We just recently received the "offcial" letter from IBM about the Tivoli 
integration.  Currently there hasn't been any change so I can't speak about the 
change yet as it hasn't really changed the product at this point.

Jeremy Pommerening
CISSP,GCFA,GPEN,GAWN,GCFW,
MCSE Win2K, MCSE NT4

--- On Fri, 2/11/11, mike p <[email protected]> wrote:


From: mike p <[email protected]>
Subject: Re: [Pauldotcom] 3rd party application patching tools for Windows
To: "PaulDotCom Security Weekly Mailing List" <[email protected]>
Date: Friday, February 11, 2011, 8:26 AM


Sorry to (attempt to) resuscitate this old thread, but do folks have any 
updates from their experiences with Bigfix after their Tivoli integration, or 
new info on Secunia CSI?


Thanks,
Mike


On Tue, Sep 8, 2009 at 7:59 PM, Jody & Jennifer McCluggage 
<[email protected]> wrote:

Thanks Jack.  The NetChkProtect software looks promising.  I will download
the trial and give it a try.  Another issue that we run into with 3rd party
software is that even if that particular software does allow for automatic
updates (still not an ideal solution for an organization - no central
control or validation)is that many times those updates will not install if
the end-user is not running as a local administrator.

Thanks


-----Original Message-----
From: [email protected]

[mailto:[email protected]] On Behalf Of Jack Daniel
Sent: Saturday, September 05, 2009 7:36 AM
To: PaulDotCom Security Weekly Mailing List



Subject: Re: [Pauldotcom] 3rd party application patching tools for Windows

I have two suggestions-

I used Shavlik tools for many years, mostly NetChkProtect.  This does
agentless credentialed scans (although I think they also have agents
if needed) for a wide variety of products (including Citrix, BES,
VMWare, Mozilla, all the Adobe crap, and much more) from a central
console, reports on what needs to be updated, and can push the patches
(AND pull them back if they bork something).  It can also be used to
deploy supported software- like pushing Firefox out to desktops.
Almost everything can be scheduled, and many things can be automated.
It is easy to set up, especially for small environments, but can be
plugged into bigger environments well, too.  I have installed and run
it from a laptop for remediation situations.  Free trial available,
does some anti-spyware and AV now, too.  Shavlik did the original
tools for MS, and MS still uses them.  Even if you don't use Shavlik,
their patch management newsletter may be of interest.  (Yes, I'm an
Eric Schulte/Shavlik fanboy)

Also, I have not used it myself, but a lot of people like BigFix, and
there are a ton of great people working there.  It is (or can be) more
of a full-blown systems management suite, but it is available in
components.  I think there is a bit of base infrastructure required,
but BigFix can find missing patches and push them out among many other
things.  It doesn't seem to be in near as many small environments as
Shavlik, but if I were headed back into a patching role they would be
on my short list.

As far as others, I don't know what has happened to Patchlink since
they became Lumension, but if you are really exploring alternatives,
they are probably worth a look.  There are also a few scanners which
report on what's missing, some like Secunia offer links and wizards,
but it sounds like you want something that is a true upgrade from WSUS
that will find the problem, report it, and fix it- for that, I really
would look at Shavlik and BigFix.

Jack


--
______________________________________
Jack Daniel, Reluctant CISSP
http://twitter.com/jack_daniel
http://www.linkedin.com/in/jackadaniel
http://blog.uncommonsensesecurity.com





On Fri, Sep 4, 2009 at 8:12 PM, Jody & Jennifer
McCluggage<[email protected]> wrote:
> Hello everyone,
>
>
>
> A few episodes ago Carlos made the excellent observation that many
> organizations do not have a centrally controlled automated strategy for
> patching 3rd party (non-Microsoft) applications on Windows.  He correctly
> pointed out that Microsoft/Windows Update and WSUS does not patch 3rd
party
> applications.  As late as last year, the number one application attack
> vector was Office.  But according to one recent survey, this year the
number
> one application attack vector were made up of some ubiquitous Adobe
products
> (probably not a surprise to anyone here) so obviously patching only
> Microsoft products is no longer a viable solution.
>
> Does anyone have any recommendations of any products (commercial or open
> source) that are appropriate for small to mid-size organizations that can
> centrally deliver approved 3rd party application patches to Windows
> machines?
>
>
> Thank you,
>
>
> Jody
>
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
>
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

No virus found in this incoming message.
Checked by AVG - www.avg.com
Version: 8.5.409 / Virus Database: 270.13.78/2347 - Release Date: 09/05/09
05:51:00




_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com


-----Inline Attachment Follows-----


_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com


 
____________________________________________________________________________________
We won't tell. Get more on shows you hate to love 
(and love to hate): Yahoo! TV's Guilty Pleasures list.
http://tv.yahoo.com/collections/265 
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to