SlideShare a Scribd company logo
Beyond Windows Patching: Dealing with the New Imperative to Patch Adobe, Apple, Linux and More  ,[object Object],© 2010 Monterey Technology Group Inc.
© 2010 Monterey Technology Group Inc. Brought to you by Speakers Russ Ernst, Senior Product Manager Andrea Bolz, Solution Marketing Manager
Preview of Key Points © 2010 Monterey Technology Group Inc. Patching today’s enterprise against today’s threats Layer by layer Stats Tools Issues
Product Patching © 2010 Monterey Technology Group Inc. WSUS ,[object Object]
Most released on monthly patch schedule
Not all MS products covered by WSUSMicrosoft Apps (Office, etc.) Windows
Product Patching © 2010 Monterey Technology Group Inc. HP Insight Control, et al WSUS ,[object Object]
Very difficult to find on some hardware vendor sites
Ability to automate patches varies
Insight Control is $Microsoft Apps (Office, etc.) System Agents (Dell, HP, etc.) Windows
Product Patching © 2010 Monterey Technology Group Inc. ? HP Insight Control, et al WSUS ,[object Object]
Automatic Updates is for the home user
How to uninstall older versions?
Risk of installing extra softwareMicrosoft Apps (Office, etc.) System Agents (Dell, HP, etc.) Adobe Apps (Acrobat, Flash) Windows
Product Patching © 2010 Monterey Technology Group Inc. ? ? HP Insight Control, et al WSUS ,[object Object]
Multiple versions required
No enterprise tools
Risk of installing extra software
iTunes

More Related Content

Similar to Beyond Windows Patching: Dealing with the New Imperative to Patch Adobe, Apple, Linux and More

Everything You Ever Wanted To Know About Application Compatibility
Everything You Ever Wanted To Know About Application CompatibilityEverything You Ever Wanted To Know About Application Compatibility
Everything You Ever Wanted To Know About Application Compatibility
Stephen Rose
 
App v overview
App v overviewApp v overview
App v overview
Edmund Lim
 
Mis chapter 6
Mis chapter 6Mis chapter 6
Server Virtualization - Smashing Success! Desktop Virtualization - Not So Mu...
Server Virtualization - Smashing Success!  Desktop Virtualization - Not So Mu...Server Virtualization - Smashing Success!  Desktop Virtualization - Not So Mu...
Server Virtualization - Smashing Success! Desktop Virtualization - Not So Mu...
Unidesk Corporation
 
Windows 10 KKK
Windows 10 KKKWindows 10 KKK
Windows 10 KKK
Primend
 
Developing windows 10 universal apps
Developing windows 10 universal appsDeveloping windows 10 universal apps
Developing windows 10 universal apps
Tom Walker
 
Tackling Enterprise App Incompatibility
Tackling Enterprise App IncompatibilityTackling Enterprise App Incompatibility
Tackling Enterprise App Incompatibility
xpmigration
 
Computer Software
Computer SoftwareComputer Software
Computer Software
julinaincgumanit
 
OSSA17 - Live patch, VMI, Security Mgmt (50 mins, no embedded demos)
OSSA17 - Live patch, VMI, Security Mgmt (50 mins, no embedded demos)OSSA17 - Live patch, VMI, Security Mgmt (50 mins, no embedded demos)
OSSA17 - Live patch, VMI, Security Mgmt (50 mins, no embedded demos)
The Linux Foundation
 
Azure mobile service ( Universal App)
Azure mobile service ( Universal App) Azure mobile service ( Universal App)
Azure mobile service ( Universal App)
Abdullah Muhammad
 
Application compatibility final
Application compatibility finalApplication compatibility final
Application compatibility final
Harold Wong
 
World Wide Technology Tec37 Webinar - Deploy and Manage Windows 10 at Scale v1
World Wide Technology Tec37 Webinar -  Deploy and Manage Windows 10 at Scale v1World Wide Technology Tec37 Webinar -  Deploy and Manage Windows 10 at Scale v1
World Wide Technology Tec37 Webinar - Deploy and Manage Windows 10 at Scale v1
World Wide Technology
 
