SlideShare una empresa de Scribd logo
1 de 22
Stopping the Adobe,
Apple and Java Software
    Updater Insanity



                   © 2012 Monterey Technology Group Inc.
Brought to you by




              www.lumension.com



Speaker
      Russ Ernst – Group Product Manager
Preview of Key Points

 Trends
 Statistics
 Updater problems
 Centralized, multi-vendor patch management




© 2012 Monterey Technology Group Inc.
Poll

 Which 3rd party vendor tool causes the most
  trouble in your environment?




© 2012 Monterey Technology Group Inc.
Trends

 The risk is in the endpoint
  The endpoint is the most vulnerable
  All endpoints are important – not just high value
   employees




© 2012 Monterey Technology Group Inc.
Trends

 The risk is in the endpoint
  Attackers are focusing on the endpoint
            •    Duqu
            •    Flame
            •    Stuxnet
            •    RSA
            •    Spearfishing




© 2012 Monterey Technology Group Inc.
Trends

 The risk is in the endpoint
  Attackers have the strongest motivators of all
            • Politics
                       Asian state sponsored
                       IP
                       Economic data
                       Defense
            • Religion
            • Money
                    Primarily Eastern Europe
                    Looking for very specific data that can be monetized
                    Once acquired, they’re done


© 2012 Monterey Technology Group Inc.
Statistics

 MS Patches compared to Non-MS

                                        Acrobat,
                                           9

                                             Flash, 11 Shockwa               Microsoft,
                                                                                32
                                                        ve, 4    Other, 87

             Firefox, 5
                 0                                     Java, 5


                                                   Apple, 8




© 2012 Monterey Technology Group Inc.
Trends

 The risk is in the endpoint
  Targeted attacks makes it harder for AV vendors
   to protect you
  Patch speed is increasingly important
            • Zero day exploits
     But that’s hard when you have patches from
      many vendors and no centralized way to control
      them




© 2012 Monterey Technology Group Inc.
Non-MS Patching

 Each product (not even each vendor) has its
  own updater
 No centralized control
  Are updaters installed?
  Do employees remove or disable them?
  Do employees allow them to complete?
  Are patches failing?
  How up-to-date are patches across the fleet?



© 2012 Monterey Technology Group Inc.
Non-MS Patching

 Performance issues
  Every PC downloading updates at the same time
 Other issues
  Other unwanted software installed
            • Ask and Google toolbars
 Silent updates
 Java
  Need I say more?



© 2012 Monterey Technology Group Inc.
Non-MS Patching

  How many updaters?
   Updater for Adobe Air
   Updater for Adobe Flash Player
   Updater for Adobe Reader/Acrobat
   Updater for Adobe Shockwave Player
   Updater for Apple iTunes
   Updater for Apple QuickTime
   Updater for Oracle Java
   Updater for Mozilla Firefox
   Hardware updaters
            • Laptop
            • Mouse
            • Video


© 2012 Monterey Technology Group Inc.
Another development

 Microsoft’s auto-update infrastructure has
  been compromised already?
 How hard would it be to compromise someone
  elses?




© 2012 Monterey Technology Group Inc.
Other facts

 Patches often need to be chained
  Not cumulative




© 2012 Monterey Technology Group Inc.
Bottom Line

 Need in-house controlled patching
  Centralized
  Multi-vendor
  Multi-platform




© 2012 Monterey Technology Group Inc.
Tips for the meantime

 Patches may need to be chained
 Subscribe to multi-vendor patch update
  services
  http://leic.lumension.com/
 Make sure you know what’s on your network
  Free: Lumension Application Scanner Tool




© 2012 Monterey Technology Group Inc.
Tips for the meantime

  Familiarize yourself with each vendor/product
   Update site/blog
   How they notify; subscribe
   How their patches usually work
   Develop a plan for each product that needs regular patching
            • Evaluate risk and exposure
            • Determine testing if any
      Some patches can be pushed out
      If not then you have to hope for the best
            • That updater on each PC is doing its job
      Follow up with vulnerability scans
            • Do vulnerability scanners find this?
            • Free: Lumension Vulnerability Scanner




© 2012 Monterey Technology Group Inc.
Bottom Line

 Need in-house controlled patching
  Centralized
  Multi-vendor
  Multi-platform




© 2012 Monterey Technology Group Inc.
Brought to you by




              www.lumension.com



Speaker
      Russ Ernst – Group Product Manager
Streamline Patch Management Across Your Environment

 •Lumension Endpoint Management and Security Suite is an
  extensible solution suite that reduces complexity, optimizes TCO,
  improves visibility and delivers control back to IT.

