Patch management: Fixing vulnerabilities before they are exploited
|
|
|
- Magdalen Todd
- 10 years ago
- Views:
Transcription
1 GFI White Paper Patch management: Fixing vulnerabilities before they are exploited Managing and administering software updates remains one of the most challenging and resource-intensive tasks an IT Department undertakes on a daily basis. This white paper examines the important role played by patch management to help organizations keep their PC real estate fully up-to-date with the latest security patches, without unduly compromising reliablity, productivity, security and data integrity.
2 Contents Introduction 3 Importance of patch management 3 Balancing security with reliability 4 Solutions for effective patch management 5 Summary 5 About GFI 6 Patch management: Fixing vulnerabilities before they are exploited 2
3 Introduction Managing and administering software updates remains one of the most challenging and resource-intensive tasks an IT Department undertakes on a daily basis. While software updates serve many important roles, be it delivering feature improvements or fixing bugs and security vulnerabilities, they bring with them a number of potential challenges for the IT Department in terms of ensuring systems are up-to-date, that new problems are not introduced by patches designed to fix things, and updates do not create compatibility or instability issues. All this needs to be done while ensuring that updates are pushed to PCs as quickly as possible to prevent vulnerabilities being exploited. The constantly evolving software landscape makes patch management an important consideration for all IT decision makers, regardless of organization size. Software that is not kept up-to-date with the latest patches and version updates runs the risk of creating weak points in your organization s security strategy, placing servers and client devices at risk from exploitation by malware, hacking attacks, as well as increasing the risk of reliability-based failure and data loss. The number of vulnerabilities in software commonly found on client PCs grew by 71 percent between 2009 and This jump is due in large part to problems occurring within third-party applications, rather than with issues directly related to the underlying Windows operating system (OS) or Microsoft-produced application software. Effective patch management improves reliability and IT efficiency, automating many of the administrative tasks associated with deploying software updates while minimizing the amount of downtime associated with patch deployment, patch auditing and patch roll-back. Importance of patch management The process of keeping a PC or a server fully patched is easier today than ever, thanks in part to the moves of several key software vendors to build automated update checking into their applications, as well as the highlydeveloped Microsoft update service, which can download and, in many cases, install updates in the background without requiring user input or a system reboot. Nonetheless, the installation of patches, if left solely to the user, can be overlooked, leading to known vulnerabilities being left unaddressed and ripe for exploitation. By virtue of being an application and OS vendor, Microsoft attracts the most attention when it comes to issuing and installing software updates. However, the majority of known application vulnerabilities continue to come from third parties, while the smallest percentage of threats resides in the OS itself. The implications of thirdparty software on PC security and reliability is further challenged by the role of browser plug-ins, media player codecs and other bolt-on code that works in conjunction with an existing application or system service. The vulnerability challenges posed by third-party applications can best be illustrated by looking at the most targeted applications. Using 2010 data from the US National Vulnerability Database, we can see that of the top 10 applications targeted for vulnerabilities, ranked by total number of targeted vulnerabilities, nine were thirdparty applications: Google Chrome 152 targeted vulnerabilities Apple Safari 122 targeted vulnerabilities Mozilla Firefox 103 targeted vulnerabilities Apple Webkit 94 targeted vulnerabilities Mozilla Seamonkey 77 targeted vulnerabilities Adobe Reader 60 targeted vulnerabilities Mozilla Thunderbird 60 targeted vulnerabilities Adobe Flash Player 59 targeted vulnerabilities Microsoft Internet Explorer 59 targeted vulnerabilities Adobe Acrobat 57 targeted vulnerabilities. Patch management: Fixing vulnerabilities before they are exploited 3
