Operations | Monitoring | ITSM | DevOps | Cloud

Patching

How to Ensure Patch Compliance

Patch compliance indicates the number of compliant devices in your network. This means the number of computers that have been patched or remediated against security threats effectively. The distribution and deployment of patches accomplish nothing if your devices are not compliant. So to establish a good patch management strategy, it is important to pay attention to the effectiveness and reach of your patch deployment activities.

8 Best Practices for Windows Patch Management

Given the numerous cyber-threats that organizations face these days, security has become one of the most serious issues on everyone’s mind. When it comes to protecting business-critical environments from malware, various security measures can make a significant difference. Patching is one such important component of ensuring the security of your infrastructure and data.

Patch Management is Integral for Mature Risk-based Prioritization

The term ‘patch’ triggers many familiar images – affixing a rubber patch to a blown bike tire, the ubiquitous duct tape repairs of myriad objects, and so on. While these temporary fixes won’t heal the underlying cause, they are a quick and easy solution. Our applications and software frequently need patches as well, to fix bugs, security flaws and add feature enhancements. However, in this case, patching is not a temporary band-aid, but rather a proactive planned strategy.

Automated Patch Management and Team Swarming are Key Security Practices

In the blink of an eye, you can miss a new business disrupting security incident. We all recognize that cybersecurity breaches are increasing in volume and sophistication. How we respond to them is critical. Security vulnerabilities force organizations to go outside of their daily activities to execute out-of-band responses. We face numerous challenges in managing security risk.

Simplify the management of third-party updates for Intune with Patch Connect Plus

Enterprise IT administrators and technicians worldwide who are looking to take third-party patch management to the cloud or even expand their endpoint management capabilities can now rejoice, as Patch Connect Plus has introduced Intune Update Management to its patch management toolbox!

5 reasons integrated patch and vulnerability management mitigates risks swiftly and efficiently

ESG research on cyber risk management, which involved 340 cybersecurity professionals, revealed that 40 percent felt tracking patch and vulnerability management over time was their biggest challenge.

Device Firmware Update Best Practices

Implementing OTA (Over The Air) firmware updates is one of the most critical yet complicated processes of building hardware. And unfortunately, many organizations don't invest the same amount of resources in device firmware updates as they do in software. In this recorded webinar, Memfault Founder & CEO François Baldassari walks through the best practices he has learned over the years for device firmware updates. He also presents a device firmware update architecture that will help you avoid spending hours and hours debugging firmware update issues.

To Accelerate or Not to Accelerate, That is the Question: Software Updates and iOS 14.4

On Tuesday, January 26, 2021, Apple released iOS and iPadOS 14.4. As with previous releases, each new OS update is available to all Apple devices capable of running iOS and iPadOS 14. If you’re an IT admin, you should evaluate how you want to approach the latest release. Do you want to accelerate or slow down the updates? One concern we often hear about is that the apps that a company is deploying may not be compatible or may not have been tested with the latest release.

Using Ivanti Neurons and MobileIron UEM to Handle the Latest iOS, iPadOS, and tvOS Vulnerabilities Proactively

On Tuesday, January 26, 2021, Apple released version 14.4 of its iOS, iPadOS, and tvOS products that included patches for three security vulnerabilities that affect iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation, as well as Apple TV.

Extending Microsoft Endpoint Manager with Third Party Updates for Config Manager and Intune

Unpatched security vulnerabilities are utilized in the majority of data breaches and ransomware attacks. In fact, research shows that many CVEs go unfixed for long periods to time leaving companies open to unnecessary exposure. 60% of breaches involved vulnerabilities of which a patch was available but not yet applied. This is why vulnerability management is so important and not only having a plan but selecting the right tools to support your plan.