If you recall the Endpoint Security Management Buyer’s Guide, we identified 4 specific controls typically used to manage the security of endpoints, and divided them into periodic and ongoing controls. That paper is designed to help identify what is important, and guide you through the buying process. At the end of that process you face a key question: What now? It is time to implement and manage your new toys, so this paper provides a series of processes and practices for successfully implementing and managing patch and configuration management tools.

This paper goes into the implementation steps (Preparation, Integrating and Deploying Technology, Configuring and Deploying Policies, and Ongoing Management) in depth, focusing on what you need to know in order to get the job done. Implementing and managing patch and configuration management doesn’t need to be intimidating, so we focus on making quick and valuable progress, using a sustainable process.

We thank Lumension Security for licensing this research, and enabling us to distribute it to readers at no cost.

Check out the paper in our Research Library or download the PDF directly.

If you want to check out the original posts, here’s an index:

  1. Introduction
  2. Preparation
  3. Integrate and Deploy Technologies
  4. Defining Policies
  5. Patch Management Operations
  6. Configuration Management Operations
  7. Leveraging the Platform