4 Microsoft Internet Explorer, the highest ranked Microsoft application, was also the highest ranked OS-installed application on the list sharing sixth place with Adobe Reader. Microsoft Office, the company s highestplaced add-on software product, placed 11th. Oracle s Java Runtime Environment, often targeted when vulnerabilities are revealed by the release of a patch, placed 12th. The data also illustrates how web browsers continue to be the weakest point when it comes to softwarebased vulnerabilities. In terms of operating systems, various versions of Microsoft Windows dominate the field by virtue of the sheer market penetration of the OS, while Linux and both the server and desktop versions of Mac OS X follow very close behind. In fact, in 2010 the desktop versions of Mac OS X experienced 96 targeted vulnerabilities compared to 88 for Windows Vista and 66 for Windows 7, the latest incarnation of the OS. Managing software updates and critical patch deployment manually will quickly increase the maintenance overhead associated with applications and the operating systems they run on, to the point of overwhelming the IT team. For example, the volume of software updates and critical vulnerability patches issued by the average vendor varies, but in the case of market leader Microsoft, the size of its monthly Patch Tuesday software update payload can be significant. In April 2011 alone, Microsoft delivered 64 critical fixes across 17 software updates, while the previous month it fixed just four known flaws with three updates. In February 2011, Adobe patched 42 known bugs and vulnerabilities in its Adobe Reader and Flash products, while Oracle patched 73 known security vulnerabilities across its entire product line in April The latter is an example of how complex patch management can be if not automated, as Oracle s patching applied to both organically-developed products as well as a number of high-profile acquired products that still sit outside the core Oracle code set such as JD Edwards, PeopleSoft, Siebel and OpenOffice. These are just a few examples of a much larger software patching landscape that affects all software vendors. These are also examples of how little predictability there is in the volume and severity of the patches being issued; and with it the resources that will be needed to ensure they are installed. Balancing security with reliability Various steps have been taken by operating system and application vendors to simplify the process and to minimize the window during which a machine is exposed to a known application or underlying OS vulnerability, such as integrating automated update download mechanisms and pop-up windows to alert users on the availability of a new update, as well as offering educational notes on why the user needs to deploy the update. Such services have a weakness in that they rely on users who actively connect to the Internet and allow updates to be downloaded and installed. The ease with which end-users can update their own machines, coupled with the benefits of encouraging them to do so, also means that the IT department needs to maintain visibility of what patches have been installed in the event that a problem arises. Even a fully-patched machine can present problems for both the user and the business. For example, in February 2010 Microsoft issued a patch for Windows XP, called MS The patch, intended to fix longstanding security vulnerabilities in the OS, was found to create significant system instability in certain configurations of PCs, leading to the unrecoverable Blue Screen of Death Windows error. The error led to the temporary suspension of the patch from Microsoft s Windows Update patch download service while the instability issues were investigated and fixed. For users that had already installed the patch, the most prudent cause of action was to uninstall the patch and roll the system back to the previous good state. The ability to roll back a patch is essential to ensure a swift remediation of software problems caused by the installation of a software update. There are numerous reasons why an organization might need or choose to revoke a software update that has been pushed out by a vendor and installed: Patch management: Fixing vulnerabilities before they are exploited 4
5 Instability As with the example above, the wide range of potential configurations and software combinations on a PC can mean that even a well-tested software patch can cause a machine or application to malfunction after installation.»» Compatibility Upgrades can create problems including implementing changes to file formats, database structures, storage formats and communication protocols that have not been carried through the IT estate, or which have not been adopted by a customer or supplier, thus breaking workflow. Driver clashes In instances where the software update makes extensive changes to the way the software interfaces with hardware, it may be necessary to uninstall a patch and hold off deploying until hardware drivers have been updated to restore compatibility with the operating system or application. While other solutions exist for patch management, such as Microsoft s own Windows Server Update Services (WSUS), these solutions are usually limited in both their scope and ability to automate the patch management process. In the case of WSUS, patch management is limited to only Microsoft applications and system patches issued through the Microsoft Update framework. Third party solutions are not catered for, while the ability to revoke and remove a patch that has already been installed is reliant on the operating system, successfully creating a Microsoft Restore Point at the time the patch was added, meaning that rolling back a system can result in other perfectly working third party applications being uninstalled in the process. Solutions for effective patch management The integrated mechanisms