90% patch success rate in 30 days is too slow!
7.72 Days is the average delay between a vulnerability disclosure and attacks exploiting that vulnerability.
The importance of patching cannot be over stated.
As a mission critical process, do you monitor patch success on each endpoint? Do you have any backups in place when it fails?
According to the Ponemon Institute’s “State of Vulnerability Response Report”:
are lost coordinating activities across teams for every vulnerability patched.
A large US education establishment found
of their 40,000 endpoints were not rebooted after a patch update was deployed – that’s 1,000 potential entry points for bad actors.
Ponemon’s State of Vulnerability Response Report says that:
of breach victims said they were breached due to a known, unpatched vulnerability.
Most organizations face challenges with Microsoft SCCM due to huge infrastructure requirements and unmanaged clients. Customers also lack real-time and automation capabilities.
There are 4x main problems with typical Enterprise patch management solutions like Microsoft SCCM:
- Distributing patch content can cause business disruption. Companies often implement “Change Windows” to prevent this, which can lead to some endpoints not receiving patch content when needed.
- Agents on endpoints become unmanageable due to issues with the OS, WMI or the agent software itself.
- Significant delays between the patch installation and reboots which may be needed to affect the change.
- The process is too slow: Attackers get to the endpoint before the patch does.
Each of these 4 issues create additional, repetitive manual tasks for IT, every patch deployment.
1E Patch Success provides automation to address these 4 issues.