KACE Adds Patch and Remediation To Strengthen Patch Management For Endpoint SecurityKACE Adds Patch and Remediation To Strengthen Patch Management For Endpoint Security
The new technology is designed to improve patching support and add automated patch management to KBOX systems management appliances.
December 7, 2009
The new technology is designed to improve patching support and add automated patch management to KBOX systems management appliances.Patch management has always been a hassle for busy IT departments at small and midsize companies. If anything, the problem is getting worse. Adding new technology from Lumension technology is designed to give users of KACE appliances expanded patch management and fully automated detection and remediation:
Broadened patch coverage depth - inclucing support for Windows 7, Windows Server 2008 R2, Mac OS 10.6 and many kep applications
Extended international support with Japanese and simplified Chinese patch support for Windows.
Easy automated patching policies - critical patches are automatically released and applied across distributed IT environments
Dynamic group policies - integrating patch management with inventory, assets, and software distribution.
In a statement, Rich Hlavka, senior vice president of business development for Lumension, said, "While enterprises have large numbers of IT staff to proactively combat these new threats, SMBs are challenged with remaining agile while building a defense in depth approach with limited budget and resources." KACE has been working with Lumension for a couple years, but by including Lumension Patch and Remediation, Hlavka added, KACE now "offers depth and breadth of coverage and protection for all major applications and operating systems."
Rob Meinhardt, co-founder and CEO of KACE, added in a statement that KACE "is designed to dramatically simplify the patching process while at the same time ensuring customers automatically receive the most up-to-date patches saving IT administrators time and their organizations money."
More From bMighty:
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023