SlideShare a Scribd company logo
AGENTLESS PATCH MANAGEMENT FOR
THE DATA CENTER
Chris Goettl, Director of Product Management, Security
CIS #3: Continuous
Vulnerability Management
The first 5 controls
I n v e n t o r y o f A u t h o r i z e d a n d U n a u t h o r i z e d D e v i c e s
I n v e n t o r y o f A u t h o r i z e d a n d U n a u t h o r i z e d S o f t w a r e
S e c u r e C o n f i g u r a t i o n
C o n t i n u o u s V u l n e r a b i l i t y A s s e s s m e n t a n d R e m e d i a t i o n
C o n t r o l l e d U s e o f A d m i n i s t r a t i v e P r i v i l e g e s
CIS, US-CERT, ASD, and other authorities prioritize these five elements of cyber hygiene to significantly
reduce security threats.
CIS Control 3: Continuous Vulnerability Management
Continuously acquire, assess, and take action on new information in order to
identify vulnerabilities, remediate, and minimize the window of opportunity for
attackers.
Why Is This CIS Control Critical?
When researchers report new vulnerabilities, a race starts among all
parties, including: attackers (to “weaponize”, deploy an attack, exploit);
vendors (to develop, deploy patches or signatures and updates), and
defenders (to assess risk, regression-test patches, install). Cyber
defenders must operate in a constant stream of new information:
software updates, patches, security advisories, threat bulletins, etc.
Understanding and managing vulnerabilities has become a continuous
activity, requiring significant time, attention, and resources.
Rise in Vulnerabilities
2016 2017 20192018
• 16555 CVEs
• Average Time to Patch
34 days
• Only 7% of CVEs were
exploited
• 14714 CVEs• 6447 CVEs
• Average Time to Patch
100 to 120 days
• Expect continued in
crease in CVEs
• Target Time to Patch
14 days
Exploited Zero Day
Public Disclosure
Unknown Vulnerabilities
0-2 Weeks
Rising Risk
Day Zero
Update
Releases
2-4 Weeks
50% of exploits
have occurred
40-60 Days
90% of exploits
have occurred
120 Days
BlueKeep Timeline
14, May, 2019
CVE-2019-0708
Update Available
15, May, 2019
PoC research begins
Social Media Trackers
GitHub Trackers
20, May, 2019
BSOD achieved
28, May, 2019
Active Scanning of public systems
White Hats and Black Hats
6 security research teams confirmed they have
achieved exploit of BlueKeep
14 Days
Challenges of the
DataCenter
Challenges of Patch Management in the DataCenter
Need to manage
physical and virtual
systems, Windows
and Linux
Patch by priority from
Security Team
Complex Requirements
from system complexity
and system owners
How can Ivanti Help?
Agentless
Scan and
Patching
For Windows
(Ideal for
DataCenter)
Integration with
VMware (Offline VM,
Template Support)
Easily
Scheduled
Patch Rollout
API for
Automation
 Integration
▪ Agentless or Agent for
Windows
▪ Cloud Agent (Follow the
user)
▪ Fast time to value
▪ Vmware Integration
(Offline VM, Template,
Snapshot)
▪ CVE Import
▪ Largest Windows
catalog on the market
1 2
▪ PowerShell based API
▪ Script Complex
Workloads (Clusters,
Tiered Applications,
Etc)
▪ Integrate with other
solutions (Vulnerability
Vendors like Rapid 7,
Qualys, BeyondTrust)
1 2
Demo
What’s Next?
Crowdsource Test Data
Better Risk Metrics for Prioritization
Repository of Known Issues
Quickly Understand Reliability Vs Risk
Thank You

