Stopping the Adobe, Apple and Java Software Updater Insanity

935 views

Published on

This presentation by Randy Franklin Smith from Ultimate Windows Security reviews, “Stopping the Adobe, Apple and Java Software Updater Insanity”. He shares tips and caveats for dealing with the most common software updaters from Adobe, Apple and Oracle. But the bottom line is that we all need centralized patch management and he’ll explore the important requirements and architectural issues you should be aware of in this space.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
935
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
10
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Lumension Patch and Remediation’s automated workflow follows the Aberdeen recommendations and is now a module on the Lumension Endpoint Management and Security Suite, which consolidates endpoint operations, security, compliance, and IT risk management workflows for enhanced visibility & controlSingle-agent, single-console architecture reduces complexity and total cost of ownershipProvides end-to-end visibilityImproves productivityEnhances securityOptimizes compliance and IT risk managementReduces IT EnvironmentComplexity»»Reduces Endpoint Total Costof Ownership»» Provides Greater VisibilityInto and Control Over YourNetwork’s Endpoints»» Elevates Security andCompliance Posture»» Optimizes ExistingResources for Reduction ofIT Risk»»Supports Your ITEnvironment Withina Dynamic BusinessEnvironmentKey Features»»Integrated Endpoint ManagementConsole»»Modularly Licensed ProductCapabilities»»Scalable and Agile Architecture»»Single Promotable Agent»
  • Stopping the Adobe, Apple and Java Software Updater Insanity

    1. 1. Stopping the Adobe,Apple and Java Software Updater Insanity © 2012 Monterey Technology Group Inc.
    2. 2. Brought to you by www.lumension.comSpeaker  Russ Ernst – Group Product Manager
    3. 3. Preview of Key Points Trends Statistics Updater problems Centralized, multi-vendor patch management© 2012 Monterey Technology Group Inc.
    4. 4. Poll Which 3rd party vendor tool causes the most trouble in your environment?© 2012 Monterey Technology Group Inc.
    5. 5. Trends The risk is in the endpoint The endpoint is the most vulnerable All endpoints are important – not just high value employees© 2012 Monterey Technology Group Inc.
    6. 6. Trends The risk is in the endpoint Attackers are focusing on the endpoint • Duqu • Flame • Stuxnet • RSA • Spearfishing© 2012 Monterey Technology Group Inc.
    7. 7. Trends The risk is in the endpoint Attackers have the strongest motivators of all • Politics  Asian state sponsored  IP  Economic data  Defense • Religion • Money  Primarily Eastern Europe  Looking for very specific data that can be monetized  Once acquired, they’re done© 2012 Monterey Technology Group Inc.
    8. 8. Statistics MS Patches compared to Non-MS Acrobat, 9 Flash, 11 Shockwa Microsoft, 32 ve, 4 Other, 87 Firefox, 5 0 Java, 5 Apple, 8© 2012 Monterey Technology Group Inc.
    9. 9. Trends The risk is in the endpoint Targeted attacks makes it harder for AV vendors to protect you Patch speed is increasingly important • Zero day exploits But that’s hard when you have patches from many vendors and no centralized way to control them© 2012 Monterey Technology Group Inc.
    10. 10. Non-MS Patching Each product (not even each vendor) has its own updater No centralized control Are updaters installed? Do employees remove or disable them? Do employees allow them to complete? Are patches failing? How up-to-date are patches across the fleet?© 2012 Monterey Technology Group Inc.
    11. 11. Non-MS Patching Performance issues Every PC downloading updates at the same time Other issues Other unwanted software installed • Ask and Google toolbars Silent updates Java Need I say more?© 2012 Monterey Technology Group Inc.
    12. 12. Non-MS Patching  How many updaters?  Updater for Adobe Air  Updater for Adobe Flash Player  Updater for Adobe Reader/Acrobat  Updater for Adobe Shockwave Player  Updater for Apple iTunes  Updater for Apple QuickTime  Updater for Oracle Java  Updater for Mozilla Firefox  Hardware updaters • Laptop • Mouse • Video© 2012 Monterey Technology Group Inc.
    13. 13. Another development Microsoft’s auto-update infrastructure has been compromised already? How hard would it be to compromise someone elses?© 2012 Monterey Technology Group Inc.
    14. 14. Other facts Patches often need to be chained Not cumulative© 2012 Monterey Technology Group Inc.
    15. 15. Bottom Line Need in-house controlled patching Centralized Multi-vendor Multi-platform© 2012 Monterey Technology Group Inc.
    16. 16. Tips for the meantime Patches may need to be chained Subscribe to multi-vendor patch update services http://leic.lumension.com/ Make sure you know what’s on your network Free: Lumension Application Scanner Tool© 2012 Monterey Technology Group Inc.
    17. 17. Tips for the meantime  Familiarize yourself with each vendor/product  Update site/blog  How they notify; subscribe  How their patches usually work  Develop a plan for each product that needs regular patching • Evaluate risk and exposure • Determine testing if any  Some patches can be pushed out  If not then you have to hope for the best • That updater on each PC is doing its job  Follow up with vulnerability scans • Do vulnerability scanners find this? • Free: Lumension Vulnerability Scanner© 2012 Monterey Technology Group Inc.
    18. 18. Bottom Line Need in-house controlled patching Centralized Multi-vendor Multi-platform© 2012 Monterey Technology Group Inc.
    19. 19. Brought to you by www.lumension.comSpeaker  Russ Ernst – Group Product Manager
    20. 20. Streamline Patch Management Across Your Environment •Lumension Endpoint Management and Security Suite is an extensible solution suite that reduces complexity, optimizes TCO, improves visibility and delivers control back to IT. » Reduces Complexity and TCO through effective automation of operational tasks » Provides Greater Visibility and Into Control Over your network’s endpoints » Improves Operational Efficiency with a single console to manage multiple functions » Elevates Security and Compliance Posture through automatic policy enforcement20
    21. 21. Patch is Core Component of Defense-in-Depth Emerging Endpoint Security Stack Traditional Endpoint Security Defense-N- Blacklisting Depth As The Core Patch & Configuration Mgmt. ConsumerizationZero Day of IT Malware 3rd Party As a Application Service Risk 21
    22. 22. SecuritySCAPE 2012: Virtual Event 9/25-9/26/12Register for this FREE virtual event! »http://www.securityscape2012.com22

    ×