Patch Management Tools for Manufacturing Thursday Morning, Feb 7th. Troy Embree Procter & Gamble
|
|
|
- Sherman Morris
- 10 years ago
- Views:
Transcription
1 Patch Management Tools for Manufacturing Thursday Morning, Feb 7th Troy Embree Procter & Gamble
2 Patch Management Tools for Manufacturing Troy Embree, P&G Introduction Patch Deployment Tools What features are available What features are missing for manufacturing Building the required features into the patch deployment application Benefits & Lessons Learned Benefits e of MS MUG Patch working group 2
3 P&G Background 3 Global Business Units Beauty & Health Household Care Gillette 144 plants in 43 countries 103 Brands 23 Brands >Billion $US Support a variety of different control system manufactures IT functionality outsourced 3 billion times a day, P&G brands touch the lives of people around the world 3
4 Do we really need another tool? Why not use the same tool as IT uses for office computers? Lacked Flexibility Control what, when, and how updates are applied Lacked Visibility Was combined with other features that were not needed Resulting in a high price No knowledge of control o system applications 4
5 Patch Deployment Many tools are available to assist with the deployment of updates BigFix, WSUS, Kaseya, PatchQuest, NetChk Protect, etc. Each provides many beneficial features Centralized Deployment Reporting Support for Multiple OS Support for Application Updates Inventory Minimal impact to the network Minimal impact to client computer Granular Ga ua control to of what, when, & how it is updated 5
6 Patch Deployment for Control System Devices None of the tools available are geared for use with manufacturing applications Inventory tools do not automatically identify control system software Do not indicate if the update has been approved by the control system vendor Geared for local deployment or for enterprise deployment with centralized management 6
7 Our Approach Existing patch management tools are customizable Partnered with Interstates Control Systems Incorporated To configure and maintain the control system functionality within the Patch Management tool To maintain and provide support for the patch management application itself Choice of partner is important Need to understand both Control Systems Information Technology 7
8 Control System Customization Control System Customization Defined our control systems in the patch management software Allows users to easily know what control system applications are deployed on a computer Created baselines of vendor approved software Allows users to easily know what updates have been approved by our vendors Created sites to allow each manufacturing site to operate as if their computers and users were the only ones in the system 8
9 Benefits End users can easily apply the vendor approved patches to systems running the vendor software End users are more efficient Do not need to individually monitor all the control system vendors Do not need to build their own list of what computers contain what software Results in more computers kept up to date with their required patches in a faster time period 9
10 Lessons Learned More than one patch management tool was adequate to meet our needs All required configuration to meet our needs in manufacturing Would have cost less if the expense of configuration could be spread across several companies Via a patch management company building the features into the solution Via a 3 rd party that t acts as a common integrator 10
11 How can participation in MSMug help? Informal benchmarking with other companies Combined voice Can change our control system vendors behaviors May be able to attract Patch Management companies to providing control system functionality inherently in their applications 11
12 Thank You For more information, contact Troy Embree at 12
Security Patch Management and MSMUG. Bill Cotter 3M
Security Patch Management and MSMUG Thursday Morning, Feb 7th Bill Cotter 3M MsMUG Today s Structure Consumer and Office Business Display Graphics Business Electro and Communications Business Health Care
Patch and Vulnerability Management Program
Patch and Vulnerability Management Program What is it? A security practice designed to proactively prevent the exploitation of IT vulnerabilities within an organization To reduce the time and money spent
Improve Your Business Through Best Practice IT Management. A White Paper Prepared for Kaseya September 2007
