Alpha Generation Distribution Ltd is a 4SEC Group Company
Follow us on Twitter Follow us on LinkedIn
Call us on: 01777 852222

Patching Alone Leaves Your Business Unprotected. Here’s Why.

Patching Alone Leaves Your Business Unprotected. Here's Why.

According to the Flexera Vulnerability Review, 17,147 software vulnerabilities were discovered in 2016. The number of ‘highly critical’ vulnerabilities grew from 13% to 18%, a worrying upward trend that suggests the threat is getting bigger every day.

With a threat on this scale, effective Software Vulnerability Management (SVM) and patching should be obvious. Keeping your applications safe is as essential as your firewall and antivirus software. But while many IT teams understand the necessity of patching, that’s just part of the picture.

Truly effective cyber security doesn’t stop – or start – with patching. Keeping data and systems safe means prioritising a more comprehensive approach to vulnerabilities.

What effective patching can do to eliminate vulnerabilities

The Microsoft Security Intelligence Report tells us that the number of times a vulnerability is exploited grows exponentially, reaching a peak around two months after disclosure. It’s obvious, then, that fast and effective patching can dramatically reduce your exposure.

Much has been done to encourage regular patching of first-party software, like Microsoft’s attempts to make the release of updates predictable and structured through Patch Tuesday. Many organisations bring their third-party patching into the same structured model, packaging and deploying third-party patches whenever they’re available.

Patch Management – whether manual or automated – can ensure that available patches are applied as soon as possible. This reduces the period of exposure to a potential breach. However, Patch Management doesn’t solve the wider software vulnerability problem.

Where patch management alone falls short

Effective Patch Management depends on a number of prerequisites. Long before applying a patch, IT teams need:

  • To know all the third-party software on the network
  • To know a vulnerability exists
  • To prioritise which patches and updates should be deployed first

What’s more, Patch Management depends on a patch being available. When so many organisations continue to use End of Life software, that’s not always a realistic expectation.

Packaging and deploying patches is the final step in a process. Software Vulnerability Management is the series of steps that get you to that point.

How Software Vulnerability Management helps

Forget patches for a moment – Software Vulnerability Management is concerned with every vulnerability, regardless of whether a patch is actually available.

When it is vulnerabilities that pose the threat, that seems like a more sensible place to start.

Effective Software Vulnerability Management helps you take stock of all the applications on your estate, then get alerted to known vulnerabilities. Crucially, these alerts are accompanied by practical intelligence that explains the nature of the vulnerability and rates its criticality. In the case of Flexera Corporate Software Inspector, that intelligence comes from Secunia Research – the established leader in software vulnerability intelligence.

As a result, you can build a more accurate picture of your current risks and make more informed decisions about the areas where your software is vulnerable and, yes, how you might eventually patch.

Bringing SVM and PM together

Patch Management and up-to-date software can keep your applications secure. But Software Vulnerability Management plays a vital role in telling you which applications you have, which threats you are facing, and how you can prioritise your patching.

Patch Management without Software Vulnerability Management is like plastering an arm without taking an x-ray. Even the best remedies are ineffective without proper diagnosis.

Learn how Flexera brings PM and SVM together

Learn how Flexera brings PM and SVM together