Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

12/7/2009
12:48 PM
Fredric Paul
Fredric Paul
Commentary
50%
50%

KACE Adds Patch and Remediation To Strengthen Patch Management For Endpoint Security

The new technology is designed to improve patching support and add automated patch management to KBOX systems management appliances.

The new technology is designed to improve patching support and add automated patch management to KBOX systems management appliances.Patch management has always been a hassle for busy IT departments at small and midsize companies. If anything, the problem is getting worse. Adding new technology from Lumension technology is designed to give users of KACE appliances expanded patch management and fully automated detection and remediation:

  • Broadened patch coverage depth - inclucing support for Windows 7, Windows Server 2008 R2, Mac OS 10.6 and many kep applications
  • Extended international support with Japanese and simplified Chinese patch support for Windows.
  • Easy automated patching policies - critical patches are automatically released and applied across distributed IT environments
  • Dynamic group policies - integrating patch management with inventory, assets, and software distribution.

In a statement, Rich Hlavka, senior vice president of business development for Lumension, said, "While enterprises have large numbers of IT staff to proactively combat these new threats, SMBs are challenged with remaining agile while building a defense in depth approach with limited budget and resources." KACE has been working with Lumension for a couple years, but by including Lumension Patch and Remediation, Hlavka added, KACE now "offers depth and breadth of coverage and protection for all major applications and operating systems."

Rob Meinhardt, co-founder and CEO of KACE, added in a statement that KACE "is designed to dramatically simplify the patching process while at the same time ensuring customers automatically receive the most up-to-date patches saving IT administrators time and their organizations money."

More From bMighty:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Lessons from the NSA: Know Your Assets
Robert Lemos, Contributing Writer,  12/12/2019
4 Tips to Run Fast in the Face of Digital Transformation
Shane Buckley, President & Chief Operating Officer, Gigamon,  12/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19807
PUBLISHED: 2019-12-15
In the Linux kernel before 5.3.11, sound/core/timer.c has a use-after-free caused by erroneous code refactoring, aka CID-e7af6307a8a5. This is related to snd_timer_open and snd_timer_close_locked. The timeri variable was originally intended to be for a newly created timer instance, but was used for ...
CVE-2014-8650
PUBLISHED: 2019-12-15
python-requests-Kerberos through 0.5 does not handle mutual authentication
CVE-2014-3536
PUBLISHED: 2019-12-15
CFME (CloudForms Management Engine) 5: RHN account information is logged to top_output.log during registration
CVE-2014-3643
PUBLISHED: 2019-12-15
jersey: XXE via parameter entities not disabled by the jersey SAX parser
CVE-2014-3652
PUBLISHED: 2019-12-15
JBoss KeyCloak: Open redirect vulnerability via failure to validate the redirect URL.