Autonomous patching solution for Windows applications

Autonomous patching solution for Windows applications

Share post

Adaptiva Endpoint Patch is the first patching solution of its kind that continuously patches third-party applications on Windows devices without human intervention and in the most complex IT environments.

Adaptiva, provider of endpoint management and security solutions, has released a public preview of Endpoint Patch, the first autonomous patching solution for third-party Windows applications. Endpoint Patch is the beginning of a new era in endpoint management because it intelligently automates and accelerates the entire patching process - from the identification of available patches, through automatic testing and approval by those responsible, to company-wide distribution.

Patch management without a human manager

“We took a radically different approach to patching than usual, schematizing the administrator's strategic intentions and connecting them to sophisticated models of the company's business units and patching processes. As soon as these models are ready, the metadata flows from the Adaptiva CDNs and the patching runs at a controlled, adapted speed - independently configured based on objective risk and vulnerability assessments," explains Dr. Deepak Kumar, Founder and CEO of Adaptiva. "The underlying premise is quite simple: humans should define the strategy and the process, and the software should do the rest."

Endpoint Patch updates third-party applications on Windows without human intervention at the speed and scale that businesses need. The solution offers completely new functions that allow administrators to focus on strategy and modeling the desired state even in the most complex environments. As a result, they will no longer have to bother with patching, while hackers will have a hard time finding vulnerabilities in applications that they can exploit.

Endpoint Patch features

  • "Set and forget" principle: Customizable patching strategies automate the entire patching process for each third party. Administrators set a patch strategy once and then never have to think about it again.
  • Full Visibility and Control: Reports and monitoring dashboards show real-time progress and allow administrators to pause, restart, rollback, or even accelerate patch deployment to achieve consistent and reliable results and meet strict SLAs.
  • Unlimited Scalability: The powerful Adaptiva Edge Platform ensures that patches are delivered to all devices, regardless of their location and network connection, more reliably and efficiently than with any other orchestration engine.
  • Continuous Metadata Flow: Metadata for all of an organization's third-party applications flows continuously from the Adaptiva CDN, so patches are automatically deployed when they become available, based on risk and exposure assessments.
  • Flexible patch distribution: Thanks to the innovative content distribution engine, companies can distribute unlimited patches at any time without impacting network bandwidth or productivity.
  • Strengthen Unified Endpoint Management: Endpoint Patch works flexibly with any unified endpoint management and dramatically improves the performance of solutions like Microsoft Intune and VMware Workspace One by ensuring content is fully delivered to every device.

Patching is still one of the most important tasks for IT departments to protect company infrastructures. However, studies show that companies are only getting unsatisfactory results with the current generation of tools, since 60 percent of data breaches in the past two years could have been prevented if the systems were patched in time. The high complexity of the infrastructures and patch processes leads to delays and patch backlogs.

Endpoint maintenance is otherwise considered to be time-consuming

Despite the automation promised by many patch management vendors, 62 percent of respondents said in a survey that maintaining new versions of operating systems and applications across all endpoints is the hardest part for them. Time is of the essence, as 54 percent of respondents had experienced an average of five attacks on their organization in the past year, at an average annual cost of $1,8 million.

More at Adaptiva.com

 


About Adaptiva​

Adaptiva provides serverless endpoint management that eliminates the need for extensive IT infrastructure. The system monitors itself by automating previously manual tasks. Leveraging innovative peer-to-peer protocols, the Adaptiva Edge Platform utilizes the excess capacity of devices already on the network - in the office or when working from home.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more