SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Downloaden Sie, um offline zu lesen
Effective Patch and Software
Update Management
Orin Thomas
@orinthomas
orin@windowsitpro.com
In This Session …
• Not just Windows update
• How organizations fail at update management
• Why organizations fail at update management
• Too many updates
• Test or just deploy?
• Tiered rollout
• Update rollback
• Verifying deployment
• Ultimate aims
There is no single correct way of managing
software updates
There are many ways of
incorrectly, badly, & terribly
managing software updates
Exploits are often present
either at the time of an update’s release or
within a few days of the update’s release
Not Just Windows Update
• Fabric updates
– Hardware updates (BIOS/Firmware)
– Networking equipment
– Storage equipment
• Big vendor updates
How Organizations Fail at Patch Management
• Patches and updates applied in a
haphazard manner
• Patches and updates applied in a delayed
manner
• Patches and updates applied only after an
event like WannaCry occurs
• Patches and updates not applied at all
Why Organizations Fail at Patch Management
• Resource problems
– No time allocated to test
– No test environment
• Fear of incompatibility
• Too many updates
• Laziness
– See no need to invest in patch management
– Often running older versions of software because it works
Too Many Updates
• New software processes mean that
applications and software are updated
frequently
– Example: Apt-get will almost always have some
packages
• Organizations don’t have resources
Should You Test or Just Roll Out?
• Ensure you have a near bulletproof roll back
plan
• Rapid deployment of patches & roll back if
issues occur in production
• Minimizes risk of vulnerability
• Increases risk of incompatibility
Loss of Control to Vendors
• Vendors reducing information about
contents of patches
– Update rollups
– Microsoft’s new cumulative update strategy
• Fabric-tear in the cloud when cloud provider
updates PaaS and application no longer
works correctly
Tiered Rollout
• Test workloads
– Must be representative of production workload
– Must be tested in manner similar to production
workload
– Challenging for fabric updates
• Canary users
– Ones that are likely to raise problems rather than
go along with them
Patch and Update Rollback
• Even with test workload group, you won’t
catch everything
• Be able to quickly roll back an update
deployment that causes problems
Verifying Rollout
• If update deployment fails, will you know?
• How do you ensure newly deployed
workloads are fully updated?
Ultimate Aims
• Awareness of patch and update releases
from vendors
• Patches and updates applied soon after
release
• Ability to verify that patches and updates
have been successfully applied
• Ability to roll back, should problems occur
Summary …
• Not just Windows Update
• How organizations fail at update management
• Why organizations fail at update management
• Too many updates
• Test or just deploy?
• Tiered rollout
• Update rollback
• Verifying deployment
• Ultimate aims
KACE Endpoint Systems
Management for growing
organizations
Jason Morano - Quest Sales Engineer - 6/21/2017
Confidential18
More endpoints = higher security risk
How will you maintain tight
security across devices,
platforms, use cases, and
enablement strategies?
The security threats are
chilling.
323K
new malicious mobile
programs recently
activated
235M
malicious attacks from online
sources around the world
80K
malware variants
created every day
Confidential19
Higher risk = greater business impact
How will you minimize
the economic cost and potential
damage to your company’s
reputation?
The business impact can
be catastrophic.
50Kfrom just one lost unencrypted USB
thumb drive
medical providers
whose data is at risk$222the average cost per
compromised record
3.8Mthe average cost
of one data breach
Confidential20
If you’re overwhelmed, you’re not alone
Most IT organizations
are struggling with
these challenges.
The management
challenges are daunting.
97%
of IT organizations report concerns about
managing endpoint growth
61%
say they already have unknown
devices and applications on their
networks
Confidential21
Endpoint systems management lifecycle
• Image capture
• Zero touch OS
deployment
• Multicasting
• User state migration
• Remote site support
• Service desk
• User portal & self service
• Monitoring & alerting
• Remote control
• Mobile access
