Analytics
11/26/2012
03:49 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Panorama9 Launches Patch Management For Mac

Tool automates tedious patch management activities

San Francisco -- Panorama9 is releasing patch management for Mac, bringing sanity to BYOD environments and giving IT administrators the ability to manage both Mac and Windows machines from a single dashboard.

Managing mixed OS environments is an especially pressing concern for technology startups, which have been on the leading edge of adopting more relaxed BYOD policies.

IT administrators are facing increasingly complex concerns as they have less control over the machines that have full access to their company network. The security and efficiency of the network depends on the IT administrator's ability to roll out, update, and delete software.

Panorama9 makes it easy for IT administrators to track changes and update vulnerabilities across a mix of devices, applications, and operating systems. The tool automates all the tedious patch management activities, so companies can be sure every device is updated with the latest patches and has the very latest version of operating systems and third party applications.

"Mac and Windows have different and sometimes conflicting cultures. Windows machines are built for IT administrators to manage, whereas Macs are user-centric and don't require a middle-man," said Allan Thorvaldsen, CEO and co-founder of Panorama9. "We provide a middle layer that manages both worlds in a seamless way."

Panorama9 is built for today's mobile work reality. Administrators can use the

Panorama9 dashboard from anywhere, whether from a computer in the office or from a tablet or smartphone at home. Likewise, any employee device that accesses the company network can be monitored, even if the employee is at home or on the road.

Panorama9 is a pay-as-you-go subscription-based service, so there are no long-term contracts or commitments. Tiered pricing plans offer the right fit for businesses of all sizes. New users can sign up for a 30-day free trial and deploy within five minutes.

ABOUT PANORAMA9

Panorama9 is a cloud-based, IT management platform bundled into a single dashboard to show you everything about your company's assets, IT availability, security vulnerabilities, and non-compliant systems. Your organization can cut its IT costs through improved up-time without having an infrastructure to deploy or manage.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-4988
Published: 2014-07-09
Heap-based buffer overflow in the xjpegls.dll (aka JLS, JPEG-LS, or JPEG lossless) format plugin in XnView 1.99 and 1.99.1 allows remote attackers to execute arbitrary code via a crafted JLS image file.

CVE-2014-0207
Published: 2014-07-09
The cdf_read_short_sector function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted CDF file.

CVE-2014-0537
Published: 2014-07-09
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via uns...

CVE-2014-0539
Published: 2014-07-09
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via uns...

CVE-2014-3309
Published: 2014-07-09
The NTP implementation in Cisco IOS and IOS XE does not properly support use of the access-group command for a "deny all" configuration, which allows remote attackers to bypass intended restrictions on time synchronization via a standard query, aka Bug ID CSCuj66318.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.