for delivering patches and other software updates to applications and operating systems form just one part of the process. For any organization, the key is to deploy an all-encompassing patch management solution that can automate the process of managing patch deployment and provide quick and easy visibility of the current state of patching on all machines. A solution such as GFI LanGuard delivers complete suite of patch management tools in one application. With it, IT administrators can monitor the IT estate to provide a single view of what has been installed on each connected client or server, and trigger automated detection, downloading and deployment of missing patches to ensure a machine is fully patched before it becomes a problem. This approach ensures that known vulnerabilities are addressed before they are exploited; and therefore drastically reduces the maintenance burden placed on IT personnel. In addition, the patch management solution should provide administrators with an effective means to roll-back problematic patches, returning the machine to its pre-patch state in the event of compatibility or instability issues arising after the installation of an update. This feature is independent of Microsoft s Restore Point technology and applies to both system and third party patches. Summary The process of patch management has, over time, been complicated by the growth in operating system and application patches, along with driver updates, many of which are delivered to servers and clients via vendoroperated automated update services but without the safety net of pre-testing to ensure broad compatibility and stability with a wide range of custom configurations of server or desktop PC. Patch management plays a critical role in ensuring that companies can keep their PC real estate fully upto-date with the latest security patches and software updates, without unduly compromising reliability, productivity, security and data integrity. A robust patch management solution that combines swift roll-back of problem patches with a single view of what patches are installed on machines across the organization, is a critical component of both software management and IT security strategies. As part of a wider IT security policy, such a solution will ensure that applications are not placed at unnecessary risk, while ensuring that a policy of encouraging end-users to accept and install critical updates at the first possible opportunity can be maintained. Patch management: Fixing vulnerabilities before they are exploited 5
6 About GFI GFI Software provides web and mail security, archiving and fax, networking and security software and hosted IT solutions for small to medium-sized businesses (SMBs) via an extensive global partner community. GFI products are available either as on-premise solutions, in the cloud or as a hybrid of both delivery models. With award-winning technology, a competitive pricing strategy and a strong focus on the unique requirements of SMBs, GFI satisfies the IT needs of organizations on a global scale. The company has offices in the United States (North Carolina, California and Florida), UK (London and Dundee), Austria, Australia, Malta, Hong Kong, Philippines and Romania, which together support hundreds of thousands of installations worldwide. GFI is a channel-focused company with thousands of partners throughout the world and is also a Microsoft Gold Certified Partner. More information about GFI can be found at Patch management: Fixing vulnerabilities before they are exploited 6
7 USA, CANADA AND CENTRAL AND SOUTH AMERICA Weston Parkway, Suite 104, Cary, NC 27513, USA Telephone: +1 (888) Fax: +1 (919) GFI 3261 jun12 33 North Garden Ave, Suite 1200, Clearwater, FL 33755, USA Telephone: +1 (888) Fax: +1 (919) UK AND REPUBLIC OF IRELAND Magna House, London Road, Staines, Middlesex, TW18 4BP, UK Telephone: +44 (0) Fax: +44 (0) EUROPE, MIDDLE EAST AND AFRICA GFI House, San Andrea Street, San Gwann, SGN 1612, Malta Telephone: Fax: AUSTRALIA AND NEW ZEALAND 83 King William Road, Unley 5061, South Australia Telephone: Fax: [email protected] For a full list of GFI offices/contact details worldwide, please visit Disclaimer GFI Software. All rights reserved. All product and company names herein may be trademarks of their respective owners. The information and content in this document is provided for informational purposes only and is provided as is with no warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. GFI Software is not liable for any damages, including any consequential damages, of any kind that may result from the use of this document. The information is obtained from publicly available sources. Though reasonable effort has been made to ensure the accuracy of the data provided, GFI makes no claim, promise or guarantee about the completeness, accuracy, recency or adequacy of information and is not responsible for misprints, outof-date information, or errors. GFI makes no warranty, express or implied, and assumes no legal liability or responsibility for the accuracy or completeness of any information contained in this document. If you believe there are any factual errors in this document, please contact us and we will review your concerns as soon as practical.