• Patch management
• Configuration
management
• Policy enforcement
• Vulnerability scanning
• Discovery & inventory
• Asset management
• Software distribution
• Reporting & compliance
Confidential22
• Reduce infrastructure costs
• Expedite time to value
• Automate asset inventory and
patching
• Save time on asset discovery
and inventory using
consolidated reporting
• Improve control, security,
response time and user
productivity
• Cut downtime and risk
• Ensure license compliance
• Perform application updates in
minutes
• Upgrade suites in days, not
weeks
Optimize
application
experience
Modernize
infrastructure
for the cloud
Automate
complex
processes
Enable a
data-driven
business
• Reduce IT time and resources
for system provisioning,
deployments, patching and
service request responses
KACE can help
Confidential23
Optimize
application
experience
Modernize
infrastructure
for the cloud
Automate
complex
processes
Enable a
data-driven
business
Customer validation
• 68% of surveyed IT organizations
have more accurate hardware and
software inventory to better inform
purchasing and maximize use of
existing assets as a result of
purchasing KACE K1000.
• 50% of surveyed IT organizations
have simplified application
distribution and maintenance to
ensure applications are up to date
and secure as a result of
purchasing KACE.
• 53% of IT organizations chose the
KACE Systems Management
Deployment Appliance because
they were overwhelmed by the
amount of manual chores to simply
keep operating systems up to date
and running.
• 70% of customers implemented
KACE in less than 2 weeks.
More than 10,000 global organizations
use KACE Appliances today
“I can now focus on key
strategic initiatives such as
gateway security, PCI
compliance, and MDM.”
— Eugene Prystupa, System
Administrator, Builders Warehouse
“The K2000 is hands down the
easiest tool to use for imaging
diverse platforms without
having to re-invent the wheel..”
— Ruiz Adam, Systems Administrator,
ICU Medical, Inc.
“With K1000’s automation, it
has time and time again saved
us man hours. IT headaches for
installing and updating
software are no longer.”
— Darrell Fauvel, IT Administrator, Texas
Tech University Health Sciences Center
“We have cut our security
patching time in half. KACE has
truly made our enterprise much
more easy to manage and
secure.”
— Peter Hardy, IT Administrator, PNY
Technologies
Confidential25
The KACE Difference
Fast Implementation Simplified Comprehensive
• From initial deployment to
ongoing maintenance,
management and support to
retirement
• Support for Windows, Mac,
Chromebook, Linux, UNIX
• For computers, servers,
mobile devices and
connected non-computing
devices
• Comprehensive, integrated
all-in-one solution
• Familiar tabbed user
interface, one click
upgrades
• Online web-based training
• Physical or virtual appliance
– requires no additional
hardware or software
• No need for extensive
professional services
• Fully operational in weeks,
not months or years
Confidential26
Endpoint security to protect data & enable productive users
Protect Windows and Mac platforms as well as vulnerable third-party
applications by keeping patches up to date.
Detect vulnerabilities in your environment and identify systems that aren’t
compliant using security audits.
Streamline configuration and security policy enforcement processes, such as
firewall, browser and registry settings by system, group, or network-wide.
Patch
Management
Vulnerability
Scanning
Configuration
Management
Confidential27
Addressing critical security controls with KACE
Detect
Assess
Remediate
Protect
• Device Discovery
• Inventory
• SCAP Scanning
• OVAL Scanning
• SCAP Results
• OVAL Results
• Patch Detect
• Patch Deployment • Configuration Correction
• Software & OS
Deployment
• Configuration Enforcement
• Software Blacklisting
Confidential28
Streamline patch management across the environment
Reduce TCO
Through effective
automation of
operational tasks.
Elevate security
And compliance
through automatic
policy enforcement.
Provide visibility
And greater control
over your network’s
endpoints.
Better security with KACE
Patch rollback
Easily roll back
patches that are
adversely affecting
your systems.
Better user
experience
Prompt users for patched
and allow them to snooze.
Alerts & reports
Find out what
happens with your
updates and easily
report on status.
Watch this on demand webcast
here: http://ow.ly/c3zW30eLuOR

