SlideShare uma empresa Scribd logo
1 de 13
The ROI of Patch Management
For MSPs and End Customers
© 2014 N-able Technologies, Inc. All rights reserved.
Welcome to the Webcast
• Presenters
 Ryan Vallee, Product Manager
• This is an interactive presentation
 Feel free to interrupt and ask questions. No need to wait
until the end.
© 2013 N-able Technologies, Inc. All rights reserved.© 2014 N-able Technologies, Inc. All rights reserved.
Agenda
 Talking to Customers About Patch Management
 Positioning Patch
 Where are the Missing Patches
 What are the Consequences?
 The Cost of Patching (or Not)
 Windows® Patching & 3rd Party Patching
 Patch Manager™ Architecture
 Demo
© 2014 N-able Technologies, Inc. All rights reserved.
Positioning Patch
Customers Say The Truth
Windows updates itself. 3rd party software is the most common
primary infection vector for computers
with Internet access.1
If we hear of a problem, we can
patch for it then.
Patching takes time and exploits move
quickly. Can you always be sure you will
have the time to react? There are more
people with exploit skills around the world
more attacks being aimed at SMBs than
ever before.2
We can run antivirus. Individually compromised systems are
usually designed to spread their exploits
quickly – and software vulnerabilities can’t
be caught by an AV program.
© 2014 N-able Technologies, Inc. All rights reserved.
1. Unpatched Applications Are #1 Cyber Security Risk
2. Hackers increasingly zero in on small businesses, Symantec
says
Where are the Missing Patches?
Internet-connected Systems
Operating systems, web servers, applications, systems connected to
your network at all times, and just periodically
Internal Servers
Operating systems, databases, applications
Workstations & Laptops
Operating systems, browsers, applications
Smartphones, iPads, etc.
Operating systems, browsers, apps
Unpatched Systems: An Ethical Hacker's View
© 2014 N-able Technologies, Inc. All rights reserved.
Consequences?
Information Theft
• Loss of competitive advantage
• Loss of stored assets ($ or IP)
• Legal action
Malware Infection
• Remediation costs
• Participation in botnet
• Spread of infection
Unauthorized control of systems
• Corporate espionage
• Corruption of information
Denial of service
• Downtime
• Loss of trust
Taken in part from Unpatched Systems: An Ethical
Hacker's View
© 2014 N-able Technologies, Inc. All rights reserved.
Consistent Consequences
• Reputational loss
• Downtime
• Impacted revenue & productivity
The Cost of Patching
It’s Easy to Make the Case for Patching Software
Manual Patching = (Hours x Rate x Systems) + (Patch Failure% x (Hours x Rate x
Systems)) = Cost to Patch3
This assumes a failure rate of 0 (unlikely) and no consequences from the applied
patches (also unlikely).
© 2014 N-able Technologies, Inc. All rights reserved.
3. A Patch in Time: Considering automated patch management
Machines (desktops, laptops,
servers)
25 50 100
Time spent
patching/system/month
3 hours 3 3
Billable rate/hour 100 100 100
Cost/month $7,500 $15,000 $30,000
Windows® Patching
© 2014 N-able Technologies, Inc. All rights reserved.
3rd Party Patching
© 2014 N-able Technologies, Inc. All rights reserved.
Adobe Air
Adobe Reader®
Adobe Flash® ActiveX
Adobe Flash Plugin
Adobe Shockwave®
Citrix Receiver
Foxit® Reader
Mozilla® Firefox®
Google® Chrome™
Google Earth™
iTunes®
Opera
QuickTime
Notepad ++
Safari®
SeaMonkey ®
Skype®
Thunderbird®
VLC® Media Player
WinRAR®
WinZip
Yahoo® Messenger
In most cases, patches are applied in the
language of the installed application.
Patch Architecture
© 2014 N-able Technologies, Inc. All rights reserved.
DEMO
© 2014 N-able Technologies, Inc. All rights reserved.
Thank You for Attending
• Questions? sales@n-able.com
• Sign up for a free trial of N-central® or Patch
Manager® at N-able.com
• Visit our blog at blogs.n-able.com
• After the webcast – these slides & the
webcast will be available on SlideShare® –
www.slideshare.net/N-ableSlides
© 2014 N-able Technologies, Inc. All rights reserved.© 2014 N-able Technologies, Inc. All rights reserved.
Legal Information
The N-ABLE TECHNOLOGIES and N-CENTRAL marks are the exclusive property of N-able
Technologies, Inc. and its affiliates, are registered with the U.S. Patent and Trademark Office and
the Canadian Intellectual Property Office, and may be registered or pending registration in
other countries. All other N-able trademarks, service marks, and logos may be common law
marks, registered or pending registration in the United States, Canada, or in other countries. All
other trademarks mentioned herein are used for identification purposes only and may be or are
trademarks or registered trademarks of their respective companies.
© 2014 N-able Technologies, Inc. All rights reserved.© 2014 N-able Technologies, Inc. All rights reserved.