A White Paper Prepared for Kaseya September 2007 Table of Contents Executive Summary...1 Introduction...1 The Role of Best Practices in Managing IT Services...1 Profitability...1 Reliability...2 Best Practices
Patch Management SoftwareTechnical Specs
Patch Management SoftwareTechnical Specs 1. Scalable: a. The PMS (Patch Management Software)must be scalable(can grow as network grows). b. The PMSmust be able to support more than 10k nodes from a single
LESSON 6.3. 98-365 Windows Server Administration Fundamentals. Understand Updates
Understand Updates Lesson Overview In this lesson, you will learn about: Update management Microsoft Baseline Security Analyzer (MBSA) Windows Server Update Services Anticipatory Set What is the Windows
Beauty or the Beast: The tale of your mobile app. Rob Kwok, Crittercism
Beauty or the Beast: The tale of your mobile app Rob Kwok, Crittercism Introduction & Agenda Why mobile performance matters Why delivering a great mobile experience is hard to do What metrics should you
How To Use An Inventory And License Management Tool In A Microsoft Inventory Program
Software Asset Management Inventory Tools: Essential to a Software Asset Management Program Written by Microsoft in combination with SoftAid Abstract The use of inventory, license management, software
Patch Management Marvin Christensen /CIAC
Patch Management Marvin Christensen /CIAC US DOE Cyber Security Group 2004 Training Conference May 26, 2004 Management Track 11:00 am 11:45 pm UCRL-CONF-204220 CIAC 04-099 This work was performed under
Patch Management Policy
Patch Management Policy L2-POL-12 Version No :1.0 Revision History REVISION DATE PREPARED BY APPROVED BY DESCRIPTION Original 1.0 2-Apr-2015 Process Owner Management Representative Initial Version No.:
Device Lifecycle Management
Device Lifecycle Management 1 (8) Table of Contents 1. Executive summary... 3 2. Today's challenges in adapting to lifecycle management... 3 3. How is Miradore different?... 5 4. Conclusion... 8 2 (8)
Planning and Administering Windows Server 2008 Servers 70-646
Hands-On Planning and Administering Windows Server 2008 Servers 70-646 Course Description This Hands-On course provides students with the knowledge and skills to implement, monitor, and maintain Windows
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
IBM Endpoint Manager Product Introduction and Overview
IBM Endpoint Manager Product Introduction and Overview David Harsent Technical Specialist Unified Endpoint IBM Endpoint Manager and IBM MobileFirst Protect (MaaS360) Any device. Identify and respond to
Managing non-microsoft updates
Managing non-microsoft updates With Microsoft s System Center Configuration Manager secunia.com 1 How to patch all your programs directly in Microsoft System Center 2012 A common perception is that System
2012 CIP Spring Compliance Workshop May 7-11. Testing, Ports & Services and Patch Management
2012 CIP Spring Compliance Workshop May 7-11 Testing, Ports & Services and Patch Management Purpose This presentation provides an overview of the CIP-007-3 R1 Test Procedures which includes a discussion
IT Support & Managed Service Providers Survey Analysis
IT Support & Managed Service Providers Survey Analysis Overview & Methodology Conducted by GFI Software, a leading infrastructure provider for the SMB, the IT Support and Managed Services industry research
The Power to Take Control of Software Assets
The Software Asset Management Specialists 781-569-0410 www.aid.com The Power to Take Control of Software Assets Software Asset Management Inventory Tools: Essential to a Software Asset Management Program
SIEM Implementation Approach Discussion. April 2012
SIEM Implementation Approach Discussion April 2012 Agenda What are we trying to solve? Summary Observations from the Security Assessments related to Logging & Monitoring Problem Statement Solution Conceptual
Accelerate Patching. the Enterprise. Wolfgang Kandek Qualys, Inc. Session ID: STAR-301 Session Classification: Intermediate
Accelerate Patching Progress Title of in Presentation the Enterprise the Enterprise Wolfgang Kandek Qualys, Inc. Session ID: STAR-301 Session Classification: Intermediate Insert presenter logo here on
Information Technology Solutions
Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer
Managing and Maintaining Windows Server 2008 Servers (6430) Course length: 5 days
Managing and Maintaining Windows Server 2008 Servers (6430) Course length: 5 days Course Summary: This five-day instructor-led course provides students with the knowledge and skills to implement, monitor,
ASSET MANAGEMENT WHAT MAKES SENSE FOR HYDRO?