Titanium Overview (Mobile March 2011)
Titanium Overview (Mobile March 2011)Titanium Overview (Mobile March 2011)
Titanium Overview (Mobile March 2011)
Kevin Whinnery
 
Microsoft Virtualization View
Microsoft Virtualization View Microsoft Virtualization View
Microsoft Virtualization View
sanjoysanyal
 
VMworld 2013: Turbo Charge Your VMware Horizon Deployments
VMworld 2013: Turbo Charge Your VMware Horizon Deployments VMworld 2013: Turbo Charge Your VMware Horizon Deployments
VMworld 2013: Turbo Charge Your VMware Horizon Deployments
VMworld
 
Low/No Cost Software is it right for your business
Low/No Cost Software is it right for your businessLow/No Cost Software is it right for your business
Low/No Cost Software is it right for your business
Bill Maynard
 
Windows 10 pentru dezvoltatori - InfoEducație 2015
Windows 10 pentru dezvoltatori - InfoEducație 2015Windows 10 pentru dezvoltatori - InfoEducație 2015
Windows 10 pentru dezvoltatori - InfoEducație 2015
Julian Atanasoae
 
Operating Systems ( Os )
Operating Systems ( Os )Operating Systems ( Os )
Operating Systems ( Os )
Amber Wheeler
 
Windows 10 Migration: Extend Your Citrix Solution to Streamline Your OS Migra...
Windows 10 Migration: Extend Your Citrix Solution to Streamline Your OS Migra...Windows 10 Migration: Extend Your Citrix Solution to Streamline Your OS Migra...
Windows 10 Migration: Extend Your Citrix Solution to Streamline Your OS Migra...
Citrix
 
VMworld 2014: End-User Computing for the Mobile-Cloud Era
VMworld 2014: End-User Computing for the Mobile-Cloud EraVMworld 2014: End-User Computing for the Mobile-Cloud Era
VMworld 2014: End-User Computing for the Mobile-Cloud Era
VMworld
 

Similar to Beyond Windows Patching: Dealing with the New Imperative to Patch Adobe, Apple, Linux and More (20)

Everything You Ever Wanted To Know About Application Compatibility
Everything You Ever Wanted To Know About Application CompatibilityEverything You Ever Wanted To Know About Application Compatibility
Everything You Ever Wanted To Know About Application Compatibility
 
App v overview
App v overviewApp v overview
App v overview
 
Mis chapter 6
Mis chapter 6Mis chapter 6
Mis chapter 6
 
Server Virtualization - Smashing Success! Desktop Virtualization - Not So Mu...
Server Virtualization - Smashing Success!  Desktop Virtualization - Not So Mu...Server Virtualization - Smashing Success!  Desktop Virtualization - Not So Mu...
Server Virtualization - Smashing Success! Desktop Virtualization - Not So Mu...
 
Windows 10 KKK
Windows 10 KKKWindows 10 KKK
Windows 10 KKK
 
Developing windows 10 universal apps
Developing windows 10 universal appsDeveloping windows 10 universal apps
Developing windows 10 universal apps
 
Tackling Enterprise App Incompatibility
Tackling Enterprise App IncompatibilityTackling Enterprise App Incompatibility
Tackling Enterprise App Incompatibility
 
Computer Software
Computer SoftwareComputer Software
Computer Software
 
OSSA17 - Live patch, VMI, Security Mgmt (50 mins, no embedded demos)
OSSA17 - Live patch, VMI, Security Mgmt (50 mins, no embedded demos)OSSA17 - Live patch, VMI, Security Mgmt (50 mins, no embedded demos)
OSSA17 - Live patch, VMI, Security Mgmt (50 mins, no embedded demos)
 
Azure mobile service ( Universal App)
Azure mobile service ( Universal App) Azure mobile service ( Universal App)
Azure mobile service ( Universal App)
 
Application compatibility final
Application compatibility finalApplication compatibility final
Application compatibility final
 
World Wide Technology Tec37 Webinar - Deploy and Manage Windows 10 at Scale v1
World Wide Technology Tec37 Webinar -  Deploy and Manage Windows 10 at Scale v1World Wide Technology Tec37 Webinar -  Deploy and Manage Windows 10 at Scale v1
World Wide Technology Tec37 Webinar - Deploy and Manage Windows 10 at Scale v1
 