Patch management with GFI LanGuard and Microsoft WSUS
GFI White Paper Patch management with GFI LanGuard and Microsoft WSUS A cost-effective and easy solution for network-wide patch management This white paper provides an overview of how to use GFI LanGuard
How to configure IBM iseries (formerly AS/400) event collection with Audit and GFI EventsManager
GFI White Paper How to configure IBM iseries (formerly AS/400) event collection with Audit and GFI EventsManager This document explains how to configure and use GFI EventsManager to collect IBM iseries
How to create a complex and secure backup strategy
GFI White Paper How to create a complex and secure backup strategy Data is the lifeblood of every organization and business. Data theft and data loss through negligence or hardware failure can cause irreparable
Archiving technologies
GFI White Paper Archiving technologies Have you ever considered the impact one untraceable email can have on an organization or individual s career? With so much corporate information contained within
GFI Product Comparison. GFI LanGuard 2011 vs Microsoft Baseline Security Analyzer 2.2
GFI Product Comparison GFI LanGuard 2011 vs Microsoft Baseline Security Analyzer 2.2 General features GFI LanGuard 2011 MBSA 2.2 Scheduled scans r Agent-less Agent-based Integration with Active Directory
GFI Product Comparison. GFI LanGuard 2011 vs Retina Network Security Scanner 5.12.1
GFI Product Comparison GFI LanGuard 2011 vs Retina Network Security Scanner 5.12.1 General features GFI LanGuard 2011 Retina 5.12.1 Scheduled scans Agent-less Agent-based Integration with Active Directory
GFI White Paper. How Web Reputation increases your online protection
GFI White Paper How Web Reputation increases your online protection Contents Introduction to Web Reputation 3 Why use Web Reputation? 3 The value of using Web Reputation and antivirus software 3 The value
Understanding data backups: why SMEs need them
GFI White Paper Understanding data backups: why SMEs need them Data is the lifeblood of every organization, yet many either fail to back up their data or they are not doing so properly. Losing data can
GFI MailSecurity deployment strategies
GFI White Paper GFI MailSecurity deployment strategies Which operating mode(s) to use in your network environment GFI MailSecurity can be deployed as an SMTP gateway or as a VS API version for Microsoft
Integrating faxes into today s world of healthcare e-records
GFI White Paper Integrating faxes into today s world of healthcare e-records This white paper examines the obstacles preventing the move away from fax machines, and the benefits of having a communications
GFI product comparison. GFI MailArchiver vs. Microsoft Exchange 2010
GFI product comparison GFI MailArchiver vs. Microsoft Exchange 2010 GFI MailArchiver GFI MailArchiver is an industry-leading email management solution. It is used globally by administrators to lower email
GFI Product comparison. GFI MailArchiver vs. Microsoft Exchange 2010
GFI Product comparison GFI MailArchiver vs. Microsoft Exchange 2010 GFI MailArchiver 2011 GFI MailArchiver is an industry-leading email management solution. It is used globally by administrators to lower
How to keep spam off your network
GFI White Paper How to keep spam off your network What features to look for in anti-spam technology A buyer s guide to anti-spam software, this white paper highlights the key features to look for in anti-spam
GFI Cloud white paper. Cloud-based services: Easing the IT burden while taking control. www.gficloud.com
GFI Cloud white paper Cloud-based services: Easing the IT burden while taking control www.gficloud.com Contents Introduction 3 Transferring workload into the cloud 4 Managing the cloud 5 Summary 6 About
The business implications of not having a backup strategy: where businesses get it wrong
GFI White Paper The business implications of not having a backup strategy: where businesses get it wrong A business that fails to maintain a copy of its data is asking for trouble. It is extremely easy
Social networking at work: Thanks, but no thanks?
GFI White Paper Social networking at work: Thanks, but no thanks? Millions of people around the world with access to the Internet are members of one or more social networks. They have a permanent online
Vulnerability management: Key questions you should be asking
GFI White Paper Vulnerability management: Key questions you should be asking Is vulnerability management critical for a business? Aren t traditional security tools sufficient to protect and secure the
GFI Product Guide. GFI MailArchiver Archive Restrictions and Licensing Guide
GFI Product Guide GFI MailArchiver Archive Restrictions and Licensing Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty
Email security Cloud vs. On-premise solutions
GFI White Paper Email security Cloud vs. On-premise solutions Choosing whether to put your email security in the cloud or host it on premise is a major decision. Hopefully this white paper will help. Contents