     » Reduces Complexity and TCO
       through effective automation of
       operational tasks
     » Provides Greater Visibility and
       Into Control Over your network’s
       endpoints
     » Improves Operational
       Efficiency with a single console
       to manage multiple functions
     » Elevates Security and
       Compliance Posture through
       automatic policy enforcement



20
Patch is Core Component of Defense-in-Depth

                                                              Emerging Endpoint
                                                                Security Stack



               Traditional
                Endpoint
                Security

                                                 Defense-N-
                  Blacklisting                     Depth
                  As The Core                                      Patch &
                                                                 Configuration
                                                                    Mgmt.
                                           Consumerization
Zero Day                                        of IT



                                 Malware
            3rd Party
                                  As a
           Application
                                 Service
              Risk




 21
SecuritySCAPE 2012: Virtual Event 9/25-9/26/12
Register for this FREE virtual event!


     »http://www.securityscape2012.com




22

Más contenido relacionado

La actualidad más candente

Real Cost of Software Remediation
Real Cost of Software RemediationReal Cost of Software Remediation
Real Cost of Software RemediationDenim Group
 
Intern Presentation
Intern PresentationIntern Presentation
Intern PresentationConor Park
 
Threat Intelligence + SIEM: A Force to be Reckoned With
Threat Intelligence +  SIEM: A Force to be Reckoned WithThreat Intelligence +  SIEM: A Force to be Reckoned With
Threat Intelligence + SIEM: A Force to be Reckoned WithSolarWinds
 
SLBdiensten XP sessie: Windows XP End of Support
SLBdiensten XP sessie: Windows XP End of SupportSLBdiensten XP sessie: Windows XP End of Support
SLBdiensten XP sessie: Windows XP End of SupportSLBdiensten
 
Microsoft And The Future Of Productivity
Microsoft And The Future Of ProductivityMicrosoft And The Future Of Productivity
Microsoft And The Future Of ProductivityRichard Chaves
 
11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)Jeremiah Grossman
 
How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix PerformanceHow to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix PerformanceChristine Ackley
 
04. Agile development of sustainable software - Joost Visser - #ScaBru18
04. Agile development of sustainable software - Joost Visser - #ScaBru1804. Agile development of sustainable software - Joost Visser - #ScaBru18
04. Agile development of sustainable software - Joost Visser - #ScaBru18AgileConsortiumINT
 
Service production from d3 pitfall viewpoint
Service production from d3 pitfall viewpointService production from d3 pitfall viewpoint
Service production from d3 pitfall viewpointWalter Liu
 
The Permanent Campaign
The Permanent CampaignThe Permanent Campaign
The Permanent CampaignDenim Group
 
Security For Free
Security For FreeSecurity For Free
Security For Freegwarden
 
Modern Infrastructure E-Zine: November 2012
Modern Infrastructure E-Zine: November 2012Modern Infrastructure E-Zine: November 2012
Modern Infrastructure E-Zine: November 2012DCVTT
 
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...Cyber Security Alliance
 
EMC - Accelerate Cloud Journey Webinar
EMC - Accelerate Cloud Journey WebinarEMC - Accelerate Cloud Journey Webinar
EMC - Accelerate Cloud Journey WebinarErin Banks
 
Windows intune screenshots
Windows intune screenshotsWindows intune screenshots
Windows intune screenshotsNorthernstar
 

La actualidad más candente (19)

Real Cost of Software Remediation
Real Cost of Software RemediationReal Cost of Software Remediation
Real Cost of Software Remediation
 
Intern Presentation
Intern PresentationIntern Presentation
Intern Presentation
 
Threat Intelligence + SIEM: A Force to be Reckoned With
Threat Intelligence +  SIEM: A Force to be Reckoned WithThreat Intelligence +  SIEM: A Force to be Reckoned With
Threat Intelligence + SIEM: A Force to be Reckoned With
 
