operators need to display to end users (if any), whether or not to allow users to effectively deploy patches to all affected endpoints in the organi- delay a patch implementation and for how long, and whether to zation. Controls such as patch installation time windows, force (or delay) reboots. Within minutes, the endpoint agent whether or not a user must be present, reboot options, the receives the new policy and immediately evaluates the endpoint method of distribution (including bandwidth and CPU throt- to determine if the patch is applicable, and if so, it downloads tles), system type, and user notification options must be available and applies the patch, reporting back success or failure within inputs into the automated update processes. minutes. This approach, combined with Tivoli Endpoint Manager’s relay structure and ability to reach Internet-connected devices, significantly reduces network load and improves first-pass success rates to 95+ percent.
  • 9. IBM Software 9 The solution also provides a highly secure mechanism that Many products do not provide confirmation that patches are employs cryptographic identities, ensuring that only authorized applied—or if they do, it can take days or even weeks to obtain administrators can create and distribute policies. Moreover, since an organization-wide report. Even worse, some tools incorrectly no Active Directory dependencies exist, Tivoli Endpoint report that patches are applied when in fact the files were down- Manager administrators do not need to be Active Directory loaded but the patch was not actually applied. With this amount domain administrators. The solution stores audit information of delay and uncertainty, some endpoints are often left exposed, that tracks who ordered which policies to be applied to which leaving a significant window of vulnerability. endpoints, and does not require specific operating system expert- ise for operators that initiate the remediation process. Any Tivoli After: Once a patch is deployed, the Tivoli Endpoint Manager Endpoint Manager operator with a few hours of basic training agent automatically and continuously reassesses the endpoint sta- can safely and rapidly patch Windows, Linux®, UNIX®, and tus to confirm successful installation, immediately updating the Mac operating systems with no domain-specific knowledge or management server in real time (or in the case of roaming expertise. devices, at the earliest opportunity). This step is critical in sup- porting compliance requirements, which require definitive proof Step 4: Confirm of continuous patch installation. With this solution, operators Before: After patches are scheduled to be applied, successful can watch the patch deployment process in real time via a cen- installation must be confirmed so that IT knows when the patch tralized management console, receiving confirmation of patch cycle is complete, and to support compliance reporting require- installation within minutes of initiating the patch process. ments. This data should be communicated back to a central Closing the loop on patch deployment enables organizations to reporting system that updates personnel on the process, includ- ensure patch compliance in a way that is smarter, faster and ing exceptions, in real time. However, many patch management much more reliable. technologies do not effectively perform this process, requiring weeks to re-scan all endpoints and even longer to correct excep- tions. This lag time introduces significant uncertainty around the organization’s overall business risk and compliance posture.
  • 10. 10 Rewriting the rules of patch management Step 5: Enforce Administrators enjoy full control of their endpoints, allowing Before: After the initial application, many updates do not always them to handle many times the quantity of work of other prod- “stick.” Users intentionally or accidentally uninstall patches, new ucts that require significant manual intervention and introduce applications or patches may corrupt existing updates, malware significant time lags into the reporting process. may deliberately remove patches, or problems created by the update may necessitate a rollback. Patch management technolo- Step 6: Report gies must continuously monitor machines to ensure compliance Before: Reporting is a critical component of the patch manage- with update policies, providing rapid, policy-based rollback capa- ment process. Compliance and corporate policies require highly bilities in the event of a major patch problem. If a patch is detailed, up-to-date dashboards and reports that indicate the removed contrary to security policy, it must be immediately rein- organization’s risk position and patch management status stalled, and if a patch creates a major problem after application, for a variety of consumers, including compliance auditors, organizations must also be able to issue a rapid mass rollback. executives, management and even end users. Without an overall Without the proper tools, this step becomes next to impossible. solution, there is no clear-cut way to report on patch status organization-wide. After: The Tivoli Endpoint Manager intelligent agent continu- ously enforces patch policy compliance, ensuring that endpoints After: Tivoli Endpoint Manager’s integrated web reporting remain updated. If a patch is uninstalled for any reason, the pol- capabilities allow end users, administrators, executives, manage- icy can specify that the agent should automatically reapply it to ment and others to view up-to-the-minute dashboards and the endpoint as needed. In the event of problems with a patch, reports that indicate which patches were deployed, when they Tivoli Endpoint Manager administrators can quickly and easily were deployed, who deployed them, and to which endpoints. issue a rollback to endpoints—either en masse or to a select few. Special “click through” dashboards show patch management Through the same centralized console, endpoint compliance sta- progress in real time. tus is reported in real time, allowing IT administrators to easily monitor the state of all managed endpoints in the organization.
