"More than ever, patch management is a critical part of IT operations. Enterprises cannot just rely on Microsoft's monthly patch updates for their entire patch maintenance strategy," says John Nielsen, a product manager at Fiberlink. Nielsen says the service also covers common applications from vendors like Apple, Adobe and Sun.
The case for cloud-based patch deployment
IT administrators are already aware of how dangerous it is not to keep security software and patches up to date, but Fiberlink is nonetheless hammering home the message about the perils of inadequate patch management because it sees a disconnect between the knowledge of the danger and actual IT practices.
At issue may be enterprise IT policies that only focus on operating system patches and fail to take into account Java, QuickTime and other common apps in the enterprise today. But when malware infects those applications, it can send a ripple throughout the enterprise. Fiberlink is pointing to industry research to bolster its case for keeping software and patches current.
For example, the Ponemon Institute reports that the cost of a data breach increased to $6.75 million in 2009. And the Quant Patch Management Survey reveals that 50 percent of enterprises do not have a formal patch-management process, 54 percent do not measure compliance with patch-management policies and 68 percent do not track patch time-to-deployment.
Microsoft moved to the cloud in 2014, and, as a result, Office 365 is taking off. Now, Okta customers are connecting to Office 365 in increasing numbers. This eGuide explains why IT departments should plan and deploy solutions around identity and mobility management in concert with their Office 365 roll out to get maximum user adoption. more
For most companies, Active Directory (AD) or Lightweight Directory Access Protocol (LDAP) play a central role in coordinating identity and access management policies. When on-premise applications are integrated to Active Directory or LDAP, users get the best possible experience. That's why Okta's cloud-based identity and access management service provides a highly useful single integration point. more
In the 1980s and 1990s, business applications and data were largely confined within and protected by a Local Area Network (LAN). The 2000s introduced a significant change. Download this white paper now to learn why the shift to the cloud is changing how companies think about and manage their IT infrastructure. more
With more and more businesses adopting Software-as-a-Service (SaaS) applications, enterprise IT is fundamentally changing. This whitepaper presents the eight biggest Identity and Access Management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them. more