GFI MailEssentials Online Archive Configuration and usage
GFI MailEssentials Online Archive Configuration and usage Contents Retention policies 3 Message tagging 4 Access rights 5 Journaling 5 Accessing archived messages 7 Archive search / Viewing archived messages
GFI Product Comparison. GFI MailArchiver 6.0 vs Stimulus Software MailArchiva
GFI Product Comparison GFI MailArchiver 6.0 vs Stimulus Software MailArchiva Overview GFI MailArchiver 6.0 is the business archiving solution for small and medium-sized enterprises (SMEs). Reduce PST management
The importance of an Acceptable Use Policy
GFI White Paper The importance of an Acceptable Use Policy In an ideal world, employees would use the computers and Internet access provided their employer solely for business use. It is however, sadly,
Quick Start Guide for administrators
Quick Start Guide for administrators Contents Welcome 3 Your login information 3 Step 1: Adding mailboxes 3 Part 1: Add users 3 Part 2: Add aliases 3 Step 2: Adjusting your spam handling settings 4 Optional
GFI product comparison. GFI MailArchiver vs. Symantec Enterprise Vault
GFI product comparison GFI MailArchiver vs. Symantec Enterprise Vault General features GFI MailArchiver Symantec Enterprise Vault Supports Microsoft Exchange Server 2003, 2007 and 2010 Supports distributed
GFI Product Comparison. GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange
GFI Product Comparison GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange GFI MailEssentials Trend Micro ScanMail Suite Microsoft Exchange Server 2003/2007/2010/2013 Integration Option
GFI Product Comparison. GFI MailArchiver 6.0 vs Quest Software Archive Manager
GFI Product Comparison GFI MailArchiver 6.0 vs Quest Software Archive Manager General features GFI MailArchiver 6.0 Quest Software Archive Manager Supports Microsoft Exchange 2000, 2003 and 2007 Supports
GFI FAXmaker for Exchange/SMTP 12: An introduction to the architecture and deployment options
GFI FAXmaker for Exchange/SMTP 12: An introduction to the architecture and deployment options An overview of how GFI FAXmaker works, and how to deploy it This white paper describes the different ways in
GFI Product Comparison. GFI MailArchiver 6.0 vs EMC EmailXtender Archive Edition
GFI Product Comparison GFI MailArchiver 6.0 vs EMC EmailXtender Archive Edition General features GFI MailArchiver 6.0 EMC EmailXtender Archive Edition Supports Microsoft Exchange Server 2000, 2003 and
GFI MailEssentials 2014 Upgrade Guide A guide to upgrading from previous versions of GFI MailEssentials and GFI MailSecurity
GFI MailEssentials 2014 Upgrade Guide A guide to upgrading from previous versions of GFI MailEssentials and GFI MailSecurity The information and content in this document is provided for informational purposes
GFI Product Guide. How to create a new SQL Server Instance in Microsoft SQL Server 2012 and SQL Server Express
GFI Product Guide How to create a new SQL Server Instance in Microsoft SQL Server 2012 and SQL Server Express The information and content in this document is provided for informational purposes only and
GFI Product Manual. GFI MailArchiver Evaluation Guide
GFI Product Manual GFI MailArchiver Evaluation Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either
GFI Product Comparison. GFI MailArchiver 6.0 vs Waterford Technologies MailMeter Archive
GFI Product Comparison GFI MailArchiver 6.0 vs Waterford Technologies MailMeter Archive General features GFI MailArchiver 6.0 Waterford Technologies MailMeter Archive Supports Microsoft Exchange Server
GFI White Paper. Going beyond Exchange 2010 - Why it pays to have a dedicated email archiving solution
GFI White Paper Going beyond Exchange 2010 - Why it pays to have a dedicated email archiving solution Contents Introduction 3 The state of email archiving and data retention 3 The compliance challenge
Endpoint Protection Performance Benchmarks
Endpoint Protection Performance Benchmarks GFI Software conducted objective performance testing on four, publically available business endpoint protection security software products on Windows 7 Professional
GFI Product Manual. Outlook Connector User Manual
GFI Product Manual Outlook Connector User Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is" with no
Product comparison. GFI LanGuard 2014 vs. Microsoft Windows Server Update Services 3.0 SP2
Product comparison GFI LanGuard 2014 vs. Microsoft Windows Server Update Services 3.0 SP2 General features GFI LanGuard 2014 Microsoft WSUS 3.0 SP2 Scheduled scans Agent-less r Agent-based Integration
GFI Product Comparison. GFI MailEssentials vs Barracuda Spam Firewall
GFI Product Comparison GFI MailEssentials vs Barracuda Spam Firewall GFI MailEssentials Barracuda Spam Firewall Integrates closely with Microsoft Exchange Server 2003/2007/2010 Integrates closely with
GFI Product Manual. Version 6.0. Getting Started Guide