Weitere ähnliche Inhalte

Was ist angesagt?

Windows 10 Migration Tips, Tricks, and Strategies
Windows 10 Migration Tips, Tricks, and StrategiesWindows 10 Migration Tips, Tricks, and Strategies
Windows 10 Migration Tips, Tricks, and StrategiesIvanti
 
SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012Amit Gatenyo
 
System Center Essentials
System Center EssentialsSystem Center Essentials
System Center Essentialssolsoft
 
Comparative analysis of it monitoring tools october2015 final
Comparative analysis of it monitoring tools october2015 finalComparative analysis of it monitoring tools october2015 final
Comparative analysis of it monitoring tools october2015 finalapprize360
 
SpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu JaegerSpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu JaegerSpiceworks
 
The Business Value of System Center 2012
The Business Value of System Center 2012The Business Value of System Center 2012
The Business Value of System Center 2012jmustac
 
An Easy To Deploy Penetration Testing Platform
An Easy To Deploy Penetration Testing PlatformAn Easy To Deploy Penetration Testing Platform
An Easy To Deploy Penetration Testing PlatformBo-Chun Peng
 
Practical operability techniques for teams - Matthew Skelton - Conflux - Cont...
Practical operability techniques for teams - Matthew Skelton - Conflux - Cont...Practical operability techniques for teams - Matthew Skelton - Conflux - Cont...
Practical operability techniques for teams - Matthew Skelton - Conflux - Cont...Matthew Skelton
 
Bringing Patch Management to Spiceworks
Bringing Patch Management to SpiceworksBringing Patch Management to Spiceworks
Bringing Patch Management to SpiceworksSpiceworks
 
Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...
Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...
Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...eG Innovations
 
Ensure The Success of VMware Horizon View Deployments
Ensure The Success of VMware Horizon View DeploymentsEnsure The Success of VMware Horizon View Deployments
Ensure The Success of VMware Horizon View DeploymentseG Innovations
 
Enterprise DevOps and the Cloud
Enterprise DevOps and the CloudEnterprise DevOps and the Cloud
Enterprise DevOps and the CloudCloudCheckr
 
V center operations standard presentation
V center operations standard presentationV center operations standard presentation
V center operations standard presentationsolarisyourep
 
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...SolarWinds
 
Resilience and Security @ Scale: Lessons Learned
Resilience and Security @ Scale: Lessons LearnedResilience and Security @ Scale: Lessons Learned
Resilience and Security @ Scale: Lessons LearnedJason Chan
 
Experts Live Europe 2017 - Windows 10 Servicing - the do’s and don'ts
Experts Live Europe 2017 -  Windows 10 Servicing - the do’s and don'tsExperts Live Europe 2017 -  Windows 10 Servicing - the do’s and don'ts
Experts Live Europe 2017 - Windows 10 Servicing - the do’s and don'tsAlexander Benoit
 
BOSS deploy presentation
BOSS deploy presentationBOSS deploy presentation
BOSS deploy presentationSue Baxter
 
Windows 7 Optimized Desktop
Windows 7 Optimized DesktopWindows 7 Optimized Desktop
Windows 7 Optimized DesktopIT Masterclasses
 

Was ist angesagt? (20)

Windows 10 Migration Tips, Tricks, and Strategies
Windows 10 Migration Tips, Tricks, and StrategiesWindows 10 Migration Tips, Tricks, and Strategies
Windows 10 Migration Tips, Tricks, and Strategies
 
SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012
 
System Center Essentials
System Center EssentialsSystem Center Essentials
System Center Essentials
 
Comparative analysis of it monitoring tools october2015 final
Comparative analysis of it monitoring tools october2015 finalComparative analysis of it monitoring tools october2015 final
Comparative analysis of it monitoring tools october2015 final
 
SpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu JaegerSpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu Jaeger
 
Akant_Kukreja
Akant_KukrejaAkant_Kukreja
Akant_Kukreja
 
The Business Value of System Center 2012
The Business Value of System Center 2012The Business Value of System Center 2012
The Business Value of System Center 2012
 
An Easy To Deploy Penetration Testing Platform
An Easy To Deploy Penetration Testing PlatformAn Easy To Deploy Penetration Testing Platform
An Easy To Deploy Penetration Testing Platform
 
Practical operability techniques for teams - Matthew Skelton - Conflux - Cont...
Practical operability techniques for teams - Matthew Skelton - Conflux - Cont...Practical operability techniques for teams - Matthew Skelton - Conflux - Cont...
Practical operability techniques for teams - Matthew Skelton - Conflux - Cont...
 