Pat McCarty Generation Manager Tacoma Power ASSET MANAGEMENT WHAT MAKES SENSE FOR HYDRO? TACOMA POWER S ASSET MANAGEMENT INITIATIVE T&D group identified 13 asset classes i.e. Substation transformers, station
Desktop Management Shared Service SUG 1/13/14. Jeremy Kim, Wharton Peter Palladino, ISC
Desktop Management Shared Service SUG 1/13/14 Jeremy Kim, Wharton Peter Palladino, ISC DME Objectives Identify criteria to evaluate products that the team chose as candidates for desktop management. Select
Creating Added Value for the IT Service Management Practice. How ConsoleWorks Creates Value for ITSM Best Practices
Creating Added Value for the IT Service Practice Many of the best practices documented within ITSM provide guidance on how to perform IT functions in a consistent and reliable manner. It calls for a seamless
BIGFIX. Software Distribution for a Distributed World
Software Distribution for a Distributed World Executive Summary The distributed enterprise presents a unique set of challenges for software distribution. As more and more corporate networks use a variety
BIGFIX. Leverage BigFix visibility, control and elegance to eliminate uncertainty from software asset management
Leverage BigFix visibility, control and elegance to eliminate uncertainty from software asset management In contrast to many common software asset management (SAM) approaches either those based on cobbled
Patch Management for Red Hat Enterprise Linux. User s Guide
Patch Management for Red Hat Enterprise Linux User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation 2003,
"Service Lifecycle Management strategies for CIOs"
"Service Lifecycle strategies for CIOs" Ralf Hart, Sales Manager CEE Europe FrontRange Solutions 10th December 2008 Agenda FrontRange Solutions The challenges the IT community faces What is the solution?
IT Security & Compliance. On Time. On Budget. On Demand.
IT Security & Compliance On Time. On Budget. On Demand. IT Security & Compliance Delivered as a Service For businesses today, managing IT security risk and meeting compliance requirements is paramount
ViaMonstra Configuration Manager 2012 Project plan and success criteria s
ViaMonstra Configuration Manager 2012 Project plan and success s Authors: Kent Agerlund Create date: 09/06-2012 Change date: Document version no.: 1.0 Page 1 of 16 Document information History Date Author
Benchmarking VoIP Performance Management
Benchmarking VoIP Performance Management March 2008 Page 2 Executive Summary Aberdeen surveyed 159 organizations to identify best practices for managing Voice over Internet Protocol (VoIP). This report
The Clear Choice for Voice: The Cloud Outsource Model for Carriers. Kevin Mitchell [email protected]
The Clear Choice for Voice: The Cloud Outsource Model for Carriers Kevin Mitchell [email protected] Voice is Important Part of the Service Bundle Huge Market FIXED VOICE SERVICES CANADA 2013 Triple-play
Fixed asset registers Finding hidden value in LNG assets
Fixed asset registers Finding hidden value in LNG assets Australia s emerging LNG industry could be missing out on millions of dollars in value as a result of procurement practices and the accounting
Digital Marketing. Simplified. www.infosys.com/brandedge
Digital Marketing. Simplified. www.infosys.com/brandedge DIGITAL MARKETING PAIN POINTS Infosys research indicates that there are numerous barriers to effective management of digital marketing campaigns,
How To Deploy Software Updates Using SCCM 2012 R2
prajwaldesai.com http://prajwaldesai.com/deploy-software-updates-using-sccm-2012-r2/ How To Deploy Software Updates Using SCCM 2012 R2 Prajwal Desai In this post we will look at the steps on how to deploy
Case Study. SNW Asset Management. [email protected] (866) 796-0310. www.os33.com
[email protected] (866) 796-0310 www.os33.com Case Study Highlights Country: United States Industry: More Info: http://www.snwam.com Business Situation: Move a spin-off company to a new IT infrastructure in
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Commerce Management System
Commerce System Commerce Without Compromise The scalability and value of hosted e-commerce... The performance and control of a licensed software solution The world of e-commerce is becoming more and more
Unicenter Asset Intelligence r11
Unicenter Asset Intelligence r11 Key Features at a Glance Comprehensive Out of the Box Business Relevant Answers Complete and Accurate IT Asset Information Real-Time Analysis Risk Alerting Compliance Utilization
Sabre Travel Network Consulting Services
