I have two suggestions- I used Shavlik tools for many years, mostly NetChkProtect. This does agentless credentialed scans (although I think they also have agents if needed) for a wide variety of products (including Citrix, BES, VMWare, Mozilla, all the Adobe crap, and much more) from a central console, reports on what needs to be updated, and can push the patches (AND pull them back if they bork something). It can also be used to deploy supported software- like pushing Firefox out to desktops. Almost everything can be scheduled, and many things can be automated. It is easy to set up, especially for small environments, but can be plugged into bigger environments well, too. I have installed and run it from a laptop for remediation situations. Free trial available, does some anti-spyware and AV now, too. Shavlik did the original tools for MS, and MS still uses them. Even if you don't use Shavlik, their patch management newsletter may be of interest. (Yes, I'm an Eric Schulte/Shavlik fanboy)
Also, I have not used it myself, but a lot of people like BigFix, and there are a ton of great people working there. It is (or can be) more of a full-blown systems management suite, but it is available in components. I think there is a bit of base infrastructure required, but BigFix can find missing patches and push them out among many other things. It doesn't seem to be in near as many small environments as Shavlik, but if I were headed back into a patching role they would be on my short list. As far as others, I don't know what has happened to Patchlink since they became Lumension, but if you are really exploring alternatives, they are probably worth a look. There are also a few scanners which report on what's missing, some like Secunia offer links and wizards, but it sounds like you want something that is a true upgrade from WSUS that will find the problem, report it, and fix it- for that, I really would look at Shavlik and BigFix. Jack -- ______________________________________ Jack Daniel, Reluctant CISSP http://twitter.com/jack_daniel http://www.linkedin.com/in/jackadaniel http://blog.uncommonsensesecurity.com On Fri, Sep 4, 2009 at 8:12 PM, Jody & Jennifer McCluggage<[email protected]> wrote: > Hello everyone, > > > > A few episodes ago Carlos made the excellent observation that many > organizations do not have a centrally controlled automated strategy for > patching 3rd party (non-Microsoft) applications on Windows. He correctly > pointed out that Microsoft/Windows Update and WSUS does not patch 3rd party > applications. As late as last year, the number one application attack > vector was Office. But according to one recent survey, this year the number > one application attack vector were made up of some ubiquitous Adobe products > (probably not a surprise to anyone here) so obviously patching only > Microsoft products is no longer a viable solution. > > Does anyone have any recommendations of any products (commercial or open > source) that are appropriate for small to mid-size organizations that can > centrally deliver approved 3rd party application patches to Windows > machines? > > > Thank you, > > > Jody > > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com > _______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