SLBdiensten XP sessie: Windows XP End of Support
SLBdiensten XP sessie: Windows XP End of SupportSLBdiensten XP sessie: Windows XP End of Support
SLBdiensten XP sessie: Windows XP End of Support
 
Microsoft And The Future Of Productivity
Microsoft And The Future Of ProductivityMicrosoft And The Future Of Productivity
Microsoft And The Future Of Productivity
 
Windows Intune: Simplify Your PC Management
Windows Intune: Simplify Your PC ManagementWindows Intune: Simplify Your PC Management
Windows Intune: Simplify Your PC Management
 
Devsec ops
Devsec opsDevsec ops
Devsec ops
 
11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)
 
How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix PerformanceHow to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
 
04. Agile development of sustainable software - Joost Visser - #ScaBru18
04. Agile development of sustainable software - Joost Visser - #ScaBru1804. Agile development of sustainable software - Joost Visser - #ScaBru18
04. Agile development of sustainable software - Joost Visser - #ScaBru18
 
Service production from d3 pitfall viewpoint
Service production from d3 pitfall viewpointService production from d3 pitfall viewpoint
Service production from d3 pitfall viewpoint
 
The Permanent Campaign
The Permanent CampaignThe Permanent Campaign
The Permanent Campaign
 
Neeharika karumanchi
Neeharika karumanchiNeeharika karumanchi
Neeharika karumanchi
 
Security For Free
Security For FreeSecurity For Free
Security For Free
 
Modern Infrastructure E-Zine: November 2012
Modern Infrastructure E-Zine: November 2012Modern Infrastructure E-Zine: November 2012
Modern Infrastructure E-Zine: November 2012
 
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
 
EMC - Accelerate Cloud Journey Webinar
EMC - Accelerate Cloud Journey WebinarEMC - Accelerate Cloud Journey Webinar
EMC - Accelerate Cloud Journey Webinar
 
Job Postings
Job PostingsJob Postings
Job Postings
 
Windows intune screenshots
Windows intune screenshotsWindows intune screenshots
Windows intune screenshots
 

Destacado

Welcome to the Age of Weaponized Malware. What Does it Mean to Your Enterprise?
Welcome to the Age of Weaponized Malware. What Does it Mean to Your Enterprise?Welcome to the Age of Weaponized Malware. What Does it Mean to Your Enterprise?
Welcome to the Age of Weaponized Malware. What Does it Mean to Your Enterprise?Lumension
 
Why go to the Moon?
Why go to the Moon?Why go to the Moon?
Why go to the Moon?kfury
 
How to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetHow to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetLumension
 
Bates College Industry Insights Presentation
Bates College Industry Insights PresentationBates College Industry Insights Presentation
Bates College Industry Insights PresentationD V
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...Lumension
 
Sensational Headlines or Real Threats? What New Attacks Mean For You.
Sensational Headlines or Real Threats? What New Attacks Mean For You. Sensational Headlines or Real Threats? What New Attacks Mean For You.
Sensational Headlines or Real Threats? What New Attacks Mean For You. Lumension
 
Securing and Greening Your IT
Securing and Greening Your ITSecuring and Greening Your IT
Securing and Greening Your ITLumension
 
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsLumension
 
2011 Social Media Malware Trends
2011 Social Media Malware Trends2011 Social Media Malware Trends
2011 Social Media Malware TrendsLumension
 
Hashvetvutyun 2012 13
Hashvetvutyun 2012 13Hashvetvutyun 2012 13
Hashvetvutyun 2012 13nelaT
 
Application of the EU policies on migration to the Eastern Neighbourhood and ...
Application of the EU policies on migration to the Eastern Neighbourhood and ...Application of the EU policies on migration to the Eastern Neighbourhood and ...
Application of the EU policies on migration to the Eastern Neighbourhood and ...MigrationPolicyCentre
 
mohammed abd el badiea c.v2016v1
mohammed abd el badiea c.v2016v1mohammed abd el badiea c.v2016v1
mohammed abd el badiea c.v2016v1mohamed badiea
 
PRELIMINARE__PER_IL__GIARDINO
PRELIMINARE__PER_IL__GIARDINOPRELIMINARE__PER_IL__GIARDINO
PRELIMINARE__PER_IL__GIARDINOstefano54
 

Destacado (20)

Welcome to the Age of Weaponized Malware. What Does it Mean to Your Enterprise?
Welcome to the Age of Weaponized Malware. What Does it Mean to Your Enterprise?Welcome to the Age of Weaponized Malware. What Does it Mean to Your Enterprise?
Welcome to the Age of Weaponized Malware. What Does it Mean to Your Enterprise?
 
