SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Stopping the Adobe,
Apple and Java Software
    Updater Insanity



                   © 2012 Monterey Technology Group Inc.
Brought to you by




              www.lumension.com



Speaker
      Russ Ernst – Group Product Manager
Preview of Key Points

 Trends
 Statistics
 Updater problems
 Centralized, multi-vendor patch management




© 2012 Monterey Technology Group Inc.
Poll

 Which 3rd party vendor tool causes the most
  trouble in your environment?




© 2012 Monterey Technology Group Inc.
Trends

 The risk is in the endpoint
  The endpoint is the most vulnerable
  All endpoints are important – not just high value
   employees




© 2012 Monterey Technology Group Inc.
Trends

 The risk is in the endpoint
  Attackers are focusing on the endpoint
            •    Duqu
            •    Flame
            •    Stuxnet
            •    RSA
            •    Spearfishing




© 2012 Monterey Technology Group Inc.
Trends

 The risk is in the endpoint
  Attackers have the strongest motivators of all
            • Politics
                       Asian state sponsored
                       IP
                       Economic data
                       Defense
            • Religion
            • Money
                    Primarily Eastern Europe
                    Looking for very specific data that can be monetized
                    Once acquired, they’re done


© 2012 Monterey Technology Group Inc.
Statistics

 MS Patches compared to Non-MS

                                        Acrobat,
                                           9

                                             Flash, 11 Shockwa               Microsoft,
                                                                                32
                                                        ve, 4    Other, 87

             Firefox, 5
                 0                                     Java, 5


                                                   Apple, 8




© 2012 Monterey Technology Group Inc.
Trends

 The risk is in the endpoint
  Targeted attacks makes it harder for AV vendors
   to protect you
  Patch speed is increasingly important
            • Zero day exploits
     But that’s hard when you have patches from
      many vendors and no centralized way to control
      them




© 2012 Monterey Technology Group Inc.
Non-MS Patching

 Each product (not even each vendor) has its
  own updater
 No centralized control
  Are updaters installed?
  Do employees remove or disable them?
  Do employees allow them to complete?
  Are patches failing?
  How up-to-date are patches across the fleet?



© 2012 Monterey Technology Group Inc.
Non-MS Patching

 Performance issues
  Every PC downloading updates at the same time
 Other issues
  Other unwanted software installed
            • Ask and Google toolbars
 Silent updates
 Java
  Need I say more?



© 2012 Monterey Technology Group Inc.
Non-MS Patching

  How many updaters?
   Updater for Adobe Air
   Updater for Adobe Flash Player
   Updater for Adobe Reader/Acrobat
   Updater for Adobe Shockwave Player
   Updater for Apple iTunes
   Updater for Apple QuickTime
   Updater for Oracle Java
   Updater for Mozilla Firefox
   Hardware updaters
            • Laptop
            • Mouse
            • Video


© 2012 Monterey Technology Group Inc.
Another development

 Microsoft’s auto-update infrastructure has
  been compromised already?
 How hard would it be to compromise someone
  elses?




© 2012 Monterey Technology Group Inc.
Other facts

 Patches often need to be chained
  Not cumulative




© 2012 Monterey Technology Group Inc.
Bottom Line

 Need in-house controlled patching
  Centralized
  Multi-vendor
  Multi-platform




© 2012 Monterey Technology Group Inc.
Tips for the meantime

 Patches may need to be chained
 Subscribe to multi-vendor patch update
  services
  http://leic.lumension.com/
 Make sure you know what’s on your network
  Free: Lumension Application Scanner Tool




© 2012 Monterey Technology Group Inc.
Tips for the meantime

  Familiarize yourself with each vendor/product
   Update site/blog
   How they notify; subscribe
   How their patches usually work
   Develop a plan for each product that needs regular patching
            • Evaluate risk and exposure
            • Determine testing if any
      Some patches can be pushed out
      If not then you have to hope for the best
            • That updater on each PC is doing its job
      Follow up with vulnerability scans
            • Do vulnerability scanners find this?
            • Free: Lumension Vulnerability Scanner




© 2012 Monterey Technology Group Inc.
Bottom Line

 Need in-house controlled patching
  Centralized
  Multi-vendor
  Multi-platform




© 2012 Monterey Technology Group Inc.
Brought to you by




              www.lumension.com



Speaker
      Russ Ernst – Group Product Manager
Streamline Patch Management Across Your Environment

 •Lumension Endpoint Management and Security Suite is an
  extensible solution suite that reduces complexity, optimizes TCO,
  improves visibility and delivers control back to IT.