GFI Product Manual Version 6.0 Getting Started Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either
GFI MAX RemoteManagement Building Blocks to Managed services
GFI MAX RemoteManagement Building Blocks to Managed services Overview GFI s Building Block Program is all about making Managed Services a practical reality for IT support companies. A recent survey found
Evaluation guide. Evaluator s guide to getting the maximum benefit out of a GFI LanGuard trial
Evaluation guide Evaluator s guide to getting the maximum benefit out of a GFI LanGuard trial Contents GFI LanGuard 2012 evaluation guide 1 Introduction 4 GFI LanGuard overview 4 Why do customers purchase
Product comparison. GFI LanGuard 2014 vs. Microsoft Windows InTune (October 2013 Release)
Product comparison GFI LanGuard 2014 vs. Microsoft Windows InTune (October 2013 Release) GFI LanGuard 2014 Windows Intune General features Scheduled scans Agent-less r Agent-based Integration with Active
GFI Product Guide. GFI Archiver Evaluation Guide
GFI Product Guide GFI Archiver Evaluation Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express
Protecting your network against email threats
GFI White Paper Protecting your network against email threats The need for comprehensive server-based email security This white paper explains why antivirus software alone is not enough to protect your
GFI Product Manual. GFI MailArchiver Outlook Addon
GFI Product Manual GFI MailArchiver Outlook Addon The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express
GFI Product Comparison. GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.0
GFI Product Comparison GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.0 GFI MailEssentials Symantec Mail Security for Microsoft Exchange 7.0 Supports Microsoft Exchange Server 2003
GFI Product Guide. GFI Archiver and Office 365 Deployment Guide
GFI Product Guide GFI Archiver and Office 365 Deployment Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind,
How To Set Up A Journaling Mailbox In Microsoft Office 365 And Gfi Mailarchiver
GFI Product Guide GFI MailArchiver and Office 365 Deployment Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any
GFI Product Guide. GFI MailArchiver Archive Assistant
GFI Product Guide GFI MailArchiver Archive Assistant The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either
Tackling Third-Party Patches
Tackling Third-Party Patches VMware vcenter Protect Update Catalog Delivers an Efficient, Effective Way to Extend an Organization s SCCM Infrastructure Technical WHITE PAPER Companies around the world
Survey: Web filtering in Small and Medium-sized Enterprises (SMEs)
September 2010 GFI Software www.gfi.com More and more organizations are seeing value in web filtering and web security solutions, a survey conducted by GFI Software shows, with seven in 10 stating they
GFI Product Manual. Outlook Connector Manual
GFI Product Manual Outlook Connector Manual The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express
Social networking and security risks
GFI White Paper Social networking and security risks By Brad Dinerman The popularity of social networking sites has increased at astonishing levels. There is no arguing the usefulness of sites such as
The Importance of Patching Non-Microsoft Applications
The Importance of Patching Non-Microsoft Applications Technical WHITE PAPER The Importance of Patching Non-Microsoft Applications In the past, organizations patched only Microsoft operating systems. As
GFI Product Guide. Archive Assistant
GFI Product Guide Archive Assistant The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or implied,
Why organizations need to archive email
GFI White Paper Why organizations need to archive email The underlying reasons why corporate email archiving is important Over the past few years, email has become an integral part of the business workflow.
GFI Product Manual. Evaluation Guide Part 1: Quick Install
GFI Product Manual Evaluation Guide Part 1: Quick Install The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind,
Closing the Vulnerability Gap of Third- Party Patching
SOLUTION BRIEF: THIRD-PARTY PATCH MANAGEMENT........................................ Closing the Vulnerability Gap of Third- Party Patching Who should read this paper IT Managers who are trying to manage
GFI Archiver Evaluation guide: Online Demo Evaluation Guide
GFI Archiver Evaluation guide: Online Demo Evaluation Guide EN The information and content in this document is provided for informational purposes only and is provided as is with no warranty of any kind,
GFI Product Manual. Evaluation Guide Part 1: Quick Install
GFI Product Manual Evaluation Guide Part 1: Quick Install The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind,
How to perform network-wide security event log monitoring
GFI White Paper How to perform network-wide security event log monitoring Using GFI EventsManager for intrusion detection and essential auditing of security event logs This white paper explains the need