Why go to the Moon?
Why go to the Moon?Why go to the Moon?
Why go to the Moon?
 
How to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetHow to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budget
 
Bates College Industry Insights Presentation
Bates College Industry Insights PresentationBates College Industry Insights Presentation
Bates College Industry Insights Presentation
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
 
Sensational Headlines or Real Threats? What New Attacks Mean For You.
Sensational Headlines or Real Threats? What New Attacks Mean For You. Sensational Headlines or Real Threats? What New Attacks Mean For You.
Sensational Headlines or Real Threats? What New Attacks Mean For You.
 
Securing and Greening Your IT
Securing and Greening Your ITSecuring and Greening Your IT
Securing and Greening Your IT
 
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
 
2011 Social Media Malware Trends
2011 Social Media Malware Trends2011 Social Media Malware Trends
2011 Social Media Malware Trends
 
Ikasle Musika Lehiaketa 2013
Ikasle Musika Lehiaketa 2013Ikasle Musika Lehiaketa 2013
Ikasle Musika Lehiaketa 2013
 
Busca fieras héctor
Busca fieras héctorBusca fieras héctor
Busca fieras héctor
 
Ppt ruiz angiozar.
Ppt ruiz angiozar.Ppt ruiz angiozar.
Ppt ruiz angiozar.
 
Hashvetvutyun 2012 13
Hashvetvutyun 2012 13Hashvetvutyun 2012 13
Hashvetvutyun 2012 13
 
Application of the EU policies on migration to the Eastern Neighbourhood and ...
Application of the EU policies on migration to the Eastern Neighbourhood and ...Application of the EU policies on migration to the Eastern Neighbourhood and ...
Application of the EU policies on migration to the Eastern Neighbourhood and ...
 
mohammed abd el badiea c.v2016v1
mohammed abd el badiea c.v2016v1mohammed abd el badiea c.v2016v1
mohammed abd el badiea c.v2016v1
 
Rhuuuuuuuuuuuuuuuuuuu
RhuuuuuuuuuuuuuuuuuuuRhuuuuuuuuuuuuuuuuuuu
Rhuuuuuuuuuuuuuuuuuuu
 
Project-HUC-SERAMPANG-A TIE-IN_opt
Project-HUC-SERAMPANG-A TIE-IN_optProject-HUC-SERAMPANG-A TIE-IN_opt
Project-HUC-SERAMPANG-A TIE-IN_opt
 
Ravi
RaviRavi
Ravi
 
PRELIMINARE__PER_IL__GIARDINO
PRELIMINARE__PER_IL__GIARDINOPRELIMINARE__PER_IL__GIARDINO
PRELIMINARE__PER_IL__GIARDINO
 
Ovos resume
Ovos resumeOvos resume
Ovos resume
 

Similar a Stopping the Adobe, Apple and Java Software Updater Insanity

Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12Wireless_Analytics
 
Thread Fix Tour Presentation Final Final
Thread Fix Tour Presentation Final FinalThread Fix Tour Presentation Final Final
Thread Fix Tour Presentation Final FinalRobin Lutchansky
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsPeter Wood
 
Combating Threats with Workstation Configuration Management
Combating Threats with Workstation Configuration Management Combating Threats with Workstation Configuration Management
Combating Threats with Workstation Configuration Management Lumension
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mwaresolarisyourep
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoHP Enterprise Italia
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsStefan Streichsbier
 
Key Resources - z/Assure Sales Presentation
Key Resources - z/Assure Sales PresentationKey Resources - z/Assure Sales Presentation
Key Resources - z/Assure Sales Presentationrfragola
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierCTE Solutions Inc.
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacksAppSense
 
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...Lumension
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaMicrosoft Singapore
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance 1CloudRoad.com
 
G01.2013 magic quadrant for endpoint protection platforms
G01.2013  magic quadrant for endpoint protection platformsG01.2013  magic quadrant for endpoint protection platforms
G01.2013 magic quadrant for endpoint protection platformsSatya Harish
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and WelcomeCarahsoft
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - finalAndrew White
 
