Login  |  Register  |  Contact

New Paper: Implementing and Managing Patch and Configuration Management

If you recall the Endpoint Security Management Buyer’s Guide, we identified 4 specific controls typically used to manage the security of endpoints, and divided them into periodic and ongoing controls. That paper is designed to help identify what is important, and guide you through the buying process. At the end of that process you face a key question: What now? It is time to implement and manage your new toys, so this paper provides a series of processes and practices for successfully implementing and managing patch and configuration management tools.

alt textThis paper goes into the implementation steps (Preparation, Integrating and Deploying Technology, Configuring and Deploying Policies, and Ongoing Management) in depth, focusing on what you need to know in order to get the job done. Implementing and managing patch and configuration management doesn’t need to be intimidating, so we focus on making quick and valuable progress, using a sustainable process.

We thank Lumension Security for licensing this research, and enabling us to distribute it to readers at no cost.

Check out the paper in our Research Library or download the PDF directly.

If you want to check out the original posts, here’s an index:

  1. Introduction
  2. Preparation
  3. Integrate and Deploy Technologies
  4. Defining Policies
  5. Patch Management Operations
  6. Configuration Management Operations
  7. Leveraging the Platform

—Mike Rothman

No Related Posts
Previous entry: Incite 11/28/2012: Meet the Masters | | Next entry: Friday Summary: November 29, 2012


If you like to leave comments, and aren't a spammer, register for the site and email us at info@securosis.com and we'll turn off moderation for your account.



Remember my personal information

Notify me of follow-up comments?