Bringing Patch Management to Spiceworks
Bringing Patch Management to SpiceworksBringing Patch Management to Spiceworks
Bringing Patch Management to Spiceworks
 
Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...
Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...
Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...
 
Ensure The Success of VMware Horizon View Deployments
Ensure The Success of VMware Horizon View DeploymentsEnsure The Success of VMware Horizon View Deployments
Ensure The Success of VMware Horizon View Deployments
 
Enterprise DevOps and the Cloud
Enterprise DevOps and the CloudEnterprise DevOps and the Cloud
Enterprise DevOps and the Cloud
 
V center operations standard presentation
V center operations standard presentationV center operations standard presentation
V center operations standard presentation
 
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
 
Resilience and Security @ Scale: Lessons Learned
Resilience and Security @ Scale: Lessons LearnedResilience and Security @ Scale: Lessons Learned
Resilience and Security @ Scale: Lessons Learned
 
Ksplice Presentation External
Ksplice Presentation ExternalKsplice Presentation External
Ksplice Presentation External
 
Experts Live Europe 2017 - Windows 10 Servicing - the do’s and don'ts
Experts Live Europe 2017 -  Windows 10 Servicing - the do’s and don'tsExperts Live Europe 2017 -  Windows 10 Servicing - the do’s and don'ts
Experts Live Europe 2017 - Windows 10 Servicing - the do’s and don'ts
 
BOSS deploy presentation
BOSS deploy presentationBOSS deploy presentation
BOSS deploy presentation
 
Windows 7 Optimized Desktop
Windows 7 Optimized DesktopWindows 7 Optimized Desktop
Windows 7 Optimized Desktop
 

Ähnlich wie Effective Patch and Software Update Management

VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld
 
Continuous delivery
Continuous deliveryContinuous delivery
Continuous deliveryMasas Dani
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityAlert Logic
 
What is Platform Observability? An Overview
What is Platform Observability? An OverviewWhat is Platform Observability? An Overview
What is Platform Observability? An OverviewKumar Kolaganti
 
The Business Value of Modernizing your Windows Infrastructure and Bringing Li...
The Business Value of Modernizing your Windows Infrastructure and Bringing Li...The Business Value of Modernizing your Windows Infrastructure and Bringing Li...
The Business Value of Modernizing your Windows Infrastructure and Bringing Li...Puppet
 
Continuous Delivery and Continuous Agile by Andy Singleton - Agile Maine Day...
Continuous Delivery and Continuous Agile by Andy Singleton - Agile Maine Day...Continuous Delivery and Continuous Agile by Andy Singleton - Agile Maine Day...
Continuous Delivery and Continuous Agile by Andy Singleton - Agile Maine Day...agilemaine
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015Shannon Lietz
 
Wasserman Keynote at ICSSP 2013
Wasserman Keynote at ICSSP 2013Wasserman Keynote at ICSSP 2013
Wasserman Keynote at ICSSP 2013twasserman
 
Infrastructure as Code with Chef
Infrastructure as Code with ChefInfrastructure as Code with Chef
Infrastructure as Code with ChefSarah Hynes Cheney
 
Continuous delivery - takeaways
Continuous delivery - takeawaysContinuous delivery - takeaways
Continuous delivery - takeawaysManuela Grindei
 
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...Dell World
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Digital Bond
 
(SEC312) Taking a DevOps Approach to Security | AWS re:Invent 2014
(SEC312) Taking a DevOps Approach to Security | AWS re:Invent 2014(SEC312) Taking a DevOps Approach to Security | AWS re:Invent 2014
(SEC312) Taking a DevOps Approach to Security | AWS re:Invent 2014Amazon Web Services
 