More Related Content

PPTX
Ivanti - Continuous Vulnerability Management
PPT
Consensus Audit Guidelines 2008
PPTX
One login enemy at the gates
PPTX
Global CISO Forum 2017: How To Measure Anything In Cybersecurity Risk
PDF
Vulnerability Management Program
PDF
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
PPTX
Challenges of Vulnerability Management
PPTX
Vulnerability management today and tomorrow
Ivanti - Continuous Vulnerability Management
Consensus Audit Guidelines 2008
One login enemy at the gates
Global CISO Forum 2017: How To Measure Anything In Cybersecurity Risk
Vulnerability Management Program
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Challenges of Vulnerability Management
Vulnerability management today and tomorrow

What's hot (19)

PPTX
Machine learning cyphort_malware_most_wanted
PDF
Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
PDF
Vulnerability Management: How to Think Like a Hacker to Reduce Risk
PDF
Incident Response
PDF
Vulnerability Management
PDF
Risk bridges business and security
PDF
10 Steps to Building an Effective Vulnerability Management Program
PDF
Risk Management Metrics That Matter
PPTX
Vulnerability Management Nirvana - Seattle Agora - 18Mar16
PDF
7 cyber security questions for boards
PPTX
Vulnerability Management: What You Need to Know to Prioritize Risk
PDF
Incident response
PDF
Blue Coat Infographic: Proactive Incident response
PDF
Survey Says! 2017 Shrink Data Results
PDF
INCIDENT RESPONSE OVERVIEW
PDF
Medical Device Threat Modeling with Templates
PDF
ARES Next-Gen Risk Management Platform
PDF
Next Generation Endpoint Prtection Buyers Guide
PDF
OSB340: Disrupting an Advanced Attack
Machine learning cyphort_malware_most_wanted
Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
Vulnerability Management: How to Think Like a Hacker to Reduce Risk
Incident Response
Vulnerability Management
Risk bridges business and security
10 Steps to Building an Effective Vulnerability Management Program
Risk Management Metrics That Matter
Vulnerability Management Nirvana - Seattle Agora - 18Mar16
7 cyber security questions for boards
Vulnerability Management: What You Need to Know to Prioritize Risk
Incident response
Blue Coat Infographic: Proactive Incident response
Survey Says! 2017 Shrink Data Results
INCIDENT RESPONSE OVERVIEW
Medical Device Threat Modeling with Templates
ARES Next-Gen Risk Management Platform
Next Generation Endpoint Prtection Buyers Guide
OSB340: Disrupting an Advanced Attack
Ad

Similar to Agentless Patch Management for the Data Center (20)

PPTX
How to Perform Continuous Vulnerability Management
PPTX
Protect Against 85% of Cyberattacks
PDF
Security operations center 5 security controls
PPTX
Frustrated with Vulnerability Assessments you must put your Blood, Sweat, and...
PPTX
Cyber Security Defense by vulnerability mgmt nov 11 2015
PPTX
SecureWorld Seattle Vulnerability Mgmt Nov 11 2015
PPTX
Symantec and ForeScout Delivering a Unified Cyber Security Solution
PDF
Bit defender ebook_secmonitor_print
PPTX
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
PPTX
The Threat Is Real. Protect Yourself.
PDF
Turtles, Trust and The Future of Cybersecurity
PDF
Unveiling the Latest Threat Intelligence Practical Strategies for Strengtheni...
PPTX
Patch Management Best Practices 2019
PPTX
CynergisTek’s Ransomware Bootcamp
PPTX
Ransomware Bootcamp with CTEK and GroupSense
PPTX
Information Security and Data Breach Trends 2014-2015
PPTX
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
PDF
Vulnerability and Patch Management
PDF
Should I Patch My ICS?
PPTX
Data Breaches: Is IBM i Really at Risk?
How to Perform Continuous Vulnerability Management
Protect Against 85% of Cyberattacks
Security operations center 5 security controls
Frustrated with Vulnerability Assessments you must put your Blood, Sweat, and...
Cyber Security Defense by vulnerability mgmt nov 11 2015
SecureWorld Seattle Vulnerability Mgmt Nov 11 2015
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Bit defender ebook_secmonitor_print
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
The Threat Is Real. Protect Yourself.
Turtles, Trust and The Future of Cybersecurity
Unveiling the Latest Threat Intelligence Practical Strategies for Strengtheni...
Patch Management Best Practices 2019
CynergisTek’s Ransomware Bootcamp
Ransomware Bootcamp with CTEK and GroupSense
Information Security and Data Breach Trends 2014-2015
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Vulnerability and Patch Management
Should I Patch My ICS?
Data Breaches: Is IBM i Really at Risk?
Ad

