SlideShare a Scribd company logo
www.Seqrite.com
Centralized patch management solution for all
Microsoft application vulnerability patching
needs.
Seqrite Endpoint Security.
Patch Management : Overview
Technical Training Department
Quick Heal Technologies Ltd.
1
www.Seqrite.com
Contents
• What is Patch Management
• Why patching plays an important role in every organization’s security?
• Examples of incidents in which software vulnerabilities have been an enabler of security breaches
• How does Seqrite help?
• What can you do with SEPS Patch Management?
• Patch Management Reports
• Key Benefits of Patch Management
2
www.Seqrite.com
What is Patch Management
3
Patch Patch Management
A Patch is piece of software designed to
update computer applications, programs
to fix security vulnerabilities and other
bugs in order to improve the usability or
performance.
Patch management is the process of using a
strategy and plan of what patches should be
applied to which systems at a specified time.
www.Seqrite.com
Why Patching Plays a Crucial Role in Every
Organization’s Security?
4
www.Seqrite.com 5
“Enterprises that implement a vulnerability management
process will experience 90% fewer successful attacks...”
Gartner, Predictions for IT Security Directors in 2007
www.Seqrite.com 6
As per data published by CVE Details, in 2016 the most vulnerable Windows applications were Adobe Flash Player, Adobe
Reader, Adobe Acrobat, VLC media player, Oracle JRE(Java) and web browsers such as Firefox, IE etc.
Important Stats
www.Seqrite.com 7
Important Stats
www.Seqrite.com
MYTH REALITY
We’re protected since we already have a firewall
and an Intrusion Detection System.
Despite all the attention that firewalls, anti-virus applications and
Intrusion Detection System (IDS) receive, security vulnerabilities
still plague organizations.
Why patching plays an important role in every organization’s security?
Our Company isn’t a target for attacks
• If you look at recent events you will see, Ransomware like
WannaCry and Troldesh attacked enterprises and systems at
random, based on specific vulnerabilities.
• On the other hand, it is not just large enterprises that need to
be concerned about targeted attacks.
• Any organization can become the target of a disgruntled
employee, customer or contractor. So, it is important to move
beyond the “it can’t happen to me” feeling of security.
www.Seqrite.com 9
• Here they release software/ Operating System attackers & hackers out there looking for loopholes and vulnerabilities that will let
them in.
• The fact is no software or Operating system is bullet proof.
• Managing and updating software updates is a daunting challenge for enterprises.
Why patching plays an important role in every organization’s security?
www.Seqrite.com
Examples of incidents in which software vulnerabilities have been an enabler of security breaches
In 2016, there were 702 million attempts to launch an exploit – malware that uses bugs in software to infect devices with
additional malicious code like banking Trojans or ransomware. This is 24.54% more than in 2015.
The number of corporate users attacked by exploits increased 28.35% to reach more than 690,000, or 15.76 % of all users attacked
with exploits.
India ranks 10th in the list of Global Web Application Attack Source Countries while it is fourth on the list of top target countries
for web-application attacks, according to a new report by Akamai Technologies Inc., a global player in content delivery network.
www.Seqrite.com
Recent Security Breach due to Windows Vulnerability
Patch, patch and patch !
This has been the go-to mantra of security professionals and the recent WannaCry ransomware attack has highlighted its importance once
again. A large number of PCs worldwide were not patched with the latest update from Microsoft windows which led to the recent WannaCry
ransomware havoc worldwide.
What was the scenario?
• On Friday, 12 May 2017, over 200,000 computers across 150 countries including India were infected by the WannaCry ransomware attack.
• WannaCry is a ransomware that encrypts all the data files on the infected computers and asks users to pay 300 USD to restore the files. If the
ransom is not paid in three days it threatens to double the ransom amount.