SplunkLive! London 2016 Splunk for Devops
SplunkLive! London 2016 Splunk for DevopsSplunkLive! London 2016 Splunk for Devops
SplunkLive! London 2016 Splunk for DevopsSplunk
 
Whitepaper factors to consider when selecting an open source infrastructure ...
Whitepaper  factors to consider when selecting an open source infrastructure ...Whitepaper  factors to consider when selecting an open source infrastructure ...
Whitepaper factors to consider when selecting an open source infrastructure ...apprize360
 
Software Engineering Introduction
Software Engineering IntroductionSoftware Engineering Introduction
Software Engineering IntroductionrajeswaricseAvinuty
 
Monitoring at the Speed of DevOps
Monitoring at the Speed of DevOpsMonitoring at the Speed of DevOps
Monitoring at the Speed of DevOpsDevOps.com
 

Ähnlich wie Effective Patch and Software Update Management (20)

VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
 
Continuous delivery
Continuous deliveryContinuous delivery
Continuous delivery
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to Security
 
Devops as a service
Devops as a serviceDevops as a service
Devops as a service
 
Journey to the center of DevOps - v6
Journey to the center of DevOps - v6Journey to the center of DevOps - v6
Journey to the center of DevOps - v6
 
What is Platform Observability? An Overview
What is Platform Observability? An OverviewWhat is Platform Observability? An Overview
What is Platform Observability? An Overview
 
The Business Value of Modernizing your Windows Infrastructure and Bringing Li...
The Business Value of Modernizing your Windows Infrastructure and Bringing Li...The Business Value of Modernizing your Windows Infrastructure and Bringing Li...
The Business Value of Modernizing your Windows Infrastructure and Bringing Li...
 
Continuous Delivery and Continuous Agile by Andy Singleton - Agile Maine Day...
Continuous Delivery and Continuous Agile by Andy Singleton - Agile Maine Day...Continuous Delivery and Continuous Agile by Andy Singleton - Agile Maine Day...
Continuous Delivery and Continuous Agile by Andy Singleton - Agile Maine Day...
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015
 
Wasserman Keynote at ICSSP 2013
Wasserman Keynote at ICSSP 2013Wasserman Keynote at ICSSP 2013
Wasserman Keynote at ICSSP 2013
 
Infrastructure as Code with Chef
Infrastructure as Code with ChefInfrastructure as Code with Chef
Infrastructure as Code with Chef
 
Continuous delivery - takeaways
Continuous delivery - takeawaysContinuous delivery - takeaways
Continuous delivery - takeaways
 
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)
 
(SEC312) Taking a DevOps Approach to Security | AWS re:Invent 2014
(SEC312) Taking a DevOps Approach to Security | AWS re:Invent 2014(SEC312) Taking a DevOps Approach to Security | AWS re:Invent 2014
(SEC312) Taking a DevOps Approach to Security | AWS re:Invent 2014
 
SplunkLive! London 2016 Splunk for Devops
SplunkLive! London 2016 Splunk for DevopsSplunkLive! London 2016 Splunk for Devops
SplunkLive! London 2016 Splunk for Devops
 
Whitepaper factors to consider when selecting an open source infrastructure ...
Whitepaper  factors to consider when selecting an open source infrastructure ...Whitepaper  factors to consider when selecting an open source infrastructure ...
Whitepaper factors to consider when selecting an open source infrastructure ...
 
Software Engineering Introduction
Software Engineering IntroductionSoftware Engineering Introduction
Software Engineering Introduction
 
What is DevOps?
What is DevOps?What is DevOps?
What is DevOps?
 