     » Reduces Complexity and TCO
       through effective automation of
       operational tasks
     » Provides Greater Visibility and
       Into Control Over your network’s
       endpoints
     » Improves Operational
       Efficiency with a single console
       to manage multiple functions
     » Elevates Security and
       Compliance Posture through
       automatic policy enforcement



20
Patch is Core Component of Defense-in-Depth

                                                              Emerging Endpoint
                                                                Security Stack



               Traditional
                Endpoint
                Security

                                                 Defense-N-
                  Blacklisting                     Depth
                  As The Core                                      Patch &
                                                                 Configuration
                                                                    Mgmt.
                                           Consumerization
Zero Day                                        of IT



                                 Malware
            3rd Party
                                  As a
           Application
                                 Service
              Risk




 21
SecuritySCAPE 2012: Virtual Event 9/25-9/26/12
Register for this FREE virtual event!


     »http://www.securityscape2012.com




22

Weitere ähnliche Inhalte

Was ist angesagt?

Real Cost of Software Remediation
Real Cost of Software RemediationReal Cost of Software Remediation
Real Cost of Software RemediationDenim Group
 
Intern Presentation
Intern PresentationIntern Presentation
Intern PresentationConor Park
 
Threat Intelligence + SIEM: A Force to be Reckoned With
Threat Intelligence +  SIEM: A Force to be Reckoned WithThreat Intelligence +  SIEM: A Force to be Reckoned With
Threat Intelligence + SIEM: A Force to be Reckoned WithSolarWinds
 
SLBdiensten XP sessie: Windows XP End of Support
SLBdiensten XP sessie: Windows XP End of SupportSLBdiensten XP sessie: Windows XP End of Support
SLBdiensten XP sessie: Windows XP End of SupportSLBdiensten
 
Microsoft And The Future Of Productivity
Microsoft And The Future Of ProductivityMicrosoft And The Future Of Productivity
Microsoft And The Future Of ProductivityRichard Chaves
 
11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)Jeremiah Grossman
 
How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix PerformanceHow to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix PerformanceChristine Ackley
 
04. Agile development of sustainable software - Joost Visser - #ScaBru18
04. Agile development of sustainable software - Joost Visser - #ScaBru1804. Agile development of sustainable software - Joost Visser - #ScaBru18
04. Agile development of sustainable software - Joost Visser - #ScaBru18AgileConsortiumINT
 
Service production from d3 pitfall viewpoint
Service production from d3 pitfall viewpointService production from d3 pitfall viewpoint
Service production from d3 pitfall viewpointWalter Liu
 
The Permanent Campaign
The Permanent CampaignThe Permanent Campaign
The Permanent CampaignDenim Group
 
Security For Free
Security For FreeSecurity For Free
Security For Freegwarden
 
Modern Infrastructure E-Zine: November 2012
Modern Infrastructure E-Zine: November 2012Modern Infrastructure E-Zine: November 2012
Modern Infrastructure E-Zine: November 2012DCVTT
 
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...Cyber Security Alliance
 
EMC - Accelerate Cloud Journey Webinar
EMC - Accelerate Cloud Journey WebinarEMC - Accelerate Cloud Journey Webinar
EMC - Accelerate Cloud Journey WebinarErin Banks
 
Windows intune screenshots
Windows intune screenshotsWindows intune screenshots
Windows intune screenshotsNorthernstar
 

Was ist angesagt? (19)

Real Cost of Software Remediation
Real Cost of Software RemediationReal Cost of Software Remediation
Real Cost of Software Remediation
 
Intern Presentation
Intern PresentationIntern Presentation
Intern Presentation
 
Threat Intelligence + SIEM: A Force to be Reckoned With
Threat Intelligence +  SIEM: A Force to be Reckoned WithThreat Intelligence +  SIEM: A Force to be Reckoned With
Threat Intelligence + SIEM: A Force to be Reckoned With
 
