Analytics
11/26/2012
03:49 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Panorama9 Launches Patch Management For Mac

Tool automates tedious patch management activities

San Francisco -- Panorama9 is releasing patch management for Mac, bringing sanity to BYOD environments and giving IT administrators the ability to manage both Mac and Windows machines from a single dashboard.

Managing mixed OS environments is an especially pressing concern for technology startups, which have been on the leading edge of adopting more relaxed BYOD policies.

IT administrators are facing increasingly complex concerns as they have less control over the machines that have full access to their company network. The security and efficiency of the network depends on the IT administrator's ability to roll out, update, and delete software.

Panorama9 makes it easy for IT administrators to track changes and update vulnerabilities across a mix of devices, applications, and operating systems. The tool automates all the tedious patch management activities, so companies can be sure every device is updated with the latest patches and has the very latest version of operating systems and third party applications.

"Mac and Windows have different and sometimes conflicting cultures. Windows machines are built for IT administrators to manage, whereas Macs are user-centric and don't require a middle-man," said Allan Thorvaldsen, CEO and co-founder of Panorama9. "We provide a middle layer that manages both worlds in a seamless way."

Panorama9 is built for today's mobile work reality. Administrators can use the

Panorama9 dashboard from anywhere, whether from a computer in the office or from a tablet or smartphone at home. Likewise, any employee device that accesses the company network can be monitored, even if the employee is at home or on the road.

Panorama9 is a pay-as-you-go subscription-based service, so there are no long-term contracts or commitments. Tiered pricing plans offer the right fit for businesses of all sizes. New users can sign up for a 30-day free trial and deploy within five minutes.

ABOUT PANORAMA9

Panorama9 is a cloud-based, IT management platform bundled into a single dashboard to show you everything about your company's assets, IT availability, security vulnerabilities, and non-compliant systems. Your organization can cut its IT costs through improved up-time without having an infrastructure to deploy or manage.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

CVE-2014-2392
Published: 2014-04-24
The E-Mail autoconfiguration feature in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 places a password in a GET request, which allows remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer log...

CVE-2014-2393
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in Open-Xchange AppSuite 7.4.1 before 7.4.1-rev11 and 7.4.2 before 7.4.2-rev13 allows remote attackers to inject arbitrary web script or HTML via a Drive filename that is not properly handled during use of the composer to add an e-mail attachment.

CVE-2011-5279
Published: 2014-04-23
CRLF injection vulnerability in the CGI implementation in Microsoft Internet Information Services (IIS) 4.x and 5.x on Windows NT and Windows 2000 allows remote attackers to modify arbitrary uppercase environment variables via a \n (newline) character in an HTTP header.

CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

Best of the Web