Monitoring at the Speed of DevOps
Monitoring at the Speed of DevOpsMonitoring at the Speed of DevOps
Monitoring at the Speed of DevOps
 

Mehr von Quest

DBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
DBA vs Deadlock: How to Out-Index a Deadly Blocking ScenarioDBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
DBA vs Deadlock: How to Out-Index a Deadly Blocking ScenarioQuest
 
Got Open Source?
Got Open Source?Got Open Source?
Got Open Source?Quest
 
SQL Server 2017 Enhancements You Need To Know
SQL Server 2017 Enhancements You Need To KnowSQL Server 2017 Enhancements You Need To Know
SQL Server 2017 Enhancements You Need To KnowQuest
 
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 AdoptionQuest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 AdoptionQuest
 
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You NeededTop 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You NeededQuest
 
Migrating to Windows 10: Starting Fast. Finishing Strong
Migrating to Windows 10: Starting Fast. Finishing StrongMigrating to Windows 10: Starting Fast. Finishing Strong
Migrating to Windows 10: Starting Fast. Finishing StrongQuest
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryQuest
 
Investigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security BreachInvestigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security BreachQuest
 
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...Quest
 
Sounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and AlertingSounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and AlertingQuest
 
Identifying Hybrid AD Security Risks with Continuous Assessment
Identifying Hybrid AD Security Risks with Continuous Assessment Identifying Hybrid AD Security Risks with Continuous Assessment
Identifying Hybrid AD Security Risks with Continuous Assessment Quest
 
Reducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachReducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachQuest
 
Office 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking AboutOffice 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking AboutQuest
 
How to Restructure Active Directory with ZeroIMPACT
How to Restructure Active Directory with ZeroIMPACTHow to Restructure Active Directory with ZeroIMPACT
How to Restructure Active Directory with ZeroIMPACTQuest
 
How to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsHow to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsQuest
 
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...Quest
 
Your Biggest Systems Management Challenges – and How to Overcome Them
Your Biggest Systems Management Challenges – and How to Overcome ThemYour Biggest Systems Management Challenges – and How to Overcome Them
Your Biggest Systems Management Challenges – and How to Overcome ThemQuest
 
Top Five Office 365 Migration Headaches and How to Avoid Them
Top Five Office 365 Migration Headaches and How to Avoid ThemTop Five Office 365 Migration Headaches and How to Avoid Them
Top Five Office 365 Migration Headaches and How to Avoid ThemQuest
 
KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017Quest
 
How to Restructure and Modernize Active Directory
How to Restructure and Modernize Active DirectoryHow to Restructure and Modernize Active Directory
How to Restructure and Modernize Active DirectoryQuest
 

Mehr von Quest (20)

DBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
DBA vs Deadlock: How to Out-Index a Deadly Blocking ScenarioDBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
DBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
 
Got Open Source?
Got Open Source?Got Open Source?
Got Open Source?
 
SQL Server 2017 Enhancements You Need To Know
SQL Server 2017 Enhancements You Need To KnowSQL Server 2017 Enhancements You Need To Know
SQL Server 2017 Enhancements You Need To Know
 
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 AdoptionQuest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
 
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You NeededTop 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
 
Migrating to Windows 10: Starting Fast. Finishing Strong
Migrating to Windows 10: Starting Fast. Finishing StrongMigrating to Windows 10: Starting Fast. Finishing Strong
Migrating to Windows 10: Starting Fast. Finishing Strong
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story
 
Investigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security BreachInvestigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security Breach
 
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
 
Sounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and AlertingSounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and Alerting
 
Identifying Hybrid AD Security Risks with Continuous Assessment
Identifying Hybrid AD Security Risks with Continuous Assessment Identifying Hybrid AD Security Risks with Continuous Assessment
Identifying Hybrid AD Security Risks with Continuous Assessment
 
Reducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachReducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security Breach
 
Office 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking AboutOffice 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking About
 
How to Restructure Active Directory with ZeroIMPACT
How to Restructure Active Directory with ZeroIMPACTHow to Restructure Active Directory with ZeroIMPACT
How to Restructure Active Directory with ZeroIMPACT
 
How to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsHow to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 Environments
 
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
 
Your Biggest Systems Management Challenges – and How to Overcome Them
Your Biggest Systems Management Challenges – and How to Overcome ThemYour Biggest Systems Management Challenges – and How to Overcome Them
Your Biggest Systems Management Challenges – and How to Overcome Them
 
