SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Beyond Windows Patching: Dealing with the New Imperative to Patch Adobe, Apple, Linux and More  ,[object Object],© 2010 Monterey Technology Group Inc.
© 2010 Monterey Technology Group Inc. Brought to you by Speakers Russ Ernst, Senior Product Manager Andrea Bolz, Solution Marketing Manager
Preview of Key Points © 2010 Monterey Technology Group Inc. Patching today’s enterprise against today’s threats Layer by layer Stats Tools Issues
Product Patching © 2010 Monterey Technology Group Inc. WSUS ,[object Object]
Most released on monthly patch schedule
Not all MS products covered by WSUSMicrosoft Apps (Office, etc.) Windows
Product Patching © 2010 Monterey Technology Group Inc. HP Insight Control, et al WSUS ,[object Object]
Very difficult to find on some hardware vendor sites
Ability to automate patches varies
Insight Control is $Microsoft Apps (Office, etc.) System Agents (Dell, HP, etc.) Windows
Product Patching © 2010 Monterey Technology Group Inc. ? HP Insight Control, et al WSUS ,[object Object]
Automatic Updates is for the home user
How to uninstall older versions?
Risk of installing extra softwareMicrosoft Apps (Office, etc.) System Agents (Dell, HP, etc.) Adobe Apps (Acrobat, Flash) Windows
Product Patching © 2010 Monterey Technology Group Inc. ? ? HP Insight Control, et al WSUS ,[object Object]
Multiple versions required
No enterprise tools
Risk of installing extra software
iTunes

Weitere ähnliche Inhalte

Ähnlich wie Beyond Windows Patching: Dealing with the New Imperative to Patch Adobe, Apple, Linux and More

App v overview
App v overviewApp v overview
App v overview
Edmund Lim
 

Ähnlich wie Beyond Windows Patching: Dealing with the New Imperative to Patch Adobe, Apple, Linux and More (20)

Everything You Ever Wanted To Know About Application Compatibility
Everything You Ever Wanted To Know About Application CompatibilityEverything You Ever Wanted To Know About Application Compatibility
Everything You Ever Wanted To Know About Application Compatibility
 
App v overview
App v overviewApp v overview
App v overview
 
Mis chapter 6
Mis chapter 6Mis chapter 6
Mis chapter 6
 
Server Virtualization - Smashing Success! Desktop Virtualization - Not So Mu...
Server Virtualization - Smashing Success!  Desktop Virtualization - Not So Mu...Server Virtualization - Smashing Success!  Desktop Virtualization - Not So Mu...
Server Virtualization - Smashing Success! Desktop Virtualization - Not So Mu...
 
Windows 10 KKK
Windows 10 KKKWindows 10 KKK
Windows 10 KKK
 
Developing windows 10 universal apps
Developing windows 10 universal appsDeveloping windows 10 universal apps
Developing windows 10 universal apps
 
Tackling Enterprise App Incompatibility
Tackling Enterprise App IncompatibilityTackling Enterprise App Incompatibility
Tackling Enterprise App Incompatibility
 
Computer Software
Computer SoftwareComputer Software
Computer Software
 
OSSA17 - Live patch, VMI, Security Mgmt (50 mins, no embedded demos)
OSSA17 - Live patch, VMI, Security Mgmt (50 mins, no embedded demos)OSSA17 - Live patch, VMI, Security Mgmt (50 mins, no embedded demos)
OSSA17 - Live patch, VMI, Security Mgmt (50 mins, no embedded demos)
 
Azure mobile service ( Universal App)
Azure mobile service ( Universal App) Azure mobile service ( Universal App)
Azure mobile service ( Universal App)
 
Application compatibility final
Application compatibility finalApplication compatibility final
Application compatibility final
 
World Wide Technology Tec37 Webinar - Deploy and Manage Windows 10 at Scale v1
World Wide Technology Tec37 Webinar -  Deploy and Manage Windows 10 at Scale v1World Wide Technology Tec37 Webinar -  Deploy and Manage Windows 10 at Scale v1
World Wide Technology Tec37 Webinar - Deploy and Manage Windows 10 at Scale v1
 
