BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Patching is Still a Challenge? Yup.

Post by Morey Haber March 14, 2012

eEye has always taken a “zero gap” approach to our threat management product strategy. That thinking has been the driver for our market firsts in support for new technologies such as cloud, mobile, and virtualization vulnerability management. These new technologies bring tremendous benefits, but they also bring risks with them as well, which must be identified, understood, and mitigated. This is all in the name of minimizing attack surface. However, one of our most impactful releases in that regard is one that was a new take on a well-established technology – patching.

A recent stat provided by CNN Money stated that “61% of Adobe Reader plug-ins are outdated on work computers.” This is a staggering statistic, considering the ubiquitous nature of Adobe products in business settings. Staggering, but not surprising.

In a typical business setting, the technologies we leverage on a daily basis – both transformational technologies such as the cloud or virtualization, or point and click technology like Adobe Reader – inadvertently bring a new attack surface into the equation for IT and security to manage.

This isn’t a new concept, not at all. So why do we still have 61% of corporate machines in an unpatched (read: vulnerable) state? As any IT veteran will tell you, patching non-windows applications isn’t always as easy as it sounds.

This is why we added Patch Management to Retina CS.

eEye has taken a unique approach to Patch Management by leveraging existing agent-less technology built directly into your assets and already installed by Microsoft. Using the built in Windows Update system, and Windows Server Update Services, Retina CS correlates vulnerability findings to Microsoft Patches and Third Party Applications. The solution then allows patch deployment to occur directly from the Retina CS management console without any additional tools or user intervention.

In addition, this supports full change control through Smart Groups to verify that patches work in test environments before they are deployed to production environments with complete role based access and integration ticketing system. Historically, this change control concept has been a major unmet customer need, and a big reason why non-Windows patching has been such a bane for the IT team.

Below is a screen shot of just how those patches look in Retina CS.

Below is a screen shot of this scenario – Windows Update is applying a 64 bit patch for Adobe Flash Player without any additional agents on the Windows host and with no direct connection from the client to Adobe’s website (as commonly blocked in the CNN article referenced in the beginning).

Outside of the obvious “cool” factor, this is why we added Patch Management to Retina CS – to provide complete, zero-gap vulnerability management coverage for your environment.

Whether that is assessing mobile devices, assuring your cloud resources are vulnerability free, verifying configuration compliance, or applying patches to critical vulnerabilities that are all to often just ignored; Retina has got you covered.

eEye is keeping the entire application and vulnerability management lifecycle in perspective and making sure that boundary conditions and new technologies are covered, as well. At the end of the day, it is more than Vulnerability Reports that will keep you from being compromised, it is taking informed, strategic, and intelligent actions against the findings that will make the difference.

UPDATE: If you’re participating in our VEF today at 1pm PT be sure to post your answer to our question, that we ask you during the webinar, below for your chance to win an Amazon Kindle Fire! It’s that easy. Good luck.

Tags:
, , , , ,

Additional articles

insider-threat-fed

Mitigating Inside Threats to U.S. Federal IT Environments

Recent high-profile cases have increased the perceived risks that go along with disclosure and usage of confidential information. One of the most difficult security threats to mitigate is an attack from the inside. When an over-privileged user, such as an unhappy current or former employee, contractor, or consultant, begins navigating your network, how will you…

Post by BeyondTrust Software April 17, 2014
Tags:
, , , , ,

Are you a Target? Investigating Security Breaches with Kevin Johnson

Last week, over 1,000 IT security professionals watched as Kevin Johnson, CEO of Secure Ideas, presented his expert opinion on lessons learned from recent, high-profile retail breaches. Here’s a summary of key takeaways from the webcast plus an on-demand recording of the full, 60-minute presentation. Understanding the “why” behind attacks According to Kevin, the primary…

Post by Chris Burd April 17, 2014
Tags:
, , , , ,

Vulnerability Expert Forum Highlights: April 2014

We had a great turnout for last week’s April 2014 Vulnerability Expert Forum (VEF) webcast. BeyondTrust Research experts, Carter and DJ, provided in-depth knowledge about the latest vulnerabilities and their potential impacts on network environments. Below are highlights from the Forum, plus an on-demand video of the presentation. Latest critical vulnerabilities, vendor patches, and zero-day…

Post by Chris Burd April 16, 2014
Tags:
, , , , ,