Top Five Office 365 Migration Headaches and How to Avoid Them
Top Five Office 365 Migration Headaches and How to Avoid ThemTop Five Office 365 Migration Headaches and How to Avoid Them
Top Five Office 365 Migration Headaches and How to Avoid Them
 
KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017
 
How to Restructure and Modernize Active Directory
How to Restructure and Modernize Active DirectoryHow to Restructure and Modernize Active Directory
How to Restructure and Modernize Active Directory
 

Kürzlich hochgeladen

Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....ShaimaaMohamedGalal
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 

Kürzlich hochgeladen (20)

Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 

Effective Patch and Software Update Management

  • 1. Effective Patch and Software Update Management Orin Thomas @orinthomas orin@windowsitpro.com
  • 2. In This Session … • Not just Windows update • How organizations fail at update management • Why organizations fail at update management • Too many updates • Test or just deploy? • Tiered rollout • Update rollback • Verifying deployment • Ultimate aims
  • 3. There is no single correct way of managing software updates
  • 4. There are many ways of incorrectly, badly, & terribly managing software updates
  • 5. Exploits are often present either at the time of an update’s release or within a few days of the update’s release
  • 6. Not Just Windows Update • Fabric updates – Hardware updates (BIOS/Firmware) – Networking equipment – Storage equipment • Big vendor updates
  • 7. How Organizations Fail at Patch Management • Patches and updates applied in a haphazard manner • Patches and updates applied in a delayed manner • Patches and updates applied only after an event like WannaCry occurs • Patches and updates not applied at all
  • 8. Why Organizations Fail at Patch Management • Resource problems – No time allocated to test – No test environment • Fear of incompatibility • Too many updates • Laziness – See no need to invest in patch management – Often running older versions of software because it works
  • 9. Too Many Updates • New software processes mean that applications and software are updated frequently – Example: Apt-get will almost always have some packages • Organizations don’t have resources
  • 10. Should You Test or Just Roll Out? • Ensure you have a near bulletproof roll back plan • Rapid deployment of patches & roll back if issues occur in production • Minimizes risk of vulnerability • Increases risk of incompatibility
  • 11. Loss of Control to Vendors • Vendors reducing information about contents of patches – Update rollups – Microsoft’s new cumulative update strategy • Fabric-tear in the cloud when cloud provider updates PaaS and application no longer works correctly
  • 12. Tiered Rollout • Test workloads – Must be representative of production workload – Must be tested in manner similar to production workload – Challenging for fabric updates • Canary users – Ones that are likely to raise problems rather than go along with them
  • 13. Patch and Update Rollback • Even with test workload group, you won’t catch everything • Be able to quickly roll back an update deployment that causes problems
  • 14. Verifying Rollout • If update deployment fails, will you know? • How do you ensure newly deployed workloads are fully updated?
  • 15. Ultimate Aims • Awareness of patch and update releases from vendors • Patches and updates applied soon after release • Ability to verify that patches and updates have been successfully applied • Ability to roll back, should problems occur
  • 16. Summary … • Not just Windows Update • How organizations fail at update management • Why organizations fail at update management • Too many updates • Test or just deploy? • Tiered rollout • Update rollback • Verifying deployment • Ultimate aims
  • 17. KACE Endpoint Systems Management for growing organizations Jason Morano - Quest Sales Engineer - 6/21/2017
  • 18. Confidential18 More endpoints = higher security risk How will you maintain tight security across devices, platforms, use cases, and enablement strategies? The security threats are chilling. 323K new malicious mobile programs recently activated 235M malicious attacks from online sources around the world 80K malware variants created every day
  • 19. Confidential19 Higher risk = greater business impact How will you minimize the economic cost and potential damage to your company’s reputation? The business impact can be catastrophic. 50Kfrom just one lost unencrypted USB thumb drive medical providers whose data is at risk$222the average cost per compromised record 3.8Mthe average cost of one data breach
  • 20. Confidential20 If you’re overwhelmed, you’re not alone Most IT organizations are struggling with these challenges. The management challenges are daunting. 97% of IT organizations report concerns about managing endpoint growth 61% say they already have unknown devices and applications on their networks
