Fy15fw5 cbabunt asset 101 wpfreepat

Page 1

Why Free Patch Management Tools Could Cost You More Selecting the right solution can save your organization time and money By KACE & Lumension


Table of Contents 1.0 Introduction ......................................................................................................................................... 3 2.0 Point Patching versus Complete Patch Management ................................................................. 3 3.0 The Hidden Costs and Missing Capabilities of WSUS Point Patching Product ....................... 3 3.1 Microsoft OS and applications only .............................................................................................4 3.2 Requires additional point products even for Windows-only environments ........................4 3.3 Cannot consolidate operations ....................................................................................................4 3.4 Does not satisfy regulatory compliance requirements ............................................................ 5 3.5 Poor discovery of unmanaged assets ......................................................................................... 5 3.6 Requires domain membership...................................................................................................... 5 3.7 Poor system software and hardware inventory ......................................................................... 5 3.8 Cannot manage system configurations ...................................................................................... 5 3.9 Overall higher labor and product costs ...................................................................................... 5 4.0 Comprehensive Patch Management Solution is the Right Solution .........................................6 4.1 Dell KACE™ Management Appliance Security Audit and Enforcement Feature .................6 4.2 Configuring and scheduling patches .......................................................................................... 7 4.3 Patch management and deployment..........................................................................................8 4.4 Tracking and Reporting..................................................................................................................8 5.0 Conclusion ...........................................................................................................................................8 Dell KACE Corporate Background ......................................................................................................... 9 About Lumension™, Inc. .......................................................................................................................... 9

2

Copyright © 2011 Dell KACE and Lumension. All rights reserved.


1.0

Introduction

Today’s current economic situation underscores the importance of scrutinizing all business expenses, particularly within IT. As organizations look to keep operating expenses down, “free” technology solutions start to look more attractive. However, when choosing a solution for patching your systems and servers, it is important to consider the total cost of ownership (TCO) and the difference in key capabilities between point patching products and comprehensive patch management solutions. Although point patching products, such as Microsoft’s Windows Software Update Services (WSUS) may look more attractive on the surface, closer inspection often reveals hidden costs and missing capabilities. These solutions ultimately could end up costing organizations more money in the end to fully protect their IT environments. Microsoft’s WSUS lack of scalability, coverage and flexibility could leave organizations with fragmented patch management and weaker security posture while also being a more costly and cumbersome option for organizations to maintain..

2.0

Point Patching versus Complete Patch Management

Point patching products such as WSUS solve very specific problems, but a major drawback to this free utility is that WSUS doesn’t support non-Windows systems and third party applications. Furthermore, solutions like WSUS do not consolidate nor centralize the management of mixed systems and applications, patch deployments and maintenance tools nor do they have the ability to discover blind spots that are not being managed. The result is a point product with a fragmented approach to vulnerability management and lack of visibility of the overall patching and risk posture. The unanswered needs for the organization to manage third party applications and operating systems often force the use of multiple disparate tools as well as consume large quantities of staff resources. A better choice is a complete Patch Management Solution which is comprised of more than simply sending patches to Windows devices. Comprehensive Patch Management Solutions address the entire vulnerability management lifecycle: • • • • • •

Automated discovery of all unmanaged and rogue devices on the network Full network scanning to determine vulnerabilities and exposures Rapid patching and remediation of all IT assets from a centralized management console Policy enforcement of approved software installed on systems Ongoing validation and maintenance of correct patch and configuration levels on systems Robust management and reporting

A complete Patch Management Solution provides a single platform and a robust content repository that can address Patch Management in a holistic manner without the requirement to procure multiple point products or the increase in staffing to author scripts on an ad hoc basis for third party applications. The advantage to these solutions is an overall lower operating cost due to consolidated management as well as a stronger overall security posture and flexibility to proactively address issues with less staffing burden.

The Hidden Costs and Missing Capabilities of WSUS Point Patching Product 3.0

When it comes to Microsoft’s WSUS 3.0 “free” solution, the traditional consumer adage wisely urges us to: “Remember, if it looks too good to be true, it probably is.”

3

Copyright © 2011 Dell KACE and Lumension. All rights reserved.