  • 11. IBM Software 11 Why it works Traditional patch management approaches utilizing manual processes and cumbersome scan- and poll-based mechanisms are no longer fast or cost-effective enough to meet business and reg- ulatory requirements, leaving organizations with unacceptably high risk and costs. Many organizations that try to utilize “free” or low-cost vendor tools such as Windows Server Update Services (WSUS) quickly realize that these solutions are not enterprise-class. They are limited to a single vendor, do not pro- vide organizational control over what patches go where and when, are disruptive to the end user, and offer poor reporting that does not reflect real-time status. WSUS is a perfect example of a point product used to accomplish just one step in the patch management process outlined above, yet it is used because it is viewed as “free.” Microsoft has introduced regular patch release cycles, known as “Patch Tuesdays,” which have unfortunately also spawned “Hack Wednesdays,” during which cyber criminals are provided golden opportunities to exploit un-patched endpoints without having to work to uncover new vulnerabilities. Endpoints not immediately patched become a window of opportunity for criminals—and a window of organizational risk. Moreover, organizations need to manage updates for a wide variety of vendor products and hard- ware form factors—not just Windows. Dashboard reports in Tivoli Endpoint Manager show patch management progress in real time.
  • 12. 12 Rewriting the rules of patch management Tivoli Endpoint Manager leads the market in terms of breadth Another key aspect of the architecture is support for endpoints of coverage, speed, automation and cost-effectiveness, providing that are on and off the corporate network. Roaming devices like comprehensive operating system and third-party application laptops, for example, can receive patches via any Internet patches. The solution, which includes deploying a single multi- connection such as Wi-Fi or even dialup. The patch manage- purpose, lightweight intelligent agent to all endpoints, supports a ment process is virtually transparent to the user, and IBM Fixlet wide variety of device types ranging from servers to desktop messages control the total amount of bandwidth and CPU PCs, “roaming” Internet-connected laptops, and specialized consumed by the endpoint agent, which is location- and connec- equipment such as point-of-sale (POS) devices, ATMs and self- tion-aware to optimize network usage. service kiosks. Continuous compliance A single management server can support up to 250,000 end- Many organizations need to establish, document and prove com- points, regardless of their location, connection type and speed or pliance with patch management processes in order to comply status, and additional servers can provide virtually unlimited scal- with governmental regulations, service level agreements (SLAs) ability. Policy-based controls provide IT administrators with and corporate policies. Regulations such as Sarbanes-Oxley, PCI fine-grained, highly automated patch management capabilities, DSS and HIPAA/HITECH require that a regular, fully docu- and comprehensive reports support compliance requirements. mented patch management process be in place, and proof of Policy compliance is continuously assessed and enforced by the continuous compliance is necessary in order to pass audits. intelligent agent, regardless of endpoint connectivity to the net- Unfortunately, many organizations spend an enormous amount work. Other products are back-end heavy, requiring massive of time and resources on patch management, yet still cannot amounts of hardware and personnel to support deployments—in meet compliance requirements. The ability of Tivoli Endpoint many cases, dozens, scores or even hundreds of servers, multiple Manager to enforce policies and quickly report on compliance agents per endpoint, and an army of operators—to support the can help improve an organization’s audit readiness and pass rates. same environment that Tivoli Endpoint Manager handles with one management server, one endpoint agent, and as little as 1/20th of the personnel.
