90% patch success rate in 30 days is too slow!
7.72 Days is the average delay between a vulnerability disclosure and attacks exploiting that vulnerability.
The importance of patching cannot be over stated.
As a mission critical process, do you monitor patch success on each endpoint? Do you have a backups in place for when it fails?
According to Ponemon Institute “State of Vulnerability Response Report”:
are lost coordinating activities across teams for every vulnerability patched.
A large US education establishment found
of their 40,000 endpoints were not rebooted after a patch update was deployed” – that’s 1,000 potential entry points for bad actors.
Ponemon’s State of Vulnerability Response Report says that:
of breach victims said they were breached due to unpatched known vulnerability.
Most organizations face challenges with Microsoft SCCM due to huge infrastructure requirements and unmanaged clients. Customers also lack real-time and automation capabilities.
There are 4x main problems with typical Enterprise patch management solutions like Microsoft SCCM:
- Distributing patch content can cause business disruption. Companies often implement “Change Windows” to prevent this, which can lead to some endpoints not receiving patch content when needed.
- Agents on endpoints become unmanageable due to issues with the OS, WMI or the agent software itself.
- Significant delays between the patch installation and reboots which may be needed to affect the change.
- The process is too slow: Attackers get to the endpoint before the patch does.
Each of these 4 issues create additional, repetitive manual tasks for IT, every patch deployment.
1E Patch Success provides automation to address these 4 issues.