Mais conteúdo relacionado

Mais de Solarwinds N-able

How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksSolarwinds N-able
 
Pricing and packaging for MSPs
Pricing and packaging for MSPsPricing and packaging for MSPs
Pricing and packaging for MSPsSolarwinds N-able
 
N central 10 1 launch webinar
N central 10 1 launch webinarN central 10 1 launch webinar
N central 10 1 launch webinarSolarwinds N-able
 
3 ways to optimize it business management
3 ways to optimize it business management3 ways to optimize it business management
3 ways to optimize it business managementSolarwinds N-able
 
Advance your business using Report Manager
Advance your business using Report ManagerAdvance your business using Report Manager
Advance your business using Report ManagerSolarwinds N-able
 
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...Solarwinds N-able
 
Insight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service OfferingsInsight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service OfferingsSolarwinds N-able
 
How secure are your customers.pptx
How secure are your customers.pptxHow secure are your customers.pptx
How secure are your customers.pptxSolarwinds N-able
 
N central 10 - AutoTask PSA Integration
N central 10 - AutoTask PSA IntegrationN central 10 - AutoTask PSA Integration
N central 10 - AutoTask PSA IntegrationSolarwinds N-able
 
The how and why of patch management
The how and why of patch managementThe how and why of patch management
The how and why of patch managementSolarwinds N-able
 
Getting the most out of your ConnectWise Integration with N-central
Getting the most out of your ConnectWise Integration with N-centralGetting the most out of your ConnectWise Integration with N-central
Getting the most out of your ConnectWise Integration with N-centralSolarwinds N-able
 
June 09 - build recurring revenue from reactive customers
June 09  -  build recurring revenue from reactive customersJune 09  -  build recurring revenue from reactive customers
June 09 - build recurring revenue from reactive customersSolarwinds N-able
 
RMM 101 part 3 -- analysis and reporting
RMM 101 part 3 -- analysis and reportingRMM 101 part 3 -- analysis and reporting
RMM 101 part 3 -- analysis and reportingSolarwinds N-able
 
RMM 101 -- Workstation Management
RMM 101 -- Workstation ManagementRMM 101 -- Workstation Management
RMM 101 -- Workstation ManagementSolarwinds N-able
 
Automation -- Increase Your Customers Without Increasing Headcount
Automation -- Increase Your Customers Without Increasing HeadcountAutomation -- Increase Your Customers Without Increasing Headcount
Automation -- Increase Your Customers Without Increasing HeadcountSolarwinds N-able
 
N-able and Arcserve® talk Backup and Recovery
N-able and Arcserve® talk Backup and RecoveryN-able and Arcserve® talk Backup and Recovery
N-able and Arcserve® talk Backup and RecoverySolarwinds N-able
 

Mais de Solarwinds N-able (20)

How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware Attacks
 
Pricing and packaging for MSPs
Pricing and packaging for MSPsPricing and packaging for MSPs
Pricing and packaging for MSPs
 
N central 10 1 launch webinar
N central 10 1 launch webinarN central 10 1 launch webinar
N central 10 1 launch webinar
 
3 ways to optimize it business management
3 ways to optimize it business management3 ways to optimize it business management
3 ways to optimize it business management
 
Advance your business using Report Manager
Advance your business using Report ManagerAdvance your business using Report Manager
Advance your business using Report Manager
 
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...
 