  • 13. IBM Software 13 How customers are using it ●Entergy IT, which must comply with SLAs that require Organizations are meeting the challenges of patch management patch deployment across more than 22,000 endpoints within head-on using Tivoli Endpoint Manager. For customers, the a 10-day window of release, has deployed over 4.9 million results have included faster deployment, better compliance, patches across the enterprise since 2004—and has not missed a reduced IT costs and shorter management cycles. single SLA during this time. Challenge: Reducing IT costs Challenge: Deploying patch management in days or weeks—not ●BGC Partners eliminated expensive travel to remote service months or years branch offices across six continents, saving tens of thousands of ● Albany County, NY, consolidated a number of patch and con- dollars. figuration management tools in just two days. ●Tax Tech reduced patch management full-time equivalents ● O’Charley’s Restaurants deployed patches to over 350 restau- (FTEs) by 20 to one. rants in just four days. ●Stena Lines achieved a 12:1 labor savings ratio by reducing ● SunTrust Banks implemented a solution to 50,000 endpoints administrative overhead time for patch processes from spread across nearly 1,800 locations in three months with just 240 hours to 20 hours. two people. ●Western Federal Credit Union reported a 50 percent ● International Islamic University Malaysia completed a full reduction in labor costs through automation and unified patch deployment on 7,000 fixed and mobile computers across seven management. bandwidth-constrained university campuses in just six weeks. Challenge: Reducing patch management cycles Challenge: Achieving compliance with SLAs, corporate policies ●Concord Hospital decreased patch cycles from weeks to just and regulations 15 minutes. ● Purolator achieved 100 percent compliance with a 24-hour ●SunTrust Banks reduced patch cycles from two to three weeks SLA from their managed service provider. to two to three days. ● SunTrust Banks achieved 98.5 percent patch compliance across ●Tax Tech fully automated overnight patch distribution to 50,000 endpoints. 1,000+ locations connected via VPN. ● Concord Hospital increased patch compliance from ●Entergy’s desktop and server management group installed 40 to 60 percent, to 93 percent. 70,000 patches across the enterprise in 24 hours. ●Kronos distributes software updates, policies, and patches to all eligible endpoints within 15 minutes across the globe.
  • 14. 14 Rewriting the rules of patch management A comprehensive portfolio of endpoint Tivoli Endpoint Manager is part of a comprehensive IBM secu- management and security solutions rity portfolio, helping organizations address security challenges IBM offers patch management capabilities through a stand-alone for users and identities, data and information, applications and product—IBM Tivoli Endpoint Manager for Patch processes, networks, servers and endpoints, and physical infra- Management—or as an integral part of two larger endpoint structures. By enhancing real-time visibility and control, and management solutions—IBM Tivoli Endpoint Manager for improving endpoint security and management, the IBM portfo- Lifecycle Management and IBM Tivoli Endpoint Manager for lio supports today’s ever-expanding, smarter data centers to Security and Compliance. The Tivoli Endpoint Manager family facilitate the instrumented, interconnected and intelligent IT all operates from the same console, management server and end- operations of a smarter planet. point agent, enabling organizations to consolidate tools, reduce the number of endpoint agents, and lower management costs. Tivoli Endpoint Manager technology provides: ●A single intelligent agent—Tivoli Endpoint Manager utilizes an industry-leading approach that places a single intelligent agent on each endpoint. This agent performs multiple functions including continuous self-assessment and policy IBM Tivoli Endpoint Manager enforcement—yet it has minimal impact on system perform- ance, using less than two percent of the endpoint CPU on average. The agent initiates actions in an intelligent manner, sending messages upstream to the central management server for for for for and pulling patches, configurations or other information to the Lifecycle Security and Patch Power endpoint when necessary to comply with a relevant policy. Management Compliance Management Management As a result of the agent’s intelligence and speed, the central management server always knows the compliance and change status of endpoints, enabling rapid and up-to-date compliance reporting. IBM Tivoli Endpoint Manager is a family of products that all operate from the same console, management server and intelligent endpoint agent.