SLBdiensten XP sessie: Windows XP End of Support
SLBdiensten XP sessie: Windows XP End of SupportSLBdiensten XP sessie: Windows XP End of Support
SLBdiensten XP sessie: Windows XP End of Support
 
Microsoft And The Future Of Productivity
Microsoft And The Future Of ProductivityMicrosoft And The Future Of Productivity
Microsoft And The Future Of Productivity
 
Windows Intune: Simplify Your PC Management
Windows Intune: Simplify Your PC ManagementWindows Intune: Simplify Your PC Management
Windows Intune: Simplify Your PC Management
 
Devsec ops
Devsec opsDevsec ops
Devsec ops
 
11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)
 
How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix PerformanceHow to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
 
04. Agile development of sustainable software - Joost Visser - #ScaBru18
04. Agile development of sustainable software - Joost Visser - #ScaBru1804. Agile development of sustainable software - Joost Visser - #ScaBru18
04. Agile development of sustainable software - Joost Visser - #ScaBru18
 
Service production from d3 pitfall viewpoint
Service production from d3 pitfall viewpointService production from d3 pitfall viewpoint
Service production from d3 pitfall viewpoint
 
The Permanent Campaign
The Permanent CampaignThe Permanent Campaign
The Permanent Campaign
 
Neeharika karumanchi
Neeharika karumanchiNeeharika karumanchi
Neeharika karumanchi
 
Security For Free
Security For FreeSecurity For Free
Security For Free
 
Modern Infrastructure E-Zine: November 2012
Modern Infrastructure E-Zine: November 2012Modern Infrastructure E-Zine: November 2012
Modern Infrastructure E-Zine: November 2012
 
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
 
EMC - Accelerate Cloud Journey Webinar
EMC - Accelerate Cloud Journey WebinarEMC - Accelerate Cloud Journey Webinar
EMC - Accelerate Cloud Journey Webinar
 
Job Postings
Job PostingsJob Postings
Job Postings
 
Windows intune screenshots
Windows intune screenshotsWindows intune screenshots
Windows intune screenshots
 

Andere mochten auch

Welcome to the Age of Weaponized Malware. What Does it Mean to Your Enterprise?
Welcome to the Age of Weaponized Malware. What Does it Mean to Your Enterprise?Welcome to the Age of Weaponized Malware. What Does it Mean to Your Enterprise?
Welcome to the Age of Weaponized Malware. What Does it Mean to Your Enterprise?Lumension
 
Why go to the Moon?
Why go to the Moon?Why go to the Moon?
Why go to the Moon?kfury
 
How to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetHow to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetLumension
 
Bates College Industry Insights Presentation
Bates College Industry Insights PresentationBates College Industry Insights Presentation
Bates College Industry Insights PresentationD V
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...Lumension
 
Sensational Headlines or Real Threats? What New Attacks Mean For You.
Sensational Headlines or Real Threats? What New Attacks Mean For You. Sensational Headlines or Real Threats? What New Attacks Mean For You.
Sensational Headlines or Real Threats? What New Attacks Mean For You. Lumension
 
Securing and Greening Your IT
Securing and Greening Your ITSecuring and Greening Your IT
Securing and Greening Your ITLumension
 
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsLumension
 
2011 Social Media Malware Trends
2011 Social Media Malware Trends2011 Social Media Malware Trends
2011 Social Media Malware TrendsLumension
 
Hashvetvutyun 2012 13
Hashvetvutyun 2012 13Hashvetvutyun 2012 13
Hashvetvutyun 2012 13nelaT
 
Application of the EU policies on migration to the Eastern Neighbourhood and ...
Application of the EU policies on migration to the Eastern Neighbourhood and ...Application of the EU policies on migration to the Eastern Neighbourhood and ...
Application of the EU policies on migration to the Eastern Neighbourhood and ...MigrationPolicyCentre
 
mohammed abd el badiea c.v2016v1
mohammed abd el badiea c.v2016v1mohammed abd el badiea c.v2016v1
mohammed abd el badiea c.v2016v1mohamed badiea
 
PRELIMINARE__PER_IL__GIARDINO
PRELIMINARE__PER_IL__GIARDINOPRELIMINARE__PER_IL__GIARDINO
PRELIMINARE__PER_IL__GIARDINOstefano54
 

Andere mochten auch (20)

Welcome to the Age of Weaponized Malware. What Does it Mean to Your Enterprise?
Welcome to the Age of Weaponized Malware. What Does it Mean to Your Enterprise?Welcome to the Age of Weaponized Malware. What Does it Mean to Your Enterprise?
Welcome to the Age of Weaponized Malware. What Does it Mean to Your Enterprise?
 
