Patch Management Strategies Patch Management Research Paper

Related to the second point, this is a major challenge at colleges and universities with wireless and WiFi networks where hundreds of types of laptops and mobile devices are used (Higby, Bailey, 2004). The sheer variety of laptops, PCs and mobile devices make patch management in larger colleges and universities a continual and costly challenge. Cost Effective Measures for Patch Management

Spanning the spectrum from the manual to the fully automated, there are cost effective measures that organizations can take to attain a high level of effectiveness with patch management. Beginning with the most manually based approach of defining blacklists of systems that have been compromised on a network through server-based analysis (Higby, Bailey, 2004) to the use of semi-automated and automated patch management (Gerace, Cavusoglu, 2009) there is a range of cost-effect measures for managing patch distribution and validation. Blacklisting specific systems has proven to be resource intensive in academic institutions that have a very wide variety of laptops, WiFi-enabled devices, often with mixed results (Gerace, Mouton, 2004). Studies indicate that automated patch management using applications including BigFix Enterprise Suite, HFNetChk, and PatchLink Update are effective in ensuring compliance of up to 31% of all systems in a network (Brandman, 2005). Microsoft's Automatic Update (Gerace, Mouton, 2004) is a third alternative in networks that are...

...

Blacklisting through server-based authentication (Higby, Bailey, 2004) is not scalable over time and does not have a prescriptive approach to solving the problems of security; the approaches are only restrictive. The most cost-effective strategies for patch management combine change management programs and initiatives in conjunction with automated patch management that can scale across a wide variety of operating systems and platforms.

Sources Used in Documents:

References

George Brandman. 2005. Patching the Enterprise. Queue 3, 2 (March 2005), 32-39.

Tom Gerace and Jean Mouton. 2004. The challenges and successes of implementing an enterprise patch management solution. In Proceedings of the 32nd annual ACM SIGUCCS conference on User services (SIGUCCS '04). ACM, New York, NY, USA, 30-33.

Thomas Gerace and Huseyin Cavusoglu. 2009. The critical elements of the patch management process. Commun. ACM 52, 8 (August 2009), 117-121.

Charles Higby and Michael Bailey. 2004. Wireless security patch management system. In Proceedings of the 5th conference on Information technology education (CITC5 '04). ACM, New York, NY, USA, 165-168.


Cite this Document:

"Patch Management Strategies Patch Management" (2010, April 17) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/patch-management-strategies-patch-management-1861

"Patch Management Strategies Patch Management" 17 April 2010. Web.19 April. 2024. <
https://www.paperdue.com/essay/patch-management-strategies-patch-management-1861>

"Patch Management Strategies Patch Management", 17 April 2010, Accessed.19 April. 2024,
https://www.paperdue.com/essay/patch-management-strategies-patch-management-1861

Related Documents

To avoid all these hassles, corporates should take the lead. They should ensure that the environment is not harmed in any way and people are treated with respect and dignity without exploiting the people or the environment in any unfair way. Such initiatives get publicity too and this has a positive impact on the company's business interests. Therefore, technology has been another driving factor that induces companies to take the

The imminent matter of concerns to be sorted out by the manufacturer includes, Selection of a retailer or distributor having good and strong public relations. Cater for logistics, shipment issues when the retailer network expands / Time dilation. Mere incentives offered by the retailers as compare to Super Market Giants. The public and market repute of the retailer has to be thoroughly reviewed. The standards of the products aren't solely derived from its

For accounts that have not purchased this level of service, Cincom relies on its own Socrates constraint engine technology to deliver the most possible patches and product fixes electronically based on remote analysis of the customers' problem. This remote diagnostics analysis, which the customer can turn on at any time, is also responsible for the high renewal rate as well. Third, there are escalation paths through customer service to

Management Organization Learning The efforts of a collective group of people can often transcend that of an individual; teams have been a functional part of the business culture for over twenty years with the goal of accomplishing just this feat. While "system thinking," "mental models" and "team communication" continue to hold great importance in the synergy of multi-contributor accomplishment, it hasn't proven to be quite enough. Working teams accumulate an almost infinite

Networks Security Management Network Security Management Why Threat Management Is Different from Vulnerability Management Studies have attempted to examine on the possibility of implementing an all rounded technology that seeks to manage several layers of OSI networking levels. However, this implementation has considerably lost influence since this approach is defeated by the nature of attacks. Currently, 2600 hacking publication presents to a user several methodologies of attacks. In fact, hacking as become complex

(Braunschweig; Day, 150) Most of the current generation of project managers expects the project management tools to furnish them with almost real-time knowledge in order to facilitate their decision-making. Some of these tools like DOFF, "Field of the Future," "Smart Fields," Microsoft's "Oilfield Connectivity" and i-Fields are currently being examined by exploration and production oil companies. Some of these tools have the capability of generating information from apparently incongruent data