Microsoft OS and applications only

3.1 Microsoft’s WSUS provides organizations with the basic capability to patch only Microsoft Operating Systems and Microsoft applications. But that’s all. There is no support for non-Microsoft applications or operating systems. Even the most homogeneous Microsoft environments have a myriad of third party applications running that require regular assessment and patch management to ensure critical vulnerabilities are mitigated and regulatory compliance standards are met. The modern IT environment is simply too diverse and heterogeneous not to include the use of applications such as Acrobat Reader, Apple’s QuickTime or Sun’s Java Runtime Engine, an enabler of OS independent applications. Additionally, unless an organization implements an application control policy, users may also have introduced personal productivity or entertainment applications, such as Apple iTunes, which may further diversify the variety of well-known applications subject to patching. The result is that organizations are not only faced with patching Windows and non-Windows OSes and applications, but also custom applications that WSUS cannot address.

Requires additional point products even for Windows-only environments 3.2

As critical vulnerabilities are inevitably introduced through these non-Microsoft applications, organizations that have chosen WSUS as their strategic Patch Management solution are left with a gaping unanswered need and will have to reactively invest in additional technology and possibly staff to address the WSUS shortfall. The decision to go with the “free” tool in this case results in the ultimate need for multiple point products to solve the patch management challenge, rather than using a consolidated solution that effectively manages the needs of the organization while also reducing operational TCO. Even Microsoft has noted that more than 9 out of 10 recent software exposures are the result of user 1 productivity software . A business should consider mitigating risk across a variety of attack vectors. The table below illustrates the breadth of potential exposure across technologies. Vulnerability Surface Windows OS & Microsoft Applications Apple & Apple Applications 2 Other Applications for Windows Network, Network OS & Network Technologies Unix and Linux Only Platforms & Applications

Percentage 38% 24% 29% 7% 3%

US CERT Technical Cyber Security Alerts 2006-2008

3

To consider focusing only on Microsoft applications leaves a large exposure which can be targeted.

Cannot consolidate operations

3.3 Though many businesses may be a “Windows only” shop in their choice of Operating System utilization, numerous organizations implement a variety of operating systems (such as MAC OS X, Sun 1

Microsoft Security Intelligence Report: January through June 2008, Vinny Gullotto, et al. Includes Windows only as well multiple OS Applications 3 Source US-CERT (www.us-cert.gov) Technical Cyber Alerts as of October 31, 2008 2

4

Copyright © 2011 Dell KACE and Lumension. All rights reserved.


Solaris, HP-UX, Red Hat Enterprise and SUSE Linux). Having a well-rounded Vulnerability Management Solution allows organizations to effectively address the OS patching needs across diverse IT environment, simplifies operation burden, and reduces operating expense. In addition, it eliminates the requirement of an additional “patch solution” when utilizing WSUS.

Does not satisfy regulatory compliance requirements

3.4 This breadth of application and OS support may be particularly important in light of compliance considerations. For example, if a company’s financial compliance internal control system utilizes IT/application security, then there are a set of high level criteria, which may be assessed by audit under Section 404 of SOX. In an audit checklist for SOX 404 compliance, there may be a requirement that patching extend to every product utilized in the IT control system. Since WSUS misses non-Microsoft applications, WSUS alone cannot earn a check mark for the audit list item. Some other method of patching the non-supported applications must be specified to meet compliance requirements.

Poor discovery of unmanaged assets

3.5 Since WSUS is designed to only manage Windows systems, it relies heavily on Active Directory to understand what assets are deployed in the IT environment. Un-managed or rogue devices will not be identified for further inspection. This lack of visibility or intelligence results in dangerous blind spots that can leave poorly managed assets completely vulnerable to attack, undermining even the best attempts to ensure standard adherence to security policies.

Requires domain membership

3.6 WSUS assumes, and in fact, requires that all managed Windows systems be members of the domain. Many IT environments simply cannot guarantee that all of their critical Windows systems are being effectively managed through Active Directory. Assets not being managed through the domain will not be eligible for the WSUS product. This in effect means that any organization running isolated workgroups will not be able to deploy WSUS in their environment.

Poor system software and hardware inventory

3.7 Since WSUS is solely focused on Windows patches, it does not capture inventory information about installed non-Windows software and local hardware. This lack of context limits the usefulness of WSUS, and another tool will be needed to collect this information.

Cannot manage system configurations

3.8 Patch Management is just one part of a comprehensive vulnerability management process. According to Gartner, 65 percent of all network exploits are attributed to system misconfigurations, by far the largest cause of network security problems. Security configuration setting issues can be attributed to just as many of the known vulnerabilities that need to be managed in order to have secure and running operations. The drawback to WSUS is that it does not provide security best practices or native capabilities to assess and remediate misconfiguration issues.