Why go to the Moon?
Why go to the Moon?Why go to the Moon?
Why go to the Moon?
 
How to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetHow to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budget
 
Bates College Industry Insights Presentation
Bates College Industry Insights PresentationBates College Industry Insights Presentation
Bates College Industry Insights Presentation
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
 
Sensational Headlines or Real Threats? What New Attacks Mean For You.
Sensational Headlines or Real Threats? What New Attacks Mean For You. Sensational Headlines or Real Threats? What New Attacks Mean For You.
Sensational Headlines or Real Threats? What New Attacks Mean For You.
 
Securing and Greening Your IT
Securing and Greening Your ITSecuring and Greening Your IT
Securing and Greening Your IT
 
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
 
2011 Social Media Malware Trends
2011 Social Media Malware Trends2011 Social Media Malware Trends
2011 Social Media Malware Trends
 
Ikasle Musika Lehiaketa 2013
Ikasle Musika Lehiaketa 2013Ikasle Musika Lehiaketa 2013
Ikasle Musika Lehiaketa 2013
 
Busca fieras héctor
Busca fieras héctorBusca fieras héctor
Busca fieras héctor
 
Ppt ruiz angiozar.
Ppt ruiz angiozar.Ppt ruiz angiozar.
Ppt ruiz angiozar.
 
Hashvetvutyun 2012 13
Hashvetvutyun 2012 13Hashvetvutyun 2012 13
Hashvetvutyun 2012 13
 
Application of the EU policies on migration to the Eastern Neighbourhood and ...
Application of the EU policies on migration to the Eastern Neighbourhood and ...Application of the EU policies on migration to the Eastern Neighbourhood and ...
Application of the EU policies on migration to the Eastern Neighbourhood and ...
 
mohammed abd el badiea c.v2016v1
mohammed abd el badiea c.v2016v1mohammed abd el badiea c.v2016v1
mohammed abd el badiea c.v2016v1
 
Rhuuuuuuuuuuuuuuuuuuu
RhuuuuuuuuuuuuuuuuuuuRhuuuuuuuuuuuuuuuuuuu
Rhuuuuuuuuuuuuuuuuuuu
 
Project-HUC-SERAMPANG-A TIE-IN_opt
Project-HUC-SERAMPANG-A TIE-IN_optProject-HUC-SERAMPANG-A TIE-IN_opt
Project-HUC-SERAMPANG-A TIE-IN_opt
 
Ravi
RaviRavi
Ravi
 
PRELIMINARE__PER_IL__GIARDINO
PRELIMINARE__PER_IL__GIARDINOPRELIMINARE__PER_IL__GIARDINO
PRELIMINARE__PER_IL__GIARDINO
 
Ovos resume
Ovos resumeOvos resume
Ovos resume
 

Ähnlich wie Stopping the Adobe, Apple and Java Software Updater Insanity

Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12Wireless_Analytics
 
Thread Fix Tour Presentation Final Final
Thread Fix Tour Presentation Final FinalThread Fix Tour Presentation Final Final
Thread Fix Tour Presentation Final FinalRobin Lutchansky
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsPeter Wood
 
Combating Threats with Workstation Configuration Management
Combating Threats with Workstation Configuration Management Combating Threats with Workstation Configuration Management
Combating Threats with Workstation Configuration Management Lumension
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mwaresolarisyourep
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoHP Enterprise Italia
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsStefan Streichsbier
 
Key Resources - z/Assure Sales Presentation
Key Resources - z/Assure Sales PresentationKey Resources - z/Assure Sales Presentation
Key Resources - z/Assure Sales Presentationrfragola
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierCTE Solutions Inc.
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacksAppSense
 
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...Lumension
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaMicrosoft Singapore
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance 1CloudRoad.com
 
G01.2013 magic quadrant for endpoint protection platforms
G01.2013  magic quadrant for endpoint protection platformsG01.2013  magic quadrant for endpoint protection platforms
G01.2013 magic quadrant for endpoint protection platformsSatya Harish
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and WelcomeCarahsoft
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - finalAndrew White
 
