Flexera is leveraging artificial intelligence (AI) to offer patch automation as a core capability in its Software Vulnerability Manager (SVM) product.
Flexera recently announced the new core capability offering in a press release. The company states that “the new Patch Automation provides overwhelmed IT teams the ability and support to do more with resources already available.”
The new capability leverages AI, dubbed “intelligent automation” by Flexera, allowing organizations to use SVM to automate the deployment of software patches. This alleviates labor-intensive manual patching of third-party software on systems while simultaneously enhancing the remediation of vulnerabilities detected by SVM.
Patch management is indeed a very labor-intensive process that can consume significant IT resources. The process of patch deployment is often a very repetitive task that is subject to the benefits of automation. Flexera’s use of AI enhances the standard patch deployment process, whereby an administrator can configure the automated deployment process to meet certain conditions before deployment. Thus, the administrator maintains control over a process that can run on its own.
In a world where IT departments are faced daily with depleted and heavily taxed resources, receive demands to do more with less, and are constantly seeking ways to become more efficient, patch automation is a feature welcomed with open arms.
IBM is changing the terms of its ubiquitous Passport Advantage agreement to remove entitled discounts on over 5,000 on-premises software products, resulting in an immediate price increase for IBM Software & Support (S&S) across its vast customer landscape.
Microsoft’s end-of-life support for Windows 7 has run into its first set of issues with its extended security updates (ESUs). Administrators who paid for the ESU found out their downloads are not applying.
Qualys Research Labs, a vulnerability management provider, discovered a vulnerability in the OpenSMTPD Mail server used in conjunction with the OpenBSD operating system. This flaw allows for an attacker to execute arbitrary code with command privileges.
A leaked UN report showed that servers were compromised during a cyberattack that exploited an older version of Microsoft SharePoint. This breach is a case study in the importance of both patch management and transparency.
Reported by Microsoft on January 17, the company admitted to another vulnerability in the older versions of its Windows products. A vulnerability in the remote code execution (RCE) was found in the scripting engine of Internet Explorer (IE).
Last fall, Microsoft announced that it would be ending support for Windows 7 on January 14, 2020.
A Citrix vulnerability first discovered on December 17, 2019 is being continually exploited by ransomware attackers despite patching attempts by Citrix.
Project Zero is changing its vulnerability disclosure policy to give software developers more time to patch vulnerabilities. The policy is now shifted to a stringent 90-day policy.
Cybersecurity firm Bishop Fox identified eight vulnerabilities in ConnectWise’s remote control and remote access software.