  • 15. IBM Software 15 ● Instant answers—Whether it’s finding out how many In a world where seconds matter, Tivoli Endpoint Manager instances of Adobe® Acrobat are installed or validating which can be the difference between a successful patch management laptops are impacted by a manufacturer recall, Tivoli Endpoint strategy and one that leaves the organization at risk. Manager provides answers within minutes—across the organi- zation. Thanks to the intelligent agent, there is no need to For more information wait for lengthy scans to complete, a centralized server to To learn more about IBM Tivoli Endpoint Manager, contact churn on the details, or thousands of SQL queries to finish your IBM sales representative or IBM Business Partner, or visit: running before dashboards and reports are generated. Each ibm.com/tivoli/endpoint agent evaluates the relevance of the question, analyzes the information, reports back, and even takes action based on the About Tivoli software from IBM analyses if desired. Tivoli software from IBM helps organizations efficiently and ● Coverage for roaming endpoints—The corporate-owned effectively manage IT resources, tasks and processes to meet laptop has moved well beyond the confines of a corporate ever-shifting business requirements and deliver flexible and office. Users are connecting from home, hotels, airports, and responsive IT service management, while helping to reduce even airplanes. Always staying a step ahead, Tivoli Endpoint costs. The Tivoli portfolio spans software for security, compli- Manager provides the unique ability to manage endpoints in ance, storage, performance, availability, configuration, operations real time—even for roaming devices. and IT lifecycle management, and is backed by world-class IBM services, support and research. Conclusion Tivoli Endpoint Manager addresses key challenges that many Additionally, financing solutions from IBM Global Financing organizations currently face, providing a centralized, organiza- can enable effective cash management, protection from technol- tion-wide server, desktop and mobile device patch management ogy obsolescence, improved total cost of ownership and return solution that automates and alleviates much of the patch testing on investment. Also, our Global Asset Recovery Services help process from IT. Tivoli Endpoint Manager deploys in days, and address environmental concerns with new, more energy-efficient a single management server supports up to 250,000 endpoints, solutions. For more information on IBM Global Financing, visit: drastically increasing patch success rates, improving regulatory ibm.com/financing compliance and reducing expenditures.
  • 16. © Copyright IBM Corporation 2011 IBM Corporation Software Group Route 100 Somers, NY 10589 U.S.A. Produced in the United States of America February 2011 All Rights Reserved IBM, the IBM logo, ibm.com, BigFix and Tivoli are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol (® or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml Adobe is a registered trademark of Adobe Systems Incorporated in the United States, and/or other countries. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both. UNIX is a registered trademark of The Open Group in the United States and other countries. Other company, product and service names may be trademarks or service marks of others. References in this publication to IBM products and services do not imply that IBM intends to make them available in all countries in which IBM operates. No part of this document may be reproduced or transmitted in any form without written permission from IBM Corporation. Product data has been reviewed for accuracy as of the date of initial publication. Product data is subject to change without notice. Any statements The customer is responsible for ensuring compliance with legal regarding IBM’s future direction and intent are subject to change or requirements. It is the customer’s sole responsibility to obtain advice of withdrawal without notice, and represent goals and objectives only. competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s The information provided in this document is distributed “as is” without any business and any actions the customer may need to take to comply with warranty, either express or implied. IBM expressly disclaims any warranties such laws. IBM does not provide legal advice or represent or warrant that of merchantability, fitness for a particular purpose or noninfringement. its services or products will ensure that the customer is in compliance with IBM products are warranted according to the terms and conditions of the any law or regulation. agreements (e.g. IBM Customer Agreement, Statement of Limited Warranty, International Program License Agreement, etc.) under which they are 1 http://cybersecureinstitute.org provided. Please Recycle TIW14065-USEN-00