Insight
Energie Management
Winselect
Anti Spyware
PC Sheriff
Faronics Deploy
Active Administrator
WinInstall
MailStore
Lumension Security
Deep Freeze
Faronics Cloud








 
Printversion

PatchLink Developers Kit


Create and Deploy Custom Remediation Content
Threats and configuration problems are coming at you faster and via more avenues than ever before. Zero-day threats are now a weekly reality. PC config-related issues present constant workload to administrators and help desk alike. Getting ahead of these, and other PC-related issues, has always been a moving target until now.
With PatchLink Developers Kit, you can quickly and easily create intelligent change packages that can dynamically identify and correct a variety of problems from simple configuration issues to blocking Zero-day threats – proactively. Once created, these packages can be seamlessly uploaded into your PatchLink Update repository for automatic deployment, continuous validation, and ongoing status reporting. By employing PatchLink Developers Kit in conjunction with PatchLink Update, you can:
- Enforce Configuration Policies
- Respond to Zero-day Threats
- Distribute Software and Data

 

PatchLink Enterprise Reporting

 

Powerful Business Intelligence for Your Vulnerability Management Process

The expanding influence of security legislation and the increased need to demonstrate compliance with internal polices are causing corporate governance and risk management to become a top priority for business worldwide. Senior executives need timely, accurate vulnerability management analysis and reporting to help assess business risk and manage compliance.

PatchLink Enterprise Reporting is a fully customizable, centralized business intelligence solution that enables organizations utilizing PatchLink Update to consolidate security data from across the enterprise, assess business risk through powerful data analysis, and demonstrate security policy and regulatory compliance status through flexible, customized reporting.

 

PatchLink Security Management Console

 

Consolidated Vulnerability Management

Effectively managing the onslaught of threats targeting today’s large, complex networks often requires a large number of IT professionals deploying disparate point solutions across multiple locations. This requirement of process and technology increases security management costs and reduces your ability to enforce global policies or generate compliance audit information.

The PatchLink Security Management Console delivers centralized command and control of your entire vulnerability management process - network discovery, agent deployment, vulnerability assessment, threat remediation, audit and reporting - all from a single, central location. The Security Management Console is a role-based security management interface that can direct multiple PatchLink Scan assessment and/or PatchLink Update remediation engines, enabling uniform policy enforcement and enterprise-wide compliance report generation.

- Enterprise Security Visibility
- Centralized Policy Enforcement
- Aggregate Policy Compliance Reporting
- Improved Operational Efficiency

 

PatchLink Scan

 

Accurate and Thorough Network-Based Threat Assessment

With more than 30,000 known software vulnerabilities¹ and countless configuration and access point threats, identifying all of the risks to your network can seem overwhelming. Certified network-based scanner that will identify and display all assets and potential threats in your environment, quickly and with absolute precision.

- Complete identification and inventory of all devices on the network
- Accurate scans of all devices for software and configuration-based vulnerabilities
- Risk-based prioritization of identified threats
- Continuously updated vulnerability database for orderly remediation
- Comprehensive reports of scan results

 

PatchLink Update

 

Automated Collection, Delivery and Auditing of Security Patches

With major software vendors now reporting more than 8,000 vulnerabilities each year¹, eradicating all of the potential threats to your network is a daunting task. PatchLink Update delivers a cost-effective way to quickly, accurately and securely deliver and monitor software patches throughout your network.

PatchLink Update, ranked the #1 selling patch and vulnerability management solution² for 3 consecutive years, is trusted by customers worldwide to protect their heterogeneous networks. With its patented Digital Fingerprinting™ Technology, PatchLink Update enables you to:

Reduce corporate risk through the timely, proactive elimination of operating system and application vulnerabilities.
Decrease IT costs and improve productivity with a highly automated, subscription-based patch management solution.
Eliminate recurring risks through 'patch drift'
Demonstrate compliance with security policies and government regulations through continuous patch monitoring and comprehensive reporting.
1. Carnegie Mellon University's Computer Emergency Response Team (CERT) reported 8,064 published vulnerabilities between 1995 and 2006
2. Worldwide Security and Vulnerability Management Software 2007-2011 Forecast and Analysis. IDC

 

PatchLink NAC Integrator

 

Automated Remediation for your Network Access Control Solution
PatchLink NAC Integrator™ delivers seamless integration of PatchLink Update’s market-leading vulnerability policy enforcement and remediation into your existing network access control (NAC) solution. Through established integrations with leading NAC vendors and support for all major industry standards, PatchLink NAC Integrator ensures that devices blocked by your access control solution are quickly and automatically reformed back into policy compliance, allowing end-users to quickly gain access to the resources and information they need to remain productive.

"NAC, in its most comprehensive implementation, holds the promise of significantly strengthening an enterprise's security posture by controlling network access for both managed and unmanaged devices."
Christian A. Christiansen – IDC Program VP, Security Products and Services

 

Sanctuary Application Control

 

Eliminate Malware by Controlling Application Use

The battle to protect your network from malware can seem insurmountable. One anti-virus vendor expects to identify its 400,000th threat in early 2008. Unfortunately, anti-virus applications alone cannot control the problem. Out of the 99% of enterprises with anti-virus protection, 62% still suffered a malware infection¹. And analysts estimate that by the end of 2007, 75 percent of enterprises were infected with financially motivated, targeted malware that evaded traditional perimeter and host defenses².

Sanctuary Application Control provides granular, policy-based enforcement of application use to proactively secure endpoints from data leakage, malware, spyware, keyloggers, Trojans, rootkits, worms and viruses, zero-day threats and unwanted or unlicensed software.

Eliminates the reliance on anti-virus subscription updates to secure your business
Enforces software license compliance, Sarbanes Oxley, HIPAA and GLBA and many other regulatory requirements
Enables application monitoring to avoid propagation of illegal, malicious or unwanted code on your endpoints
Prevents unauthorized application use throughout your organization
Allows you to test and plan patch deployment with no rush
Benefit from Standard File Definitions to rapidly load a predefined set of authorized OS and most commonly used applications. To import Sanctuary Standard File Definitions, click here.

1 – Yankee Group, 2005 Security Leaders and Laggards Survey
2 – Gartner Research, “Gartner’s Top Predictions for IT Organizations and Users, 2007 and Beyond,”, Daryl C. Plummer, December 1, 2006

 

Sanctuary Device Control

 

Control Peripheral Devices to Eliminate Data Leakage

The proliferation of data loss due to the inappropriate or sometimes criminal use of removable media devices has reached alarming levels. According to recent security reports, 75 percent of Fortune 1000 companies fell victim to data leakage in 2006¹, with an average cost of recovery that exceeded $5,000,000².

Sanctuary Device Control eliminates data loss from removable devices through the policy-based enforcement of device use to control the flow of inbound and outbound data from your endpoints. Sanctuary Device Control ensures security that:

- Controls and manages any I/O devices through any ports including USB, Firewire, WIFI, Bluetooth, etc.
- Prevents data theft / data leakage
- Prevents malware introduction via removable media
- Audits I/O Device usage
- Blocks USB Keyloggers
- Encrypts removable media
- Enables Regulatory Compliance