• Solution offered by Microsoft: Update your OS else apply MS17-010 patch on computers.
Why did it happen? Microsoft had released patch for the same in March, 2017. However, systems that did not apply this patch were affected by the
WannaCry ransomware
Conclusion: Only those windows systems were affected by this Ransomware which were not patched by MS17-010 released by MS in Mar-17.This
scenario could have been avoided if Patch Management was placed in networks to patch-up the systems on a single click.
www.Seqrite.com
HOW
SEQRITE Endpoint Security Helps?
www.Seqrite.com
Seqrite EPS Patch Management
13
• Patch Management enables the centralized management for checking and installing the missing patches for the applications
installed in your network.
• Allows Administrator to download and apply only require patches on EPS Clients.
• Not mandatory to have WSUS configured in your organizational network , allows to download updates directly from Microsoft
Server.
• Can be deployed on same EPS Console System or on a separate system also.
• Not mandatory to have Network OS(Win Server OS) to deploy EPS PM Server, can be installed easily on either on Network OS or on
client OS also.
• Systematic reports availability on EPS Console Server about installed patched on endpoints.
• Can be configured and applied to groups and policies separately as per organizations requirement.
www.Seqrite.com
Patch Management: Overview
14
Patch Categorizations
Missing Patches
Automatic Installation
Critical
Important
Moderate
Low
Unspecified
Managing the Patch
Frequency
Exception
Helps to detect and install missing patches for Microsoft & Non –Microsoft Applications and Windows OS
Patches are categorized as per severity level, thus allowing to prioritize the patch install process
Vulnerability may allow code execution without user interaction.
Vulnerability may result in compromise of the confidentiality, integrity or availability of user data.
Impact of vulnerability is mitigated to a significant degree by factors such as authentication requirement or applicability only to non-default
configurations.
Impact of vulnerability is comprehensively mitigated by the characteristics of the affected component.
Vulnerability may result in random malfunctions.
Scheduling the frequency of patch scanning is possible. If any client is offline during the scheduled time a notification is sent.
Scheduling the system to automatically install missing patches is also possible.
In production or testing environment, there may be a requirement where operating system or applications are required in the unpatched
form. To facilitate this, patch install exclusion is provided where the admin can exclude endpoints from patch installation.
www.Seqrite.com
Patch Management- Reports
15
www.Seqrite.com
Patch Management- Key Benefits
16
Security: Patch Management helps to keep your network secure from malware attacker who targets software and OS vulnerabilities, by Auto
download of patches based on the severity.
Improves Productivity: Many times vendor bugs or unexpected crash of applications results into unwanted network downtime, Patch
Management helps to keep all these things at bay by downloading such fixes in the form of patches.
Compliance: Organizations need to be secure enough to be able to protect employee data, customer data etc. Unpatched applications are
vulnerable to attack, which may further result in business loss, penalties and fines. Patch Management enables the organization to meet the
compliance criteria.
Better utilization of IT Department: Manual process of Patching systems and applications takes too much and efforts of IT team, Patch
Management is an Automated Patching Tool which downloads and installs patches from centralized location. This helps to reduce the burden
of IT staff.
Endpoints are safeguarded against web based threats, these are threats which targets users while they are browsing the internet. Most of
these programs target operating systems and programs such as:
• Java
• Adobe Reader
• Windows OS and Internet Explorer
www.Seqrite.com
References
17
• http://www.deccanchronicle.com/technology/in-other-news/220417/number-of-attacks-using-software-
vulnerabilities-on-the-rise.html
• https://www.beyondtrust.com/
• https://www.cvedetails.com/
www.Seqrite.com
Thank You
18

