Analytics
11/26/2012
03:49 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Panorama9 Launches Patch Management For Mac

Tool automates tedious patch management activities

San Francisco -- Panorama9 is releasing patch management for Mac, bringing sanity to BYOD environments and giving IT administrators the ability to manage both Mac and Windows machines from a single dashboard.

Managing mixed OS environments is an especially pressing concern for technology startups, which have been on the leading edge of adopting more relaxed BYOD policies.

IT administrators are facing increasingly complex concerns as they have less control over the machines that have full access to their company network. The security and efficiency of the network depends on the IT administrator's ability to roll out, update, and delete software.

Panorama9 makes it easy for IT administrators to track changes and update vulnerabilities across a mix of devices, applications, and operating systems. The tool automates all the tedious patch management activities, so companies can be sure every device is updated with the latest patches and has the very latest version of operating systems and third party applications.

"Mac and Windows have different and sometimes conflicting cultures. Windows machines are built for IT administrators to manage, whereas Macs are user-centric and don't require a middle-man," said Allan Thorvaldsen, CEO and co-founder of Panorama9. "We provide a middle layer that manages both worlds in a seamless way."

Panorama9 is built for today's mobile work reality. Administrators can use the

Panorama9 dashboard from anywhere, whether from a computer in the office or from a tablet or smartphone at home. Likewise, any employee device that accesses the company network can be monitored, even if the employee is at home or on the road.

Panorama9 is a pay-as-you-go subscription-based service, so there are no long-term contracts or commitments. Tiered pricing plans offer the right fit for businesses of all sizes. New users can sign up for a 30-day free trial and deploy within five minutes.

ABOUT PANORAMA9

Panorama9 is a cloud-based, IT management platform bundled into a single dashboard to show you everything about your company's assets, IT availability, security vulnerabilities, and non-compliant systems. Your organization can cut its IT costs through improved up-time without having an infrastructure to deploy or manage.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web