Analytics
12/3/2013
03:14 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Shavlik Joins Microsoft System Center Alliance Program

Shavlik solidifies company's vision to support System Center 2012 R2 Configuration Manager

MINNEAPOLIS, Dec. 3, 2013 /PRNewswire/ -- Shavlik, a business unit of LANDesk Software, and a recognized leader in agentless patch management capabilities, announced today that it has joined the Microsoft System Center Alliance Program.

As the first company to provide third-party patches to Microsoft System Center

2012 R2 Configuration Manager customers, Shavlik has continued to refine its popular SCUPdates product and add supplementary products to enhance the features of Microsoft System Center Configuration Manager. By joining the System Center Alliance, Shavlik is reaffirming its commitment to its customers.

"Shavlik is thrilled to be part of the Microsoft System Center Alliance Program," said Marshall Smith, Vice President of Partnering and Operations for Shavlik. "We have patched Microsoft and third-party applications since the beginnings of Shavlik and we plan to continue empowering our customers with our popular SCUPdates, Management Intelligence, and additional Shavlik products that add value to System Center customers. Our membership in the Alliance will help us continue to foster the communication required to shape and refine our products and to meet the needs of our mutual customers."

Building on Shavlik's recognized expertise in patch detection and deployment, SCUPdates has the ability to extend the reach of System Center Configuration Manager beyond current Microsoft products to patch today's most attacked applications. SCUPdates takes advantage of the System Center Configuration Manager workflow and does not require the installation of an application or agent for deployment. By syncing with Shavlik SCUPdates, System Center Configuration Manager customers have a single System Center Configuration Manager workflow for deploying updates for Microsoft operating systems, Microsoft applications, and non-Microsoft applications.

"System Center 2012 R2, with its trailblazing functionality, provides a solid foundation for third parties such as Shavlik to build on and add value for customers," said Brian Hillger, Director, Product Marketing, Microsoft Corp.

"With SCUPdates, Shavlik is helping customers keep third-party applications patched and secure with consistent accuracy and ease-of-use. Microsoft is pleased to welcome Shavlik into the System Center Alliance."

In addition to SCUPdates, Shavlik has products to patch the datacenter, track and manage software licenses, and manage mobile devices that are designed to enhance the end-user experience and expand System Center Configuration Manager beyond its current feature set.

A free trial version of SCUPdates and other Shavlik products is available for evaluation on the Shavlik website and through select resellers.

About Shavlik

Shavlik is a pioneer in agentless patch management and a leader in innovative network security and management solutions. Since 1993, Shavlik has been at the forefront of patch security, first by providing the only third-party patch management to Microsoft System Center Configuration Manager customers and later asserting industry leadership in the patching of virtual machines. Its products and solutions include Shavlik Protect, Shavlik SCUPdates, and Management Intelligence. Shavlik's "Just Add Water and Stir" approach allows customers to get up and running in as little as thirty minutes.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web