More Related Content

PPTX
Next-Gen Security Solution: Gateway Protection
PPTX
Best practices to secure Windows10 with already included features
PPTX
Wannacry & Petya ransomware
PPTX
Anatomy of an Attack - Sophos Day Belux 2014
PDF
WannaCry Ransomware Attack: What to Do Now
PDF
Protecting Against Ransomware
PPTX
Ransomware: Can you protect against attacks?
PPTX
Integrated Tools in OSSIM
Next-Gen Security Solution: Gateway Protection
Best practices to secure Windows10 with already included features
Wannacry & Petya ransomware
Anatomy of an Attack - Sophos Day Belux 2014
WannaCry Ransomware Attack: What to Do Now
Protecting Against Ransomware
Ransomware: Can you protect against attacks?
Integrated Tools in OSSIM

What's hot (20)

PDF
Defending Servers - Cyber security webinar part 3
PDF
Enterprise security: ransomware in enterprise and corporate entities
PPTX
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
PPTX
Make Every Spin Count: Putting the Security Odds in Your Favor
PPTX
Cerdant Security State of the Union
PDF
Defending Workstations - Cyber security webinar part 2
PDF
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
PPTX
A Closer Look at Isolation: Hype or Next Gen Security?
PPTX
Thinking Differently About Security Protection and Prevention
PPTX
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
PDF
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
ODP
Web Application Firewall
PPTX
The Enemy Within: Organizational Insight Through the Eyes of a Webserver
PPTX
Web Application Vulnerabilities
PPTX
Automating Critical Security Controls for Threat Remediation and Compliance
PPT
Benefits of web application firewalls
PDF
Next Dimension and Veeam | Solutions for PIPEDA Compliance
PDF
Technical track kevin cardwell-10-00 am-solid-defense
PPTX
September 2012 Security Vulnerability Session
PPTX
Finding the source of Ransomware - Wire data analytics
Defending Servers - Cyber security webinar part 3
Enterprise security: ransomware in enterprise and corporate entities
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Make Every Spin Count: Putting the Security Odds in Your Favor
Cerdant Security State of the Union
Defending Workstations - Cyber security webinar part 2
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
A Closer Look at Isolation: Hype or Next Gen Security?
Thinking Differently About Security Protection and Prevention
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Web Application Firewall
The Enemy Within: Organizational Insight Through the Eyes of a Webserver
Web Application Vulnerabilities
Automating Critical Security Controls for Threat Remediation and Compliance
Benefits of web application firewalls
Next Dimension and Veeam | Solutions for PIPEDA Compliance
Technical track kevin cardwell-10-00 am-solid-defense
September 2012 Security Vulnerability Session
Finding the source of Ransomware - Wire data analytics
Ad

Similar to Centralized Patch Management - Proven Security Approach for Ransomware Protection (20)

PDF
Vulnerability , Malware and Risk
PDF
Vulnerability Malware And Risk
DOCX
Globally.docx
PDF
Patch management
PDF
INLINE_PATCH_PROXY_FOR_XEN_HYPERVISOR
PDF
Getting the Most Value from VM and Compliance Programs white paper
PDF
Ransomeware : A High Profile Attack
PPT
It's Your Move: The Changing Game of Endpoint Security
PDF
How Can I Reduce The Risk Of A Cyber-Attack?
PDF
Vulnerability and Patch Management
DOCX
Running head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docx
PDF
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
PDF
Vulnerability Management System
PDF
The uncool-security-hygiene
PDF
Veracode Corporate Overview - Print
PDF
Essentials of Web Application Security: what it is, why it matters and how to...
PPTX
SAM05_Barber PW (7-9-15)
PDF
Your Datacenter at risk? – Patching for the Datacenter
PDF
ProjectReport_Finalversion
PDF
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Vulnerability , Malware and Risk
Vulnerability Malware And Risk
Globally.docx
Patch management
INLINE_PATCH_PROXY_FOR_XEN_HYPERVISOR
Getting the Most Value from VM and Compliance Programs white paper
Ransomeware : A High Profile Attack
It's Your Move: The Changing Game of Endpoint Security
How Can I Reduce The Risk Of A Cyber-Attack?
Vulnerability and Patch Management
Running head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docx
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
Vulnerability Management System
The uncool-security-hygiene
Veracode Corporate Overview - Print
Essentials of Web Application Security: what it is, why it matters and how to...
SAM05_Barber PW (7-9-15)
Your Datacenter at risk? – Patching for the Datacenter
ProjectReport_Finalversion
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Ad

More from Quick Heal Technologies Ltd. (20)