The quality attribute of upgradability
The quality attribute of upgradabilityThe quality attribute of upgradability
The quality attribute of upgradabilityLen Bass
 
Disaster Recovery Solutions
Disaster Recovery SolutionsDisaster Recovery Solutions
Disaster Recovery SolutionsManuel Daza
 
The Business Impact of Virtualization
The Business Impact of VirtualizationThe Business Impact of Virtualization
The Business Impact of VirtualizationFlexera
 

Ähnlich wie Stopping the Adobe, Apple and Java Software Updater Insanity (20)

Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12
 
Thread Fix Tour Presentation Final Final
Thread Fix Tour Presentation Final FinalThread Fix Tour Presentation Final Final
Thread Fix Tour Presentation Final Final
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent Threats
 
Combating Threats with Workstation Configuration Management
Combating Threats with Workstation Configuration Management Combating Threats with Workstation Configuration Management
Combating Threats with Workstation Configuration Management
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercato
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOps
 
Key Resources - z/Assure Sales Presentation
Key Resources - z/Assure Sales PresentationKey Resources - z/Assure Sales Presentation
Key Resources - z/Assure Sales Presentation
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry Tessier
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacks
 
Making Network Security Relevant
Making Network Security RelevantMaking Network Security Relevant
Making Network Security Relevant
 
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
 
G01.2013 magic quadrant for endpoint protection platforms
G01.2013  magic quadrant for endpoint protection platformsG01.2013  magic quadrant for endpoint protection platforms
G01.2013 magic quadrant for endpoint protection platforms
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and Welcome
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
 
The quality attribute of upgradability
The quality attribute of upgradabilityThe quality attribute of upgradability
The quality attribute of upgradability
 
Disaster Recovery Solutions
Disaster Recovery SolutionsDisaster Recovery Solutions
Disaster Recovery Solutions
 
The Business Impact of Virtualization
The Business Impact of VirtualizationThe Business Impact of Virtualization
The Business Impact of Virtualization
 

Mehr von Lumension

2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers GuideLumension
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationLumension
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary ResultsLumension
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Lumension
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Lumension
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftLumension
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...Lumension
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and AnalysisLumension
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskLumension
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateLumension
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Lumension
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Lumension
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskLumension
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security SolutionsLumension
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Lumension
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesLumension
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksLumension
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT RiskLumension
 
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-VirusDefending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-VirusLumension
 
2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?Lumension
 

Mehr von Lumension (20)

2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security Risks
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
 
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-VirusDefending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
 
2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?
 

Kürzlich hochgeladen

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Stopping the Adobe, Apple and Java Software Updater Insanity