Sabre Travel Network Consulting Services Unparalled Expertise Comprehensive Methodology Proven Value Sabre Travel Network Consulting Services It has never been more important to understand how your business
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
Leveraging SANS and NIST to Evaluate New Security Tools
Leveraging SANS and NIST to Evaluate New Security Tools Agenda About TaaSera A Problem to Solve Overview of NIST Cybersecurity Framework Overview of SANS CSC-20 Call to Action Conclusion Q&A Company Founded
Analytics for Pros. SEMpdx
Analytics for Pros SEMpdx ISITE Design $39.5 IN 2012 BILLION $62 BILLION BY 2016 http://www.go-gulf.com/blog/online-ad-spending WHY WEB ANALYTICS IS IMPORTANT TO SEM AND ONLINE ADVERTISING Prove to people
BladeLogic Software-as-a- Service (SaaS) Solution. Help reduce operating cost, improve security compliance, strengthen cybersecurity posture
BladeLogic Software-as-a- Service (SaaS) Solution Help reduce operating cost, improve security compliance, strengthen cybersecurity posture February 20, 2014 Contents The Configuration Security Compliance
Project Management Plan Outline ITSC
Project Management Plan Outline ITSC Date: 02/28/2012 Introduction At start of each project vendors must create a project management plan for ITSC approval, including, at a minimum, the sections described
Network Assessment. Prepared For: Prospect Or Customer Prepared By: Your Company Name
Network Assessment Prepared For: Prospect Or Customer Prepared By: Your Company Name Environment Risk and Issue Score Issue Review Next Steps Agenda Environment - Overview Domain Domain Controllers 4 Number
GE Measurement & Control. Cyber Security for Industrial Controls
GE Measurement & Control Cyber Security for Industrial Controls Contents Overview...3 Cyber Asset Protection (CAP) Software Update Subscription....4 SecurityST Solution Options...5 Centralized Account
Enterprise Mobility Services
Learn. Connect. Explore. Enterprise Mobility Services MS Anand Technical Architect Evangelist Anirudh Singh Rautela Enterprise Mobility Business lead - India The challenges we face today in keeping users
Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014
Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability 7 Jul 2014 1 Purpose This document is intended to provide insight on the types of tools and technologies that
Support for Microsoft Applications & Server Virtualization Validation Program. Wee-Meng, Thoo Technology Alliance VMware Asia Pacific
Support for Microsoft Applications & Server Virtualization Validation Program. Wee-Meng, Thoo Technology Alliance VMware Asia Pacific Agenda VMware Technology Alliance Partnership (TAP) Why. What are in
Masterminding Data Governance
Why Data Governance Matters The Five Critical Steps for Data Governance Data Governance and BackOffice Associates Masterminding Data Governance 1 of 11 A 5-step strategic roadmap to sustainable data quality
EMPOWERING THE DYNAMIC WORKPLACE
EMPOWERING THE DYNAMIC WORKPLACE Matrix42 has been positioned in the visionary quadrant of the Gartner Magic Quadrant as the only vendor that enables organizations to manage physical, virtual and mobile
Retail s Complexity: The Information Technology Solution
A P P L I C A T I O N S A WHITE PAPER SERIES COMPLEXITY OF PRODUCTS, SCALE AND PROCESSES, ALONG WITH SUPPLY CHAIN CHALLENGES, PLACE EVER GREATER DEMANDS ON RETAILERS. IT SYSTEMS ARE AT THE HEART OF RETAIL
Ball Corporation. Situation. Ball Corporation strengthens global account management by using CRM in the cloud
Ball Corporation Ball Corporation strengthens global account management by using CRM in the cloud For more than 130 years, Ball Corporation has led its industry by providing innovative, valuable packaging
MetaOption, L.L.C. Implementing ERP Using Microsoft Dynamics Navision
MetaOption, L.L.C. Implementing ERP Using Microsoft Dynamics Navision Why Implement Microsoft Dynamics Navision (ERP)? Table of Content Serial Number Particulars Page 1 Introduction Why Implement Microsoft
Resolving the Top Three Patch Management Challenges
LANDesk Technical White Paper Resolving the Top Three Patch Management Challenges Technical White Paper Visit www.landesk.com for more information. To the maximum extent permitted under applicable law,
HEAT DSM 2015.2 Release Overview. Andreas Fuchs Product Management November 16th, 2015
HEAT DSM 2015.2 Release Overview Andreas Fuchs Product Management November 16th, 2015 HEAT DSM 2015.2 Highlights HEAT Discovery Integration Patch Management Enhancements HEAT PatchLink Integration HEAT
ITSM Software: Is SaaS the Model for You?