PDF
Digital Threat Landscape
PDF
Cybersecurity in Banking Sector
PDF
31 Internet Security Tips on CyberSecurity Month Ocotober
PDF
How a Ransomware Infects your Computer [INFOGRAPHIC]
PPT
Protecting Your organization from WannaCry Ransomware
PPTX
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
PPTX
Is Antivirus (AV) Dead or Just Missing in Action
PPT
Safeguard your enterprise against ransomware
PDF
Data Security in Healthcare
PPTX
GITEX 2016, Dubai
PPTX
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
PPTX
Maharashtra Cooperative Summit 2016
PPTX
Seqrite Hyderabad Meet 2016
PPTX
Seqrite CXO Meet, Ahmedabad, India
PPTX
PPTX
Seqrite Launch Event in Athens, Greece.
PPTX
BFSI Leadership Summit, Mumbai
PPTX
Jnana Sangama Day 1 - National convention for higher education
PPTX
Event S-Mart Milan, Italy - May 2016
PPTX
Event S-Mart 2016 Florence, Italy - April 2016
Digital Threat Landscape
Cybersecurity in Banking Sector
31 Internet Security Tips on CyberSecurity Month Ocotober
How a Ransomware Infects your Computer [INFOGRAPHIC]
Protecting Your organization from WannaCry Ransomware
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Is Antivirus (AV) Dead or Just Missing in Action
Safeguard your enterprise against ransomware
Data Security in Healthcare
GITEX 2016, Dubai
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Maharashtra Cooperative Summit 2016
Seqrite Hyderabad Meet 2016
Seqrite CXO Meet, Ahmedabad, India
Seqrite Launch Event in Athens, Greece.
BFSI Leadership Summit, Mumbai
Jnana Sangama Day 1 - National convention for higher education
Event S-Mart Milan, Italy - May 2016
Event S-Mart 2016 Florence, Italy - April 2016

Recently uploaded (20)

PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPT
Teaching material agriculture food technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Approach and Philosophy of On baking technology
Building Integrated photovoltaic BIPV_UPV.pdf
Electronic commerce courselecture one. Pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Dropbox Q2 2025 Financial Results & Investor Presentation
Digital-Transformation-Roadmap-for-Companies.pptx
Understanding_Digital_Forensics_Presentation.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Empathic Computing: Creating Shared Understanding
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Teaching material agriculture food technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Modernizing your data center with Dell and AMD
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
NewMind AI Monthly Chronicles - July 2025
Unlocking AI with Model Context Protocol (MCP)
Spectral efficient network and resource selection model in 5G networks
Chapter 3 Spatial Domain Image Processing.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
The Rise and Fall of 3GPP – Time for a Sabbatical?
Approach and Philosophy of On baking technology

Centralized Patch Management - Proven Security Approach for Ransomware Protection

