Flexera – Patch Automation Capability Now Available in Software Vulnerability Manager
Flexera is leveraging artificial intelligence (AI) to offer patch automation as a core capability in its Software Vulnerability Manager (SVM) product.
Flexera recently announced the new core capability offering in a press release. The company states that “the new Patch Automation provides overwhelmed IT teams the ability and support to do more with resources already available.”
The new capability leverages AI, dubbed “intelligent automation” by Flexera, allowing organizations to use SVM to automate the deployment of software patches. This alleviates labor-intensive manual patching of third-party software on systems while simultaneously enhancing the remediation of vulnerabilities detected by SVM.
Patch management is indeed a very labor-intensive process that can consume significant IT resources. The process of patch deployment is often a very repetitive task that is subject to the benefits of automation. Flexera’s use of AI enhances the standard patch deployment process, whereby an administrator can configure the automated deployment process to meet certain conditions before deployment. Thus, the administrator maintains control over a process that can run on its own.
In a world where IT departments are faced daily with depleted and heavily taxed resources, receive demands to do more with less, and are constantly seeking ways to become more efficient, patch automation is a feature welcomed with open arms.
Want to Know More?
Build an Information Security Strategy
Establish a Right-Sized Release and Deployment Management Process
IBM Raises Price on Software Support; Shoves Customers Toward the Cloud
IBM is changing the terms of its ubiquitous Passport Advantage agreement to remove entitled discounts on over 5,000 on-premises software products, resulting in an immediate price increase for IBM Software & Support (S&S) across its vast customer landscape.
Windows 7 End-of-Life Troubles Continue: ESUs Don’t Apply to Enterprises That Purchased Licences
Microsoft’s end-of-life support for Windows 7 has run into its first set of issues with its extended security updates (ESUs). Administrators who paid for the ESU found out their downloads are not applying.
Qualys Discovers Critical Flaw With OpenBSD Mail Server, Multiple Programs Vulnerable
Qualys Research Labs, a vulnerability management provider, discovered a vulnerability in the OpenSMTPD Mail server used in conjunction with the OpenBSD operating system. This flaw allows for an attacker to execute arbitrary code with command privileges.
United Nations Faces Cyber-Espionage; Failure to Patch Causes Breach
A leaked UN report showed that servers were compromised during a cyberattack that exploited an older version of Microsoft SharePoint. This breach is a case study in the importance of both patch management and transparency.
Microsoft Troubles Continue; Zero-Day Vulnerability Places Windows Users at Risk
Reported by Microsoft on January 17, the company admitted to another vulnerability in the older versions of its Windows products. A vulnerability in the remote code execution (RCE) was found in the scripting engine of Internet Explorer (IE).
Windows 7 Reaches End of Life; Are You About to Pay the Price?
Last fall, Microsoft announced that it would be ending support for Windows 7 on January 14, 2020.
Citrix Systems Remain Vulnerable Despite Patching Attempts
A Citrix vulnerability first discovered on December 17, 2019 is being continually exploited by ransomware attackers despite patching attempts by Citrix.
Project Zero Extends Its Vulnerability Disclosure Agreement to 90 Days, Changes to Follow
Project Zero is changing its vulnerability disclosure policy to give software developers more time to patch vulnerabilities. The policy is now shifted to a stringent 90-day policy.
Bishop Fox Discovers Eight Vulnerabilities in ConnectWise: Patching a Managed Service Provider
Cybersecurity firm Bishop Fox identified eight vulnerabilities in ConnectWise’s remote control and remote access software.