ITSM Software: Is SaaS the Model for You? By Kai Holthaus, ITIL v3 Expert and Director for Third Sky, Inc. Software as a Service (SaaS) has gotten a lot of attention recently. Many companies and IT organizations
HANDLING MASTER DATA OBJECTS DURING AN ERP DATA MIGRATION
HANDLING MASTER DATA OBJECTS DURING AN ERP DATA MIGRATION Table Of Contents 1. ERP initiatives, the importance of data migration & the emergence of Master Data Management (MDM)...3 2. 3. 4. 5. During Data
ZENworks Patch Management. Doc Hodges Opportunity Response Team Novell, Inc.
ZENworks Patch Management Doc Hodges Opportunity Response Team Novell, Inc. Are you prepared for business continuity threats? Unstable, malfunctioning systems resulting from attacks by viruses, worms and
Saas vs. Traditional ERP: Which is Right for You?
Saas vs. Traditional ERP: Which is Right for You? Eric Kimberling President and Chairman Panorama Consulting Solutions www.panorama-consulting.com Phone: 720-515-1ERP Twitter: @erickimberling 1 Agenda
Product comparison. GFI LanGuard 2014 vs. Microsoft Windows Server Update Services 3.0 SP2
Product comparison GFI LanGuard 2014 vs. Microsoft Windows Server Update Services 3.0 SP2 General features GFI LanGuard 2014 Microsoft WSUS 3.0 SP2 Scheduled scans Agent-less r Agent-based Integration
Introduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
Make the Most of your SaaS Solution.
Make the Most of your SaaS Solution. Software-as-a-Service (SaaS) gives your organization more rapid access to state-of-the-art software at a lower up front cost than standard software licensing agreements.
HANDLING MASTER DATA OBJECTS DURING AN ERP DATA MIGRATION
HANDLING MASTER DATA OBJECTS DURING AN ERP DATA MIGRATION Table Of Contents 1. ERP initiatives, the importance of data migration & the emergence of Master Data Management (MDM)...3 2. During Data Migration,
AGILE RANDOMIZATION AND TRIAL SUPPLY MANAGEMENT SOLUTIONS: A RECIPE FOR SPEED, SIMPLICITY AND SERVICE
WHITE PAPER AGILE RANDOMIZATION AND TRIAL SUPPLY MANAGEMENT SOLUTIONS: A RECIPE FOR SPEED, SIMPLICITY AND SERVICE Randomization is fundamental to clinical trials it enables treatment group balance, eliminates
Information Technology Services
Information Technology Services 2011 Services Guide 77 Accord Park Drive, Suite A10 Norwell, MA 02061 (781) 871-3662 A proactive, preventative approach to IT management. System downtime, viruses, spyware,
Planning and Administering Windows Server 2008 Servers
Planning and Administering Windows Server 2008 Servers Course 6430 Five days Instructor-led Introduction Elements of this syllabus are subject to change. This five-day instructor-led course provides students
Malware and Other Malicious Threats
21 August Thailand Securing Your Endpoints from Malware and Other Malicious Threats Steven Scheurmann Sales Leader, Tivoli Endpoint Management Products, built on BigFix, IBM Software Group, Asia Pacific
Security. Security consulting and Integration: Definition and Deliverables. Introduction
Security Security Introduction Businesses today need to defend themselves against an evolving set of threats, from malicious software to other vulnerabilities introduced by newly converged voice and data
BEST PRACTICES WHITE PAPER. BMC BladeLogic Client Automation and Intel Core vpro Processors
BEST PRACTICES WHITE PAPER BMC BladeLogic Client Automation and Intel Core vpro Processors Table of Contents Introduction................................................... 1 About BMC.......................................................
WHITE PAPER Top 5 Questions to Consider During the ERP Research Process
WHITE PAPER Top 5 Questions to Consider During the ERP Research Process Apprise.com Executive Summary Many companies dive right into the ERP selection process without first figuring out exactly what they
How To Manage Sourcefire From A Command Console
Sourcefire TM Sourcefire Capabilities Store up to 100,000,000 security & host events, including packet data Centralized policy & sensor management Centralized audit logging of configuration & security
Security Information/Event Management Security Development Life Cycle Version 5
Security Information/Event Management Security Development Life Cycle Version 5 If your enterprise is like most, you are collecting logs from most every device with security relevance. The flood of events
How to Make Microsoft Security Patch Testing More Efficient
How to Make Microsoft Security Patch Testing More Efficient Published Sept 2005 Abstract Despite the perils of deploying a Microsoft security patch to an enterprise s operating environment without first