  • 21. Confidential21 Endpoint systems management lifecycle • Image capture • Zero touch OS deployment • Multicasting • User state migration • Remote site support • Service desk • User portal & self service • Monitoring & alerting • Remote control • Mobile access • Patch management • Configuration management • Policy enforcement • Vulnerability scanning • Discovery & inventory • Asset management • Software distribution • Reporting & compliance
  • 22. Confidential22 • Reduce infrastructure costs • Expedite time to value • Automate asset inventory and patching • Save time on asset discovery and inventory using consolidated reporting • Improve control, security, response time and user productivity • Cut downtime and risk • Ensure license compliance • Perform application updates in minutes • Upgrade suites in days, not weeks Optimize application experience Modernize infrastructure for the cloud Automate complex processes Enable a data-driven business • Reduce IT time and resources for system provisioning, deployments, patching and service request responses KACE can help
  • 23. Confidential23 Optimize application experience Modernize infrastructure for the cloud Automate complex processes Enable a data-driven business Customer validation • 68% of surveyed IT organizations have more accurate hardware and software inventory to better inform purchasing and maximize use of existing assets as a result of purchasing KACE K1000. • 50% of surveyed IT organizations have simplified application distribution and maintenance to ensure applications are up to date and secure as a result of purchasing KACE. • 53% of IT organizations chose the KACE Systems Management Deployment Appliance because they were overwhelmed by the amount of manual chores to simply keep operating systems up to date and running. • 70% of customers implemented KACE in less than 2 weeks.
  • 24. More than 10,000 global organizations use KACE Appliances today “I can now focus on key strategic initiatives such as gateway security, PCI compliance, and MDM.” — Eugene Prystupa, System Administrator, Builders Warehouse “The K2000 is hands down the easiest tool to use for imaging diverse platforms without having to re-invent the wheel..” — Ruiz Adam, Systems Administrator, ICU Medical, Inc. “With K1000’s automation, it has time and time again saved us man hours. IT headaches for installing and updating software are no longer.” — Darrell Fauvel, IT Administrator, Texas Tech University Health Sciences Center “We have cut our security patching time in half. KACE has truly made our enterprise much more easy to manage and secure.” — Peter Hardy, IT Administrator, PNY Technologies
  • 25. Confidential25 The KACE Difference Fast Implementation Simplified Comprehensive • From initial deployment to ongoing maintenance, management and support to retirement • Support for Windows, Mac, Chromebook, Linux, UNIX • For computers, servers, mobile devices and connected non-computing devices • Comprehensive, integrated all-in-one solution • Familiar tabbed user interface, one click upgrades • Online web-based training • Physical or virtual appliance – requires no additional hardware or software • No need for extensive professional services • Fully operational in weeks, not months or years
  • 26. Confidential26 Endpoint security to protect data & enable productive users Protect Windows and Mac platforms as well as vulnerable third-party applications by keeping patches up to date. Detect vulnerabilities in your environment and identify systems that aren’t compliant using security audits. Streamline configuration and security policy enforcement processes, such as firewall, browser and registry settings by system, group, or network-wide. Patch Management Vulnerability Scanning Configuration Management
  • 27. Confidential27 Addressing critical security controls with KACE Detect Assess Remediate Protect • Device Discovery • Inventory • SCAP Scanning • OVAL Scanning • SCAP Results • OVAL Results • Patch Detect • Patch Deployment • Configuration Correction • Software & OS Deployment • Configuration Enforcement • Software Blacklisting
  • 28. Confidential28 Streamline patch management across the environment Reduce TCO Through effective automation of operational tasks. Elevate security And compliance through automatic policy enforcement. Provide visibility And greater control over your network’s endpoints. Better security with KACE Patch rollback Easily roll back patches that are adversely affecting your systems. Better user experience Prompt users for patched and allow them to snooze. Alerts & reports Find out what happens with your updates and easily report on status.
  • 29. Watch this on demand webcast here: http://ow.ly/c3zW30eLuOR