Overall higher labor and product costs

3.9 The need for multiple point products and the staffing burden required to manage WSUS is a concern that even Gartner has identified. According to a recent report by Gartner4, some organizations continue to take the at first glance less-costly but more manualintensive path by using Microsoft's Windows Server Update Services (WSUS) to patch the operating system and Windows applications

5

Copyright © 2011 Dell KACE and Lumension. All rights reserved.


because it's free. Although Microsoft has improved WSUS, client feedback suggests that WSUS is not as rich in content (prereq/co-req) and as robust in targeting and reporting as the focused patch solutions. Thus, organizations accepting WSUS as ‘good enough’ have significantly higher labor costs for content analysis, testing and deployment. Although Microsoft is making improvements to WSUS, we do not believe it will be a best-of-breed solution for patch management.

Comprehensive Patch Management Solution is the Right Solution 4.0

Dell KACE, in partnership with Lumension, delivers a complete patch management solution fully integrated into the Dell KACE K1000 Management Appliance. The K1000 Patch Management feature saves organizations time and money by providing a comprehensive and reliable patch management solution that is also easy-to-use and affordable. This gives organizations robust security without the time, complexity and cost of traditional software solutions. The KACE Appliance leverages technology from Lumension, the industry’s leading patch management solution for reliable vulnerability detection and remediation. Utilizing Lumension’s content repository, the K1000 provides one of the largest patch repositories including patches for Windows and Mac operating systems, as well as a wide range of applications from vendors including Microsoft, Apple, Adobe, Symantec and Mozilla. The K1000 also utilizes Lumension’s Digital Fingerprint™ Technology to accurately and reliably assess and remediate vulnerabilities. All of these capabilities are managed through the intuitive KACE Appliance web-based management console, where administrators can control scanning and distribution schedules to minimize business disruptions. This broad coverage eliminates the hidden costs associated with point patching products by consolidating vulnerability assessment and patch deployment from a centralized management console, empowering organizations to accomplish more with less staffing burden. The KACE Management Appliance allows convergence of patch management capabilities with best of breed IT system management practices and provides the foundation for a more successful and costeffective patch management implementation over WSUS in several ways, including: • • • • • • • •

Comprehensive support for heterogeneous environments, including multiple OSs and broad coverage of common third party applications Consolidation of operations with a single solution Meeting compliance requirements for patch and vulnerability management Automated discovery of all assets in the IT environment, including unmanaged and rogue devices OVAL-based vulnerability scanning of all managed systems Assessment of security configurations as well as patches Security configuration policy enforcement Reducing the TCO of patch management

Dell KACE™ Management Appliance Security Audit and Enforcement Feature

4.1

In addition to providing a more complete solution for patch management, the KACE K1000 Management Appliance Security Audit and Enforcement feature provides tools for policy compliance which are absent in WSUS. This feature provides open standards-based configuration management and monitoring and assessment of computing systems to ensure adherence with regulatory

6

Copyright © 2011 Dell KACE and Lumension. All rights reserved.


requirements or specific company-defined policies. The K1000 vulnerability scanning also enables customers to quickly assess their compliance posture, by leveraging definitions written in Open Vulnerability and Assessment Language (OVAL®). OVAL is the information security communities standard endorsed by US Computer Emergency Readiness Team (US Cert) and the Department of Homeland Security. It promotes open, publicly available security content and standardization of its transfer across security tools and services. This includes setting the testing schedule (Security/OVAL Tab), and results reporting. Over 1700 pre-defined tests are included, and new tests are added as they are defined and published. The K1000 Management Appliance Security Audit and Enforcement feature also provides several easyto-use ways to enforce PC configurations for improved security. First the K1000 includes a number of pre-configured policies that are ready to be deployed. The Quarantine capability for example enables the administrator to sever communications between a compromised node and all other systems except the KACE Appliance. The other main policies include: • • • •

Enforcing XP Firewall settings Enforcing IE security settings Enforcing anti-virus settings Disallowing programs

These policies typically enforce settings on PCs even when those systems are remote and not connected to the KACE Appliance. The K1000 also includes easy-to-use wizard-based configuration of conditional, multi-dependency and multi-stage K-scripts that can be run on a desktop or server. This allows users to easily create and enforce new security policies without having to learn a scripting language. These capabilities, combined with the KACE Appliance flexible approach to discovering and managing even non-domain assets, dramatically reduce the complexity and overhead of a successful patch management process. The consolidated system and security management capabilities of the KACE Appliance provides greater operational efficiency and lowered TCO due to less resources and time needed to manage the patch management process. In addition to the expanded capabilities of the KACE Management Appliance, the award-winning solution delivers granular capabilities that deliver more versatility over WSUS.