Titanium Overview (Mobile March 2011)
Titanium Overview (Mobile March 2011)Titanium Overview (Mobile March 2011)
Titanium Overview (Mobile March 2011)
 
Microsoft Virtualization View
Microsoft Virtualization View Microsoft Virtualization View
Microsoft Virtualization View
 
VMworld 2013: Turbo Charge Your VMware Horizon Deployments
VMworld 2013: Turbo Charge Your VMware Horizon Deployments VMworld 2013: Turbo Charge Your VMware Horizon Deployments
VMworld 2013: Turbo Charge Your VMware Horizon Deployments
 
Low/No Cost Software is it right for your business
Low/No Cost Software is it right for your businessLow/No Cost Software is it right for your business
Low/No Cost Software is it right for your business
 
Windows 10 pentru dezvoltatori - InfoEducație 2015
Windows 10 pentru dezvoltatori - InfoEducație 2015Windows 10 pentru dezvoltatori - InfoEducație 2015
Windows 10 pentru dezvoltatori - InfoEducație 2015
 
Operating Systems ( Os )
Operating Systems ( Os )Operating Systems ( Os )
Operating Systems ( Os )
 
Windows 10 Migration: Extend Your Citrix Solution to Streamline Your OS Migra...
Windows 10 Migration: Extend Your Citrix Solution to Streamline Your OS Migra...Windows 10 Migration: Extend Your Citrix Solution to Streamline Your OS Migra...
Windows 10 Migration: Extend Your Citrix Solution to Streamline Your OS Migra...
 
VMworld 2014: End-User Computing for the Mobile-Cloud Era
VMworld 2014: End-User Computing for the Mobile-Cloud EraVMworld 2014: End-User Computing for the Mobile-Cloud Era
VMworld 2014: End-User Computing for the Mobile-Cloud Era
 

More from Lumension

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Lumension
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide
Lumension
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Lumension
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results
Lumension
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Lumension
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
Lumension
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Lumension
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
Lumension
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
Lumension
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Lumension
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Lumension
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
Lumension
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
Lumension
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
Lumension
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
Lumension
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
Lumension
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
Lumension
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security Risks
Lumension
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
Lumension
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
Lumension
 

More from Lumension (20)

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security Risks
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
 

Recently uploaded

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 

Recently uploaded (20)

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 

Beyond Windows Patching: Dealing with the New Imperative to Patch Adobe, Apple, Linux and More