  • 1. www.Seqrite.com Centralized patch management solution for all Microsoft application vulnerability patching needs. Seqrite Endpoint Security. Patch Management : Overview Technical Training Department Quick Heal Technologies Ltd. 1
  • 2. www.Seqrite.com Contents • What is Patch Management • Why patching plays an important role in every organization’s security? • Examples of incidents in which software vulnerabilities have been an enabler of security breaches • How does Seqrite help? • What can you do with SEPS Patch Management? • Patch Management Reports • Key Benefits of Patch Management 2
  • 3. www.Seqrite.com What is Patch Management 3 Patch Patch Management A Patch is piece of software designed to update computer applications, programs to fix security vulnerabilities and other bugs in order to improve the usability or performance. Patch management is the process of using a strategy and plan of what patches should be applied to which systems at a specified time.
  • 4. www.Seqrite.com Why Patching Plays a Crucial Role in Every Organization’s Security? 4
  • 5. www.Seqrite.com 5 “Enterprises that implement a vulnerability management process will experience 90% fewer successful attacks...” Gartner, Predictions for IT Security Directors in 2007
  • 6. www.Seqrite.com 6 As per data published by CVE Details, in 2016 the most vulnerable Windows applications were Adobe Flash Player, Adobe Reader, Adobe Acrobat, VLC media player, Oracle JRE(Java) and web browsers such as Firefox, IE etc. Important Stats
  • 8. www.Seqrite.com MYTH REALITY We’re protected since we already have a firewall and an Intrusion Detection System. Despite all the attention that firewalls, anti-virus applications and Intrusion Detection System (IDS) receive, security vulnerabilities still plague organizations. Why patching plays an important role in every organization’s security? Our Company isn’t a target for attacks • If you look at recent events you will see, Ransomware like WannaCry and Troldesh attacked enterprises and systems at random, based on specific vulnerabilities. • On the other hand, it is not just large enterprises that need to be concerned about targeted attacks. • Any organization can become the target of a disgruntled employee, customer or contractor. So, it is important to move beyond the “it can’t happen to me” feeling of security.
  • 9. www.Seqrite.com 9 • Here they release software/ Operating System attackers & hackers out there looking for loopholes and vulnerabilities that will let them in. • The fact is no software or Operating system is bullet proof. • Managing and updating software updates is a daunting challenge for enterprises. Why patching plays an important role in every organization’s security?
  • 10. www.Seqrite.com Examples of incidents in which software vulnerabilities have been an enabler of security breaches In 2016, there were 702 million attempts to launch an exploit – malware that uses bugs in software to infect devices with additional malicious code like banking Trojans or ransomware. This is 24.54% more than in 2015. The number of corporate users attacked by exploits increased 28.35% to reach more than 690,000, or 15.76 % of all users attacked with exploits. India ranks 10th in the list of Global Web Application Attack Source Countries while it is fourth on the list of top target countries for web-application attacks, according to a new report by Akamai Technologies Inc., a global player in content delivery network.
  • 11. www.Seqrite.com Recent Security Breach due to Windows Vulnerability Patch, patch and patch ! This has been the go-to mantra of security professionals and the recent WannaCry ransomware attack has highlighted its importance once again. A large number of PCs worldwide were not patched with the latest update from Microsoft windows which led to the recent WannaCry ransomware havoc worldwide. What was the scenario? • On Friday, 12 May 2017, over 200,000 computers across 150 countries including India were infected by the WannaCry ransomware attack. • WannaCry is a ransomware that encrypts all the data files on the infected computers and asks users to pay 300 USD to restore the files. If the ransom is not paid in three days it threatens to double the ransom amount. • Solution offered by Microsoft: Update your OS else apply MS17-010 patch on computers. Why did it happen? Microsoft had released patch for the same in March, 2017. However, systems that did not apply this patch were affected by the WannaCry ransomware Conclusion: Only those windows systems were affected by this Ransomware which were not patched by MS17-010 released by MS in Mar-17.This scenario could have been avoided if Patch Management was placed in networks to patch-up the systems on a single click.
  • 13. www.Seqrite.com Seqrite EPS Patch Management 13 • Patch Management enables the centralized management for checking and installing the missing patches for the applications installed in your network. • Allows Administrator to download and apply only require patches on EPS Clients. • Not mandatory to have WSUS configured in your organizational network , allows to download updates directly from Microsoft Server. • Can be deployed on same EPS Console System or on a separate system also. • Not mandatory to have Network OS(Win Server OS) to deploy EPS PM Server, can be installed easily on either on Network OS or on client OS also. • Systematic reports availability on EPS Console Server about installed patched on endpoints. • Can be configured and applied to groups and policies separately as per organizations requirement.
  • 14. www.Seqrite.com Patch Management: Overview 14 Patch Categorizations Missing Patches Automatic Installation Critical Important Moderate Low Unspecified Managing the Patch Frequency Exception Helps to detect and install missing patches for Microsoft & Non –Microsoft Applications and Windows OS Patches are categorized as per severity level, thus allowing to prioritize the patch install process Vulnerability may allow code execution without user interaction. Vulnerability may result in compromise of the confidentiality, integrity or availability of user data. Impact of vulnerability is mitigated to a significant degree by factors such as authentication requirement or applicability only to non-default configurations. Impact of vulnerability is comprehensively mitigated by the characteristics of the affected component. Vulnerability may result in random malfunctions. Scheduling the frequency of patch scanning is possible. If any client is offline during the scheduled time a notification is sent. Scheduling the system to automatically install missing patches is also possible. In production or testing environment, there may be a requirement where operating system or applications are required in the unpatched form. To facilitate this, patch install exclusion is provided where the admin can exclude endpoints from patch installation.
  • 16. www.Seqrite.com Patch Management- Key Benefits 16 Security: Patch Management helps to keep your network secure from malware attacker who targets software and OS vulnerabilities, by Auto download of patches based on the severity. Improves Productivity: Many times vendor bugs or unexpected crash of applications results into unwanted network downtime, Patch Management helps to keep all these things at bay by downloading such fixes in the form of patches. Compliance: Organizations need to be secure enough to be able to protect employee data, customer data etc. Unpatched applications are vulnerable to attack, which may further result in business loss, penalties and fines. Patch Management enables the organization to meet the compliance criteria. Better utilization of IT Department: Manual process of Patching systems and applications takes too much and efforts of IT team, Patch Management is an Automated Patching Tool which downloads and installs patches from centralized location. This helps to reduce the burden of IT staff. Endpoints are safeguarded against web based threats, these are threats which targets users while they are browsing the internet. Most of these programs target operating systems and programs such as: • Java • Adobe Reader • Windows OS and Internet Explorer