Configuring and scheduling patches

4.2 The KACE Appliance gives administrators the flexibility to implement the patch management process that fits their environment best. Administrators can choose to download only the operating system and application patches relevant to their network, eliminating the need to manage patches that are not applicable. The K1000 also allows different groups of machines to have different schedules for vulnerability assessment and remediation. These groups can be dynamic based on filtering criteria, so that the patches can then be mapped onto pre-approved detect and deploy dynamic groupings to ensure end systems receive their updates with minimal if any IT intervention required. Administrators get the control they need to enforce different policies for different populations of machines, such as providing daily assessment and remediation of PCs, and weekly assessment and remediation for servers.

7

Copyright © 2011 Dell KACE and Lumension. All rights reserved.


Patch management and deployment

4.3 As the mobile user population grows, maintaining security and associated patch levels with the KACE Appliance can be highly automated, and set up to provide remote mobile workers options to ensure their critical access to IT services is not delayed. End users, particularly those who are remote and mobile with limited time on the actual network, can prioritize their work using now/later/snooze options for patches requiring reboots. In addition, the huge number of patches released every month can make identifying, prioritizing and tracking patches a challenge. The KACE Appliance offers intuitive search capabilities and views that allow administrators to quickly filter through large numbers of patches and easily track patch deployment status.

Tracking and Reporting

4.4 Administrators coordinating patching updates across complex and distributed user bases get visibility into the patching phases on a per machine basis, and can control scheduling of the patches with the ability to set up patch windows with hard stops to ensure no interruption for users during business hours. The K1000 Management Appliance also provides summary data on patch management and deployment progress and status. This allows administrators to quickly confirm patches have rolled out successfully and that systems are in compliance, and identify and remediate any systems where patching has failed. The K1000 makes it simple to generate patch compliance reports with a wide range of pre-packaged reports, an easy-to-use reporting wizard for creating custom reports and integration with 3rd party reporting tools.

5.0

Conclusion

WSUS’ acquisition cost makes it appear to be an enticing solution for patch management. Looking deeper into the needs of the organization leads to selection of a more complete Patch Management Solution which results in reduced long-term risk and optimized operating expense. KACE Management Appliance vs. WSUS Functional Comparison

Function Patch Microsoft OS Support for 3rd party applications and OSes Consolidate patch management operations Discover unmanaged assets Support for non-active directory environments Security configuration management Full system inventory collection Dynamic policy-based deployment Reduces staff burden Lowers patch management TCO Granular patching control Complete solution does not require additional point products

8

KACE Management Appliance Yes Yes

WSUS Point Patching Product Yes No

Yes

No

Yes Yes

No No

Yes

No

Yes Yes

No No

Yes Yes Yes Yes

No No No No

Copyright Š 2011 Dell KACE and Lumension. All rights reserved.


Dell KACE Corporate Background Dell (NASDAQ: DELL) creates, enhances and integrates technology and services customers count on to provide them reliable, long term value. Dell provides systems management solutions for customers of all sizes and system complexity. The award-winning Dell KACE family of appliances delivers easyto-use, comprehensive, and affordable systems management capabilities. Dell KACE is headquartered in Mountain View, California. To learn more about Dell KACE and its product offerings, please visit http://www.kace.com or call 1-877-MGMT-DONE. Helpful Links: • KACE Systems Management Appliances • KACE Systems Deployment Appliances • KACE Virtual Appliances

Dell KACE Headquarters 1981 Landings Drive Mountain View, California 94043 (877) MGMT-DONE office for all inquiries (+1) (650) 316-1050 International (650) 649-1806 fax European Sales: emea@kace.com Asia Pacific Sales: apac@kace.com

About Lumension™, Inc. Lumension™, Inc., a global leader in endpoint security, develops, integrates and markets security software solutions that help businesses protect their vital information and manage critical risk across network and endpoint assets. Lumension enables more than 5,100 customers worldwide to achieve optimal security and IT success by delivering a proven and award-winning solution portfolio that includes Vulnerability Management, Endpoint Protection, Data Protection, AntiVirus and Compliance and IT Risk Management offerings. Lumension is known for providing world-class customer support and services 24x7, 365 days a year. Headquartered in Scottsdale, Arizona, Lumension has operations worldwide, including Virginia, Texas, Utah, Florida, Luxembourg, the United Kingdom, Spain, Australia, India, and Singapore. Lumension: IT Secured. Success Optimized. More information can be found at www.lumension.com.

WPFPMTools_05.31.2011 While every effort is made to ensure the information given is accurate, Dell does not accept liability for any errors or mistakes which may arise. Specifications and other information in this document may be subject to change without notice.

9

Copyright © 2011 Dell KACE and Lumension. All rights reserved.


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.