Titanium Overview (Mobile March 2011)
Titanium Overview (Mobile March 2011)Titanium Overview (Mobile March 2011)
Titanium Overview (Mobile March 2011)
 
Microsoft Virtualization View
Microsoft Virtualization View Microsoft Virtualization View
Microsoft Virtualization View
 
VMworld 2013: Turbo Charge Your VMware Horizon Deployments
VMworld 2013: Turbo Charge Your VMware Horizon Deployments VMworld 2013: Turbo Charge Your VMware Horizon Deployments
VMworld 2013: Turbo Charge Your VMware Horizon Deployments
 
Low/No Cost Software is it right for your business
Low/No Cost Software is it right for your businessLow/No Cost Software is it right for your business
Low/No Cost Software is it right for your business
 
Windows 10 pentru dezvoltatori - InfoEducație 2015
Windows 10 pentru dezvoltatori - InfoEducație 2015Windows 10 pentru dezvoltatori - InfoEducație 2015
Windows 10 pentru dezvoltatori - InfoEducație 2015
 
Operating Systems ( Os )
Operating Systems ( Os )Operating Systems ( Os )
Operating Systems ( Os )
 
Windows 10 Migration: Extend Your Citrix Solution to Streamline Your OS Migra...
Windows 10 Migration: Extend Your Citrix Solution to Streamline Your OS Migra...Windows 10 Migration: Extend Your Citrix Solution to Streamline Your OS Migra...
Windows 10 Migration: Extend Your Citrix Solution to Streamline Your OS Migra...
 
VMworld 2014: End-User Computing for the Mobile-Cloud Era
VMworld 2014: End-User Computing for the Mobile-Cloud EraVMworld 2014: End-User Computing for the Mobile-Cloud Era
VMworld 2014: End-User Computing for the Mobile-Cloud Era
 

Mehr von Lumension

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Lumension
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Lumension
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
Lumension
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
Lumension
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
Lumension
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Lumension
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
Lumension
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
Lumension
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
Lumension
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
Lumension
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
Lumension
 

Mehr von Lumension (20)

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security Risks
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

Beyond Windows Patching: Dealing with the New Imperative to Patch Adobe, Apple, Linux and More

