Search
Close this search box.

Agent versus Agentless Myth Busting: Agents open up the machines to security vulnerabilities

This myth is particularly humorous when one of the biggest pluses to any power management solution is the ability to actually secure the computer estate. A company that deploys a power management solution can restart PCs during the night, apply patches successfully, and then shut the PCs down again to conserve energy.
A carefully developed agent that considers security in its design (NightWatchman is Common Criteria certified) presents no additional attack surface. Proprietary agent communications are encrypted and use configurable ports, making them far more secure with less effort.
Most agentless protocols have no additional security, relying on the security of the underlying remote connectivity protocols. However, requiring an account with administrative privileges across all machines is a much bigger security issue.
In case you missed the previous Agent versus Agentless myth busting posts, have a read through Part 1 and Part 2.
Part 1: Agent versus Agentless Myth Busting: Agented software usually places additional load on the network
Part 2: Agent versus Agentless Myth Busting: Interference with the operating system and applications
Click for more information on IT Efficiency using NightWatchman Enterprise

Report

The FORRESTER WAVE™: End-User Experience Management, Q3 2022

The FORRESTER WAVE™: End-User Experience Management, Q3 2022