The quality attribute of upgradability
The quality attribute of upgradabilityThe quality attribute of upgradability
The quality attribute of upgradabilityLen Bass
 
Disaster Recovery Solutions
Disaster Recovery SolutionsDisaster Recovery Solutions
Disaster Recovery SolutionsManuel Daza
 
The Business Impact of Virtualization
The Business Impact of VirtualizationThe Business Impact of Virtualization
The Business Impact of VirtualizationFlexera
 

Similar a Stopping the Adobe, Apple and Java Software Updater Insanity (20)

Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12
 
Thread Fix Tour Presentation Final Final
Thread Fix Tour Presentation Final FinalThread Fix Tour Presentation Final Final
Thread Fix Tour Presentation Final Final
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent Threats
 
Combating Threats with Workstation Configuration Management
Combating Threats with Workstation Configuration Management Combating Threats with Workstation Configuration Management
Combating Threats with Workstation Configuration Management
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercato
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOps
 
Key Resources - z/Assure Sales Presentation
Key Resources - z/Assure Sales PresentationKey Resources - z/Assure Sales Presentation
Key Resources - z/Assure Sales Presentation
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry Tessier
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacks
 
Making Network Security Relevant
Making Network Security RelevantMaking Network Security Relevant
Making Network Security Relevant
 
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
 
G01.2013 magic quadrant for endpoint protection platforms
G01.2013  magic quadrant for endpoint protection platformsG01.2013  magic quadrant for endpoint protection platforms
G01.2013 magic quadrant for endpoint protection platforms
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and Welcome
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
 
The quality attribute of upgradability
The quality attribute of upgradabilityThe quality attribute of upgradability
The quality attribute of upgradability
 
Disaster Recovery Solutions
Disaster Recovery SolutionsDisaster Recovery Solutions
Disaster Recovery Solutions
 
The Business Impact of Virtualization
The Business Impact of VirtualizationThe Business Impact of Virtualization
The Business Impact of Virtualization
 

Más de Lumension

2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers GuideLumension
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationLumension
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary ResultsLumension
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Lumension
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Lumension
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftLumension
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...Lumension
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and AnalysisLumension
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskLumension
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateLumension
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Lumension
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Lumension
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskLumension
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security SolutionsLumension
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Lumension
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesLumension
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksLumension
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT RiskLumension
 
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-VirusDefending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-VirusLumension
 
2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?Lumension
 

Más de Lumension (20)

2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security Risks
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
 
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-VirusDefending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
 
2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?
 

Último

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Último (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Stopping the Adobe, Apple and Java Software Updater Insanity