  • 1.
  • 2. © 2010 Monterey Technology Group Inc. Brought to you by Speakers Russ Ernst, Senior Product Manager Andrea Bolz, Solution Marketing Manager
  • 3. Preview of Key Points © 2010 Monterey Technology Group Inc. Patching today’s enterprise against today’s threats Layer by layer Stats Tools Issues
  • 4.
  • 5. Most released on monthly patch schedule
  • 6. Not all MS products covered by WSUSMicrosoft Apps (Office, etc.) Windows
  • 7.
  • 8. Very difficult to find on some hardware vendor sites
  • 9. Ability to automate patches varies
  • 10. Insight Control is $Microsoft Apps (Office, etc.) System Agents (Dell, HP, etc.) Windows
  • 11.
  • 12. Automatic Updates is for the home user
  • 13. How to uninstall older versions?
  • 14. Risk of installing extra softwareMicrosoft Apps (Office, etc.) System Agents (Dell, HP, etc.) Adobe Apps (Acrobat, Flash) Windows
  • 15.
  • 18. Risk of installing extra software
  • 20. No enterprise toolsMicrosoft Apps (Office, etc.) System Agents (Dell, HP, etc.) Adobe Apps (Acrobat, Flash) Other Popular Apps (Sun Java, QuickTime, iTunes, Browsers) Windows
  • 21.
  • 22. Just exacerbates the whole heterogeneous patch management challengeMicrosoft Apps (Office, etc.) System Agents (Dell, HP, etc.) Adobe Apps (Acrobat, Flash) Other Popular Apps (Sun Java, QuickTime, iTunes, Browsers) Uncommon Apps Windows Virtualization Hosts (VMWare, HyperVisor, Xen)
  • 23.
  • 24. vCenter only updates ESX(i) hosts and vCenter
  • 26. Costs $Microsoft Apps (Office, etc.) System Agents (Dell, HP, etc.) Adobe Apps (Acrobat, Flash) Other Popular Apps (Sun Java, QuickTime, iTunes, Browsers) Uncommon Apps Windows Virtualization Hosts (VMWare, HyperVisor, Xen) Virtualization Managers (vCenter) vCenter Update Manager
  • 27.
  • 29. Companies moving to “freer” distributions of Linux but you lose the management tools of RHNMicrosoft Apps (Office, etc.) System Agents (Dell, HP, etc.) Adobe Apps (Acrobat, Flash) Other Popular Apps (Sun Java, QuickTime, iTunes, Browsers) Uncommon Apps Windows Linux Virtualization Hosts (VMWare, HyperVisor, Xen) Virtualization Managers (vCenter) vCenter Update Manager
  • 30. Product Patching © 2010 Monterey Technology Group Inc. ? ? Sun Patch Manager, et al RHN, et al ? HP Insight Control, et al WSUS Microsoft Apps (Office, etc.) System Agents (Dell, HP, etc.) Adobe Apps (Acrobat, Flash) Other Popular Apps (Sun Java, QuickTime, iTunes, Browsers) Uncommon Apps Unix Windows Linux Virtualization Hosts (VMWare, HyperVisor, Xen) Virtualization Managers (vCenter) vCenter Update Manager
  • 31.
  • 32. No centrally controllable patch managerVirtualization Managers (vCenter) vCenter Update Manager
  • 33. Product Patching © 2010 Monterey Technology Group Inc. ? ? Sun Patch Manager, et al RHN, et al ? HP Insight Control, et al WSUS ? ? Microsoft Apps (Office, etc.) System Agents (Dell, HP, etc.) Adobe Apps (Acrobat, Flash) Other Popular Apps (Sun Java, QuickTime, iTunes, Browsers) Uncommon Apps Apps and Agents Unix Mac Windows Linux Virtualization Hosts (VMWare, HyperVisor, Xen) Virtualization Managers (vCenter) vCenter Update Manager
  • 34. Product Patching © 2010 Monterey Technology Group Inc. ? ? Sun Patch Manager, et al RHN, et al ? HP Insight Control, et al WSUS ? ? Microsoft Apps (Office, etc.) System Agents (Dell, HP, etc.) Adobe Apps (Acrobat, Flash) Other Popular Apps (Sun Java, QuickTime, iTunes, Browsers) Uncommon Apps Apps and Agents Unix Mac Windows Linux Virtualization Hosts (VMWare, HyperVisor, Xen) ? Virtualization Managers (vCenter) vCenter Update Manager Network Devices Routers, VPNs, Switches, Access Points, Firewalls
  • 35. How to handle enterprise patching © 2010 Monterey Technology Group Inc. Central security response team ID all hardware, software, devices ID team within IT responsible for each product Subscribe to each vendor’s security update service Subscribe to CVE lists Each advisory Does it affect any products we have? Contact appropriate team Track decision and follow through Document Regular vulnerability scanning
  • 36. Security Alerts © 2010 Monterey Technology Group Inc.
  • 37. Bottom Line © 2010 Monterey Technology Group Inc. Patch management Needs to be comprehensive and consistent across the enterprise Technology needed for efficiency and effectiveness Cooperation, coordination and workflow needed between security and operational teams Not just an OS issue anymore Not just a server issue anymore Not just a Microsoft issue anymore
  • 38. © 2010 Monterey Technology Group Inc. Brought to you by Speakers Russ Ernst, Senior Product Manager Andrea Bolz, Solution Marketing Manager
  • 39. Want to Learn More? Lumension info@lumension.com www.lumension.com http://blog.lumension.com Resource Center http://www.lumension.com/Resources/Resource-Center/Reduce-Your-Threat-Exposure.aspx © 2010 Monterey Technology Group Inc.