MSP Manager Launch Webinar
MSP Manager Launch WebinarMSP Manager Launch Webinar
MSP Manager Launch Webinar
 
Insight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service OfferingsInsight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service Offerings
 
How secure are your customers.pptx
How secure are your customers.pptxHow secure are your customers.pptx
How secure are your customers.pptx
 
Social Media for the MSP
Social Media for the MSPSocial Media for the MSP
Social Media for the MSP
 
5 challenges infographic
5 challenges infographic5 challenges infographic
5 challenges infographic
 
N central 10 - AutoTask PSA Integration
N central 10 - AutoTask PSA IntegrationN central 10 - AutoTask PSA Integration
N central 10 - AutoTask PSA Integration
 
The how and why of patch management
The how and why of patch managementThe how and why of patch management
The how and why of patch management
 
Getting the most out of your ConnectWise Integration with N-central
Getting the most out of your ConnectWise Integration with N-centralGetting the most out of your ConnectWise Integration with N-central
Getting the most out of your ConnectWise Integration with N-central
 
June 09 - build recurring revenue from reactive customers
June 09  -  build recurring revenue from reactive customersJune 09  -  build recurring revenue from reactive customers
June 09 - build recurring revenue from reactive customers
 
RMM 101 part 3 -- analysis and reporting
RMM 101 part 3 -- analysis and reportingRMM 101 part 3 -- analysis and reporting
RMM 101 part 3 -- analysis and reporting
 
Rmm101 server management
Rmm101 server managementRmm101 server management
Rmm101 server management
 
RMM 101 -- Workstation Management
RMM 101 -- Workstation ManagementRMM 101 -- Workstation Management
RMM 101 -- Workstation Management
 
Automation -- Increase Your Customers Without Increasing Headcount
Automation -- Increase Your Customers Without Increasing HeadcountAutomation -- Increase Your Customers Without Increasing Headcount
Automation -- Increase Your Customers Without Increasing Headcount
 
N-able and Arcserve® talk Backup and Recovery
N-able and Arcserve® talk Backup and RecoveryN-able and Arcserve® talk Backup and Recovery
N-able and Arcserve® talk Backup and Recovery
 