  • 1. Stopping the Adobe, Apple and Java Software Updater Insanity © 2012 Monterey Technology Group Inc.
  • 2. Brought to you by www.lumension.com Speaker  Russ Ernst – Group Product Manager
  • 3. Preview of Key Points Trends Statistics Updater problems Centralized, multi-vendor patch management © 2012 Monterey Technology Group Inc.
  • 4. Poll Which 3rd party vendor tool causes the most trouble in your environment? © 2012 Monterey Technology Group Inc.
  • 5. Trends The risk is in the endpoint The endpoint is the most vulnerable All endpoints are important – not just high value employees © 2012 Monterey Technology Group Inc.
  • 6. Trends The risk is in the endpoint Attackers are focusing on the endpoint • Duqu • Flame • Stuxnet • RSA • Spearfishing © 2012 Monterey Technology Group Inc.
  • 7. Trends The risk is in the endpoint Attackers have the strongest motivators of all • Politics  Asian state sponsored  IP  Economic data  Defense • Religion • Money  Primarily Eastern Europe  Looking for very specific data that can be monetized  Once acquired, they’re done © 2012 Monterey Technology Group Inc.
  • 8. Statistics MS Patches compared to Non-MS Acrobat, 9 Flash, 11 Shockwa Microsoft, 32 ve, 4 Other, 87 Firefox, 5 0 Java, 5 Apple, 8 © 2012 Monterey Technology Group Inc.
  • 9. Trends The risk is in the endpoint Targeted attacks makes it harder for AV vendors to protect you Patch speed is increasingly important • Zero day exploits But that’s hard when you have patches from many vendors and no centralized way to control them © 2012 Monterey Technology Group Inc.
  • 10. Non-MS Patching Each product (not even each vendor) has its own updater No centralized control Are updaters installed? Do employees remove or disable them? Do employees allow them to complete? Are patches failing? How up-to-date are patches across the fleet? © 2012 Monterey Technology Group Inc.
  • 11. Non-MS Patching Performance issues Every PC downloading updates at the same time Other issues Other unwanted software installed • Ask and Google toolbars Silent updates Java Need I say more? © 2012 Monterey Technology Group Inc.
  • 12. Non-MS Patching  How many updaters?  Updater for Adobe Air  Updater for Adobe Flash Player  Updater for Adobe Reader/Acrobat  Updater for Adobe Shockwave Player  Updater for Apple iTunes  Updater for Apple QuickTime  Updater for Oracle Java  Updater for Mozilla Firefox  Hardware updaters • Laptop • Mouse • Video © 2012 Monterey Technology Group Inc.
  • 13. Another development Microsoft’s auto-update infrastructure has been compromised already? How hard would it be to compromise someone elses? © 2012 Monterey Technology Group Inc.
  • 14. Other facts Patches often need to be chained Not cumulative © 2012 Monterey Technology Group Inc.
  • 15. Bottom Line Need in-house controlled patching Centralized Multi-vendor Multi-platform © 2012 Monterey Technology Group Inc.
  • 16. Tips for the meantime Patches may need to be chained Subscribe to multi-vendor patch update services http://leic.lumension.com/ Make sure you know what’s on your network Free: Lumension Application Scanner Tool © 2012 Monterey Technology Group Inc.
  • 17. Tips for the meantime  Familiarize yourself with each vendor/product  Update site/blog  How they notify; subscribe  How their patches usually work  Develop a plan for each product that needs regular patching • Evaluate risk and exposure • Determine testing if any  Some patches can be pushed out  If not then you have to hope for the best • That updater on each PC is doing its job  Follow up with vulnerability scans • Do vulnerability scanners find this? • Free: Lumension Vulnerability Scanner © 2012 Monterey Technology Group Inc.
  • 18. Bottom Line Need in-house controlled patching Centralized Multi-vendor Multi-platform © 2012 Monterey Technology Group Inc.
  • 19. Brought to you by www.lumension.com Speaker  Russ Ernst – Group Product Manager
  • 20. Streamline Patch Management Across Your Environment •Lumension Endpoint Management and Security Suite is an extensible solution suite that reduces complexity, optimizes TCO, improves visibility and delivers control back to IT. » Reduces Complexity and TCO through effective automation of operational tasks » Provides Greater Visibility and Into Control Over your network’s endpoints » Improves Operational Efficiency with a single console to manage multiple functions » Elevates Security and Compliance Posture through automatic policy enforcement 20
  • 21. Patch is Core Component of Defense-in-Depth Emerging Endpoint Security Stack Traditional Endpoint Security Defense-N- Blacklisting Depth As The Core Patch & Configuration Mgmt. Consumerization Zero Day of IT Malware 3rd Party As a Application Service Risk 21
  • 22. SecuritySCAPE 2012: Virtual Event 9/25-9/26/12 Register for this FREE virtual event! »http://www.securityscape2012.com 22

Notas del editor

  1. Lumension Patch and Remediation’s automated workflow follows the Aberdeen recommendations and is now a module on the Lumension Endpoint Management and Security Suite, which consolidates endpoint operations, security, compliance, and IT risk management workflows for enhanced visibility & controlSingle-agent, single-console architecture reduces complexity and total cost of ownershipProvides end-to-end visibilityImproves productivityEnhances securityOptimizes compliance and IT risk managementReduces IT EnvironmentComplexity»»Reduces Endpoint Total Costof Ownership»» Provides Greater VisibilityInto and Control Over YourNetwork’s Endpoints»» Elevates Security andCompliance Posture»» Optimizes ExistingResources for Reduction ofIT Risk»»Supports Your ITEnvironment Withina Dynamic BusinessEnvironmentKey Features»»Integrated Endpoint ManagementConsole»»Modularly Licensed ProductCapabilities»»Scalable and Agile Architecture»»Single Promotable Agent»