  • 1.
  • 2. © 2010 Monterey Technology Group Inc. Brought to you by Speakers Russ Ernst, Senior Product Manager Andrea Bolz, Solution Marketing Manager
  • 3. Preview of Key Points © 2010 Monterey Technology Group Inc. Patching today’s enterprise against today’s threats Layer by layer Stats Tools Issues
  • 4.
  • 5. Most released on monthly patch schedule
  • 6. Not all MS products covered by WSUSMicrosoft Apps (Office, etc.) Windows
  • 7.
  • 8. Very difficult to find on some hardware vendor sites
  • 9. Ability to automate patches varies
  • 10. Insight Control is $Microsoft Apps (Office, etc.) System Agents (Dell, HP, etc.) Windows
  • 11.
  • 12. Automatic Updates is for the home user
  • 13. How to uninstall older versions?
  • 14. Risk of installing extra softwareMicrosoft Apps (Office, etc.) System Agents (Dell, HP, etc.) Adobe Apps (Acrobat, Flash) Windows
  • 15.
  • 18. Risk of installing extra software
  • 20. No enterprise toolsMicrosoft Apps (Office, etc.) System Agents (Dell, HP, etc.) Adobe Apps (Acrobat, Flash) Other Popular Apps (Sun Java, QuickTime, iTunes, Browsers) Windows
  • 21.
  • 22. Just exacerbates the whole heterogeneous patch management challengeMicrosoft Apps (Office, etc.) System Agents (Dell, HP, etc.) Adobe Apps (Acrobat, Flash) Other Popular Apps (Sun Java, QuickTime, iTunes, Browsers) Uncommon Apps Windows Virtualization Hosts (VMWare, HyperVisor, Xen)
  • 23.
  • 24. vCenter only updates ESX(i) hosts and vCenter
  • 26. Costs $Microsoft Apps (Office, etc.) System Agents (Dell, HP, etc.) Adobe Apps (Acrobat, Flash) Other Popular Apps (Sun Java, QuickTime, iTunes, Browsers) Uncommon Apps Windows Virtualization Hosts (VMWare, HyperVisor, Xen) Virtualization Managers (vCenter) vCenter Update Manager
  • 27.
  • 29. Companies moving to “freer” distributions of Linux but you lose the management tools of RHNMicrosoft Apps (Office, etc.) System Agents (Dell, HP, etc.) Adobe Apps (Acrobat, Flash) Other Popular Apps (Sun Java, QuickTime, iTunes, Browsers) Uncommon Apps Windows Linux Virtualization Hosts (VMWare, HyperVisor, Xen) Virtualization Managers (vCenter) vCenter Update Manager
  • 30. Product Patching © 2010 Monterey Technology Group Inc. ? ? Sun Patch Manager, et al RHN, et al ? HP Insight Control, et al WSUS Microsoft Apps (Office, etc.) System Agents (Dell, HP, etc.) Adobe Apps (Acrobat, Flash) Other Popular Apps (Sun Java, QuickTime, iTunes, Browsers) Uncommon Apps Unix Windows Linux Virtualization Hosts (VMWare, HyperVisor, Xen) Virtualization Managers (vCenter) vCenter Update Manager
  • 31.
  • 32. No centrally controllable patch managerVirtualization Managers (vCenter) vCenter Update Manager
  • 33. Product Patching © 2010 Monterey Technology Group Inc. ? ? Sun Patch Manager, et al RHN, et al ? HP Insight Control, et al WSUS ? ? Microsoft Apps (Office, etc.) System Agents (Dell, HP, etc.) Adobe Apps (Acrobat, Flash) Other Popular Apps (Sun Java, QuickTime, iTunes, Browsers) Uncommon Apps Apps and Agents Unix Mac Windows Linux Virtualization Hosts (VMWare, HyperVisor, Xen) Virtualization Managers (vCenter) vCenter Update Manager
  • 34. Product Patching © 2010 Monterey Technology Group Inc. ? ? Sun Patch Manager, et al RHN, et al ? HP Insight Control, et al WSUS ? ? Microsoft Apps (Office, etc.) System Agents (Dell, HP, etc.) Adobe Apps (Acrobat, Flash) Other Popular Apps (Sun Java, QuickTime, iTunes, Browsers) Uncommon Apps Apps and Agents Unix Mac Windows Linux Virtualization Hosts (VMWare, HyperVisor, Xen) ? Virtualization Managers (vCenter) vCenter Update Manager Network Devices Routers, VPNs, Switches, Access Points, Firewalls
  • 35. How to handle enterprise patching © 2010 Monterey Technology Group Inc. Central security response team ID all hardware, software, devices ID team within IT responsible for each product Subscribe to each vendor’s security update service Subscribe to CVE lists Each advisory Does it affect any products we have? Contact appropriate team Track decision and follow through Document Regular vulnerability scanning
  • 36. Security Alerts © 2010 Monterey Technology Group Inc.
  • 37. Bottom Line © 2010 Monterey Technology Group Inc. Patch management Needs to be comprehensive and consistent across the enterprise Technology needed for efficiency and effectiveness Cooperation, coordination and workflow needed between security and operational teams Not just an OS issue anymore Not just a server issue anymore Not just a Microsoft issue anymore
  • 38. © 2010 Monterey Technology Group Inc. Brought to you by Speakers Russ Ernst, Senior Product Manager Andrea Bolz, Solution Marketing Manager
  • 39. Want to Learn More? Lumension info@lumension.com www.lumension.com http://blog.lumension.com Resource Center http://www.lumension.com/Resources/Resource-Center/Reduce-Your-Threat-Exposure.aspx © 2010 Monterey Technology Group Inc.