Automated Patching - Easy Approach To Security
By Eric Schultze, Shavlik Technologies Thursday, 15 December 2005 06:57 EST
Patch management is an essential administration task within today's busy IT networks with the constant threat of new security bugs. Some companies will wait for an attack before taking necessary action to protect themselves from further threat whilst others consider patching as often as possible.
Patching networks consists of scanning machines for any missing patches and deploying those patches as soon as they become available. Using an automated patch management solution is the best way to avoid problems when a security threat/bug is issued from Microsoft on the first Tuesday of each month. Saving network bandwidth and being able to deploy patches from a remote source is also a major benefit to organisations today.
Determining what to patch and when is one of the most problematic issues facing businesses. An expert panel at an Information Security Decisions conference in Chicago, US said the ever-diminishing window of time between vulnerability's announcement and an exploit's release makes it crucial to analyse and patch the areas most likely to be attacked first.
One example of a security breach was the virus 'Code Red' which infected over 250,000 systems within just nine hours of its discovery. The original CodeRed caused a Denial of Service (DoS) attack on the White House Web server. CodeRed II was different in that it allowed its creator to have full remote access to the Web server.
I always urge folks to rate the patches themselves. Patches are often rated arbitrarily. Ask yourself whether a 'critical' patch critical to your organisation? Look at the risk involved. For example, a DoS is ranked as a low-level threat by Microsoft, but could be critical to an online bank.
If a network is not patched in time before an attack occurs, then the costs involved can be enormous. For example, the loss of production and sales and the cost to clean the incident up can be phenomenal.
Patch management can be an extremely time-consuming task and you need to ensure that your servers are protected. A product that allows you to decide which patches are more critical than others and allows you to stay in control but takes away the time-consuming of patching manually is extremely important.
Good tools provide a method of identifying common security configuration errors, and contain graphical and command line interfaces that enable you to scan local and remote systems.
|
|
Prevent data theft & viruses through network connected USB sticks, PDAs & media players.
Control user access to endpoint connections with GFI EndPointSecurity - Free trial!
Visit GFI Security Software page for more information.
IT-Gear.com - Weblog dedicated to everything concerning IT tools and services.
Latest News
SECUDE appoints Open-Source specialist as Linux Expert 02.11.06??SECUDE IT Security GmbH has confirmed the appointment of Felipe Rodriguez, a Linux Kernel contributor and owner of the Open-Source project MGSTEP, as its Linux Expert.
Increased Spam Fuelled Through Botnet Activities 02.11.06??MessageLabs, a provider of integrated messaging and web security services to businesses worldwide, has announced the results of its Intelligence Report for October 2006.
How to keep your VoIP net safe 30.10.06??One of the major challenges in implementing a converged network is having a coherent security policy for the management and control of a system that is carrying voice, video and data.
User tricks, security treats 30.10.06??Thirteen malevolent spirits may haunt the halls and cubicles of your company, and if you're going to scare them into security compliance you may need to get a little bit spooky yourself.
10 Steps to More Secure Wireless 27.10.06??We have all heard about the stories of spammers using open home wireless networks to fill the net with junk mail.
BT acquires Counterpane Internet Security 25.10.06??BT has announced that it has acquired Counterpane Internet Security, a provider of managed networked security services, as part of its strategy to expand and develop its global professional services capabilities.
Perdemia updates Permission Analyzer 25.10.06??Perdemia has upgraded Permission Analyzer, a powerful Windows administration tool that quickly determines whether the system access permissions are properly set, need to be changed, or have been altered by people who are not authorized to make changes.
Mac OS Bluetooth exploit - Inqtana.d 25.10.06??Inqtanad is a proof-of-concept exploit, which has not yet been seen in the wild, that is installed on a Mac OS X computer via Bluetooth from a computer or PDA running a Linux system.
|
|