More from Ivanti (20)

PDF
August Patch Tuesday
PDF
Français Patch Tuesday - Juillet
PDF
July Patch Tuesday
PDF
Français Patch Tuesday - Juin
PDF
June Patch Tuesday
PDF
Français Patch Tuesday - Mai
PDF
May Patch Tuesday
PDF
Français Patch Tuesday - Avril
PDF
April Patch Tuesday
PDF
Français Patch Tuesday - Mars
PDF
March Patch Tuesday
PDF
Français Patch Tuesday - Février
PDF
February Patch Tuesday
PDF
Patch Tuesday de Diciembre
PDF
Français Patch Tuesday - Décembre
PDF
Patch Tuesday Italia Dicembre
PDF
December Patch Tuesday
PDF
Patch Tuesday de Noviembre
PDF
Français Patch Tuesday - Novembre
PDF
Patch Tuesday Italia Novembre
August Patch Tuesday
Français Patch Tuesday - Juillet
July Patch Tuesday
Français Patch Tuesday - Juin
June Patch Tuesday
Français Patch Tuesday - Mai
May Patch Tuesday
Français Patch Tuesday - Avril
April Patch Tuesday
Français Patch Tuesday - Mars
March Patch Tuesday
Français Patch Tuesday - Février
February Patch Tuesday
Patch Tuesday de Diciembre
Français Patch Tuesday - Décembre
Patch Tuesday Italia Dicembre
December Patch Tuesday
Patch Tuesday de Noviembre
Français Patch Tuesday - Novembre
Patch Tuesday Italia Novembre

Recently uploaded (20)

PDF
The Internet -By the Numbers, Sri Lanka Edition
DOCX
Unit-3 cyber security network security of internet system
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
E -tech empowerment technologies PowerPoint
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPTX
innovation process that make everything different.pptx
PPTX
Funds Management Learning Material for Beg
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
Digital Literacy And Online Safety on internet
PDF
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
artificial intelligence overview of it and more
The Internet -By the Numbers, Sri Lanka Edition
Unit-3 cyber security network security of internet system
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
The New Creative Director: How AI Tools for Social Media Content Creation Are...
E -tech empowerment technologies PowerPoint
Slides PDF The World Game (s) Eco Economic Epochs.pdf
international classification of diseases ICD-10 review PPT.pptx
presentation_pfe-universite-molay-seltan.pptx
innovation process that make everything different.pptx
Funds Management Learning Material for Beg
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
An introduction to the IFRS (ISSB) Stndards.pdf
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Digital Literacy And Online Safety on internet
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
Design_with_Watersergyerge45hrbgre4top (1).ppt
WebRTC in SignalWire - troubleshooting media negotiation
Unit-1 introduction to cyber security discuss about how to secure a system
Introuction about WHO-FIC in ICD-10.pptx
artificial intelligence overview of it and more