  • 1. Stopping the Adobe, Apple and Java Software Updater Insanity © 2012 Monterey Technology Group Inc.
  • 2. Brought to you by www.lumension.com Speaker  Russ Ernst – Group Product Manager
  • 3. Preview of Key Points Trends Statistics Updater problems Centralized, multi-vendor patch management © 2012 Monterey Technology Group Inc.
  • 4. Poll Which 3rd party vendor tool causes the most trouble in your environment? © 2012 Monterey Technology Group Inc.
  • 5. Trends The risk is in the endpoint The endpoint is the most vulnerable All endpoints are important – not just high value employees © 2012 Monterey Technology Group Inc.
  • 6. Trends The risk is in the endpoint Attackers are focusing on the endpoint • Duqu • Flame • Stuxnet • RSA • Spearfishing © 2012 Monterey Technology Group Inc.
  • 7. Trends The risk is in the endpoint Attackers have the strongest motivators of all • Politics  Asian state sponsored  IP  Economic data  Defense • Religion • Money  Primarily Eastern Europe  Looking for very specific data that can be monetized  Once acquired, they’re done © 2012 Monterey Technology Group Inc.
  • 8. Statistics MS Patches compared to Non-MS Acrobat, 9 Flash, 11 Shockwa Microsoft, 32 ve, 4 Other, 87 Firefox, 5 0 Java, 5 Apple, 8 © 2012 Monterey Technology Group Inc.
  • 9. Trends The risk is in the endpoint Targeted attacks makes it harder for AV vendors to protect you Patch speed is increasingly important • Zero day exploits But that’s hard when you have patches from many vendors and no centralized way to control them © 2012 Monterey Technology Group Inc.
  • 10. Non-MS Patching Each product (not even each vendor) has its own updater No centralized control Are updaters installed? Do employees remove or disable them? Do employees allow them to complete? Are patches failing? How up-to-date are patches across the fleet? © 2012 Monterey Technology Group Inc.
  • 11. Non-MS Patching Performance issues Every PC downloading updates at the same time Other issues Other unwanted software installed • Ask and Google toolbars Silent updates Java Need I say more? © 2012 Monterey Technology Group Inc.
  • 12. Non-MS Patching  How many updaters?  Updater for Adobe Air  Updater for Adobe Flash Player  Updater for Adobe Reader/Acrobat  Updater for Adobe Shockwave Player  Updater for Apple iTunes  Updater for Apple QuickTime  Updater for Oracle Java  Updater for Mozilla Firefox  Hardware updaters • Laptop • Mouse • Video © 2012 Monterey Technology Group Inc.
  • 13. Another development Microsoft’s auto-update infrastructure has been compromised already? How hard would it be to compromise someone elses? © 2012 Monterey Technology Group Inc.
  • 14. Other facts Patches often need to be chained Not cumulative © 2012 Monterey Technology Group Inc.
  • 15. Bottom Line Need in-house controlled patching Centralized Multi-vendor Multi-platform © 2012 Monterey Technology Group Inc.
  • 16. Tips for the meantime Patches may need to be chained Subscribe to multi-vendor patch update services http://leic.lumension.com/ Make sure you know what’s on your network Free: Lumension Application Scanner Tool © 2012 Monterey Technology Group Inc.
  • 17. Tips for the meantime  Familiarize yourself with each vendor/product  Update site/blog  How they notify; subscribe  How their patches usually work  Develop a plan for each product that needs regular patching • Evaluate risk and exposure • Determine testing if any  Some patches can be pushed out  If not then you have to hope for the best • That updater on each PC is doing its job  Follow up with vulnerability scans • Do vulnerability scanners find this? • Free: Lumension Vulnerability Scanner © 2012 Monterey Technology Group Inc.
  • 18. Bottom Line Need in-house controlled patching Centralized Multi-vendor Multi-platform © 2012 Monterey Technology Group Inc.
  • 19. Brought to you by www.lumension.com Speaker  Russ Ernst – Group Product Manager
  • 20. Streamline Patch Management Across Your Environment •Lumension Endpoint Management and Security Suite is an extensible solution suite that reduces complexity, optimizes TCO, improves visibility and delivers control back to IT. » Reduces Complexity and TCO through effective automation of operational tasks » Provides Greater Visibility and Into Control Over your network’s endpoints » Improves Operational Efficiency with a single console to manage multiple functions » Elevates Security and Compliance Posture through automatic policy enforcement 20
  • 21. Patch is Core Component of Defense-in-Depth Emerging Endpoint Security Stack Traditional Endpoint Security Defense-N- Blacklisting Depth As The Core Patch & Configuration Mgmt. Consumerization Zero Day of IT Malware 3rd Party As a Application Service Risk 21
  • 22. SecuritySCAPE 2012: Virtual Event 9/25-9/26/12 Register for this FREE virtual event! »http://www.securityscape2012.com 22

Hinweis der Redaktion

  1. Lumension Patch and Remediation’s automated workflow follows the Aberdeen recommendations and is now a module on the Lumension Endpoint Management and Security Suite, which consolidates endpoint operations, security, compliance, and IT risk management workflows for enhanced visibility & controlSingle-agent, single-console architecture reduces complexity and total cost of ownershipProvides end-to-end visibilityImproves productivityEnhances securityOptimizes compliance and IT risk managementReduces IT EnvironmentComplexity»»Reduces Endpoint Total Costof Ownership»» Provides Greater VisibilityInto and Control Over YourNetwork’s Endpoints»» Elevates Security andCompliance Posture»» Optimizes ExistingResources for Reduction ofIT Risk»»Supports Your ITEnvironment Withina Dynamic BusinessEnvironmentKey Features»»Integrated Endpoint ManagementConsole»»Modularly Licensed ProductCapabilities»»Scalable and Agile Architecture»»Single Promotable Agent»