Último

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

The ROI of Patch Management

  • 1. The ROI of Patch Management For MSPs and End Customers © 2014 N-able Technologies, Inc. All rights reserved.
  • 2. Welcome to the Webcast • Presenters  Ryan Vallee, Product Manager • This is an interactive presentation  Feel free to interrupt and ask questions. No need to wait until the end. © 2013 N-able Technologies, Inc. All rights reserved.© 2014 N-able Technologies, Inc. All rights reserved.
  • 3. Agenda  Talking to Customers About Patch Management  Positioning Patch  Where are the Missing Patches  What are the Consequences?  The Cost of Patching (or Not)  Windows® Patching & 3rd Party Patching  Patch Manager™ Architecture  Demo © 2014 N-able Technologies, Inc. All rights reserved.
  • 4. Positioning Patch Customers Say The Truth Windows updates itself. 3rd party software is the most common primary infection vector for computers with Internet access.1 If we hear of a problem, we can patch for it then. Patching takes time and exploits move quickly. Can you always be sure you will have the time to react? There are more people with exploit skills around the world more attacks being aimed at SMBs than ever before.2 We can run antivirus. Individually compromised systems are usually designed to spread their exploits quickly – and software vulnerabilities can’t be caught by an AV program. © 2014 N-able Technologies, Inc. All rights reserved. 1. Unpatched Applications Are #1 Cyber Security Risk 2. Hackers increasingly zero in on small businesses, Symantec says
  • 5. Where are the Missing Patches? Internet-connected Systems Operating systems, web servers, applications, systems connected to your network at all times, and just periodically Internal Servers Operating systems, databases, applications Workstations & Laptops Operating systems, browsers, applications Smartphones, iPads, etc. Operating systems, browsers, apps Unpatched Systems: An Ethical Hacker's View © 2014 N-able Technologies, Inc. All rights reserved.
  • 6. Consequences? Information Theft • Loss of competitive advantage • Loss of stored assets ($ or IP) • Legal action Malware Infection • Remediation costs • Participation in botnet • Spread of infection Unauthorized control of systems • Corporate espionage • Corruption of information Denial of service • Downtime • Loss of trust Taken in part from Unpatched Systems: An Ethical Hacker's View © 2014 N-able Technologies, Inc. All rights reserved. Consistent Consequences • Reputational loss • Downtime • Impacted revenue & productivity
  • 7. The Cost of Patching It’s Easy to Make the Case for Patching Software Manual Patching = (Hours x Rate x Systems) + (Patch Failure% x (Hours x Rate x Systems)) = Cost to Patch3 This assumes a failure rate of 0 (unlikely) and no consequences from the applied patches (also unlikely). © 2014 N-able Technologies, Inc. All rights reserved. 3. A Patch in Time: Considering automated patch management Machines (desktops, laptops, servers) 25 50 100 Time spent patching/system/month 3 hours 3 3 Billable rate/hour 100 100 100 Cost/month $7,500 $15,000 $30,000
  • 8. Windows® Patching © 2014 N-able Technologies, Inc. All rights reserved.
  • 9. 3rd Party Patching © 2014 N-able Technologies, Inc. All rights reserved. Adobe Air Adobe Reader® Adobe Flash® ActiveX Adobe Flash Plugin Adobe Shockwave® Citrix Receiver Foxit® Reader Mozilla® Firefox® Google® Chrome™ Google Earth™ iTunes® Opera QuickTime Notepad ++ Safari® SeaMonkey ® Skype® Thunderbird® VLC® Media Player WinRAR® WinZip Yahoo® Messenger In most cases, patches are applied in the language of the installed application.
  • 10. Patch Architecture © 2014 N-able Technologies, Inc. All rights reserved.
  • 11. DEMO © 2014 N-able Technologies, Inc. All rights reserved.
  • 12. Thank You for Attending • Questions? sales@n-able.com • Sign up for a free trial of N-central® or Patch Manager® at N-able.com • Visit our blog at blogs.n-able.com • After the webcast – these slides & the webcast will be available on SlideShare® – www.slideshare.net/N-ableSlides © 2014 N-able Technologies, Inc. All rights reserved.© 2014 N-able Technologies, Inc. All rights reserved.
  • 13. Legal Information The N-ABLE TECHNOLOGIES and N-CENTRAL marks are the exclusive property of N-able Technologies, Inc. and its affiliates, are registered with the U.S. Patent and Trademark Office and the Canadian Intellectual Property Office, and may be registered or pending registration in other countries. All other N-able trademarks, service marks, and logos may be common law marks, registered or pending registration in the United States, Canada, or in other countries. All other trademarks mentioned herein are used for identification purposes only and may be or are trademarks or registered trademarks of their respective companies. © 2014 N-able Technologies, Inc. All rights reserved.© 2014 N-able Technologies, Inc. All rights reserved.

Notas do Editor

  1. With all the security vulnerabilities and exploits in the news – people are unlikely to say it won’t happen to them. Folks know they are at risk.
  2. In reality, failed patches will not get applied or more billable hours will be spent trying to sort them out. It also assumes no consequences from the applied patches – also unlikely. Manual patching is so labor intensive and proactive, it often just doesn’t get done. One note – when we talk about automating patches – we’re talking about partial automation. There’s still some manual work but it will be greatly reduced. There’s the concept of “automating” the management of patches through a centralized tool that takes away the need to manage patches on a per-system basis, or via multiple independent patch monitors from each vendor. This is a good form of automation for patch management.   And there’s the concept of “automating” the entire process of patching such that the human element is completely removed from the process. This is a bad form of automation for patch management, because patch quality has not yet reached the point where we can operate a patch management environment in a total “set it and forget it” mentality.  
  3. Approve & manage patches through the N-central console. Reduce time to deploy & install patches. Approve or decline patches at a device, group, or system level. Conserve bandwidth. Use the detailed reporting to show status to customers.