Agentless Patch Management for the Data Center

  • 1. AGENTLESS PATCH MANAGEMENT FOR THE DATA CENTER Chris Goettl, Director of Product Management, Security
  • 3. The first 5 controls I n v e n t o r y o f A u t h o r i z e d a n d U n a u t h o r i z e d D e v i c e s I n v e n t o r y o f A u t h o r i z e d a n d U n a u t h o r i z e d S o f t w a r e S e c u r e C o n f i g u r a t i o n C o n t i n u o u s V u l n e r a b i l i t y A s s e s s m e n t a n d R e m e d i a t i o n C o n t r o l l e d U s e o f A d m i n i s t r a t i v e P r i v i l e g e s CIS, US-CERT, ASD, and other authorities prioritize these five elements of cyber hygiene to significantly reduce security threats.
  • 4. CIS Control 3: Continuous Vulnerability Management Continuously acquire, assess, and take action on new information in order to identify vulnerabilities, remediate, and minimize the window of opportunity for attackers. Why Is This CIS Control Critical? When researchers report new vulnerabilities, a race starts among all parties, including: attackers (to “weaponize”, deploy an attack, exploit); vendors (to develop, deploy patches or signatures and updates), and defenders (to assess risk, regression-test patches, install). Cyber defenders must operate in a constant stream of new information: software updates, patches, security advisories, threat bulletins, etc. Understanding and managing vulnerabilities has become a continuous activity, requiring significant time, attention, and resources.
  • 5. Rise in Vulnerabilities 2016 2017 20192018 • 16555 CVEs • Average Time to Patch 34 days • Only 7% of CVEs were exploited • 14714 CVEs• 6447 CVEs • Average Time to Patch 100 to 120 days • Expect continued in crease in CVEs • Target Time to Patch 14 days Exploited Zero Day Public Disclosure Unknown Vulnerabilities 0-2 Weeks Rising Risk Day Zero Update Releases 2-4 Weeks 50% of exploits have occurred 40-60 Days 90% of exploits have occurred 120 Days
  • 6. BlueKeep Timeline 14, May, 2019 CVE-2019-0708 Update Available 15, May, 2019 PoC research begins Social Media Trackers GitHub Trackers 20, May, 2019 BSOD achieved 28, May, 2019 Active Scanning of public systems White Hats and Black Hats 6 security research teams confirmed they have achieved exploit of BlueKeep 14 Days
  • 8. Challenges of Patch Management in the DataCenter Need to manage physical and virtual systems, Windows and Linux Patch by priority from Security Team Complex Requirements from system complexity and system owners
  • 9. How can Ivanti Help? Agentless Scan and Patching For Windows (Ideal for DataCenter) Integration with VMware (Offline VM, Template Support) Easily Scheduled Patch Rollout API for Automation Integration
  • 10. ▪ Agentless or Agent for Windows ▪ Cloud Agent (Follow the user) ▪ Fast time to value ▪ Vmware Integration (Offline VM, Template, Snapshot) ▪ CVE Import ▪ Largest Windows catalog on the market 1 2
  • 11. ▪ PowerShell based API ▪ Script Complex Workloads (Clusters, Tiered Applications, Etc) ▪ Integrate with other solutions (Vulnerability Vendors like Rapid 7, Qualys, BeyondTrust) 1 2
  • 12. Demo
  • 15. Better Risk Metrics for Prioritization

Editor's Notes

  • #4: We at Ivanti look to security frameworks like the Center for Internet Security’s Critical Security Controls to help prioritize our efforts and maximize our customers benefits. The CIS framework provides a lot of industry best practices and guidance for securing your organization. What we like most about CIS framework is the prioritized guidance. If you start at the beginning and work your way through you will maximize your effectiveness with each step. Here you can see just the first five controls. These controls are key controls which should be implemented in every organization for essential cyber defense readiness. (Click) For the purposes of this conversation we are going to focus on Continuous Vulnerability Assessment and Remediation Continuously acquire, assess, and take action on new information in order to identify vulnerabilities, remediate, and minimize the window of opportunity for attackers. This control encompasses efforts of both the Security and Operations teams and a combination of solutions including Vulnerability Assessment and Patch Management solutions. Depending on the level of sophistication of your process today this could also include SOAR and SIEM solutions, but often there is a rather large gap from identification and prioritization of a vulnerability to remediation.