Agent versus Agentless Myth Busting: Agents open up the machines to security vulnerabilities

This myth is particularly humorous when one of the biggest pluses to any power management solution is the ability to actually secure the computer estate. A company that deploys a power management solution can restart PCs during the night, apply patches successfully, and then shut the PCs down again to conserve energy.

A carefully developed agent that considers security in its design (NightWatchman is Common Criteria certified) presents no additional attack surface. Proprietary agent communications are encrypted and use configurable ports, making them far more secure with less effort.

Most agentless protocols have no additional security, relying on the security of the underlying remote connectivity protocols. However, requiring an account with administrative privileges across all machines is a much bigger security issue.

In case you missed the previous Agent versus Agentless myth busting posts, have a read through Part 1 and Part 2.

Part 1: Agent versus Agentless Myth Busting: Agented software usually places additional load on the network

Part 2: Agent versus Agentless Myth Busting: Interference with the operating system and applications

Click for more information on IT Efficiency using NightWatchman Enterprise

Share this post

Share this post on your favourite social media platform.

Find this article useful?

If so please click here