Considerations for Patch Management – an RFP Extensive RFP Extensive RFP Pain in the Butt Pain in the Butt 10 Minutes to tell you about it 10 Minutes to.

Slides:



Advertisements
Similar presentations
Glenn Johnson John A. Dutton e-Education Institute Project Manager, Penn States e-Portfolio Initiative Glenn Johnson John A. Dutton e-Education Institute.
Advertisements

Save Time, Money, and Energy by Virtualizing Your Environment Mica Lyman and Shawn Harpe Oklahoma State University Copyright Mica Lyman, Shawn Harpe 2007.
No Money? Try Vision. Academic Issues and the Uses of Technology in Financially Tight Times Susanne Woods – SAC, 2002 Copyright Susanne Woods, This.
What Does the Net Generation Expect From Us? SAC August 8, 2005 SAC August 8, 2005 Copyright © 2005, Joel L. Hartman. This work is the intellectual property.
Making Sense out of the Information Security and Privacy Alphabet Soup in terms of Data Access A pragmatic, collaborative approach to promulgating campus-wide.
Copyright Sylvia Maxwell and Michael White, This work is the intellectual property of the author. Permission is granted for this material to be shared.
Copyright Brian T. Huntley and Tim Antonowicz 2007 This work is the intellectual property of the authors. Permission is granted for this material to be.
Southwest Educause 2003 © Baylor University 2003 Adapting Enterprise Security to a University Environment Bob Hartland Director of IT Servers and Network.
Copyright Aaron Rothberg 2005 This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
February 2006 copyright Michael Welch, Blinn College This work is the intellectual property of the author. Permission is granted for this material to be.
Delivering Windows OS Updates at Yale with SUS EDUCAUSE Security Professionals Workshop May 17, 2004 Washington DC Ken Hoover, Systems Programmer
Deploying Tools for Cleaning Personal Information University of Pennsylvania School of Arts and Sciences Justin C. Klein Keane Sr. Information Security.
Copyright Steve Brandt This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Pam Downs Ajay Gupta The Pennsylvania Prince George’s State University Community College "Copyright Penn State University This work is the intellectual.
Copyright Statement © Jason Rhode and Carol Scheidenhelm This work is the intellectual property of the authors. Permission is granted for this material.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
Copyright Anthony K. Holden, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Mobile Computing and Security Authenticated Network Access (ANA) Jon Peters Associate Director Dave Packham Manager of Network Engineering NetCom University.
Copyright © College of Mount St. Joseph, 2002 This work is the intellectual property of the authors. Permission is granted for this material to be shared.
1 Protecting Wintel Infrastructures: The University of Memphis Case Robert Jackson, University of Memphis Dr. Mark Frolick, Xavier University Copyright.
Copyright Tim Antonowicz, This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
Best Practices For Using Technology To Deliver Instructional Support Services Dr. Steven G. Sachs Northern Virginia Community College Copyright Steven.
Stanford’s Patch Management Project   Ced Bennett May 17, 2004 Copyright Cedric Bennett This work is the intellectual property of the author. Permission.
Collaborative Associate of Arts Degrees. Collaboration In thought a good idea Every one wants to be invited to the dance. Sharing sounds good. In deed.
Sharing Information and Controlling Content: Continuing Challenges for Higher Education Susanna Frederick Fischer Assistant Professor Columbus School of.
Distributed Network Security Using Free Tools in University Environments Jeff Bollinger, CISSP, GSEC Doug Brown, CISSP, GSEC University of North Carolina.
Copyright Michael White and Sandra Thompson, This work is the intellectual property of the author. Permission is granted for this material to be.
Managing Intellectual Property for Distance Learning Liz Johnson Project Manager Advanced Learning Technologies Board of Regents of the University System.
Issues Associated with ePortfolios in Small Colleges EDUCAUSE Mid-Atlantic Regional Conference 2006 Ed Barboni, Senior Advisor, Council of Independent.
Title: Developing a Multimedia Tutorial Style Guide to Expand Student Training Author: Suzie Medders, Student Training Coordinator Educational Technology.
Discussion Panelists: Justin C. Klein Keane Sr. Information Security Specialist University of Pennsylvania Jonathan Hanny Application Security Specialist.
Taking Cyber Security Awareness to the Street Community Aware.
©Stephen Kingham SIP Peering SIP Workshop APAN Taipei Taiwan 23rd Aug 2005 By Stephen Kingham
Grids USC Case Study Copyright Shelley Henderson This work is the intellectual property of the author. Permission is granted for this material to.
1 Professor Emeritus Ray Schroeder Director of Technology-Enhanced Learning University of Illinois at Springfield Copyright Ray Schroeder, This work.
Using Levels of Assurance Well, at least thinking about it…. MAX (just MAX)
November 7, 2005EDUCAUSE Live1 An Eye to the Future with a Brief Look at the Past Jack McCredie UC Berkeley November 7, 2005 Copyright John W. McCredie.
George Mason University Assessing Technology Support: Using Portfolios to Set Goals and Measure Progress Anne Agee, Star Muir, Walt Sevon Information Technology.
Copyright © 2003, The University of Texas at Austin. This work is the intellectual property of the author. Permission is granted for this material to be.
Copyright David A. Cox This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
Effective Distribution of Academically Licensed Software ©2008 Brent West. This work is the intellectual property of the author. Permission is granted.
Learning & Teaching = Activities Copyright Steve Ehrmann & Nikki Reynolds, This work is the intellectual property of the author. Permission is granted.
EDUCAUSE 2006 Electronic Portfolios, A Perfect Solution to Assessment in an Online English Composition Course Dr. Mary Jane Clerkin Copyright Dr. Mary.
©Stephen Kingham SIP Protocol overview SIP Workshop APAN Taipei Taiwan 23rd Aug 2005 By Stephen Kingham
Integration is Critical for Success Curriculum Course Delivery Ongoing Support Instructor & Learner.
1 Effective Incident Response Presented by Greg Hedrick, Manager of Security Services Copyright Purdue University This work is the intellectual property.
Copyright © 2011 Rachel Fourny. This work is the intellectual property of Rachel Fourny. Permission is granted for this material to be shared for non-commercial,
Mining User Data: Getting the Most out of your CMS John Fritz, UMBC.
The Duluth Area CIO’s Consortium Collaborating with Regional IT Organizations Copyright Linda Deneen and Lynne Hamre, This work is the intellectual.
Copyright James Kulich This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
© 2009 Pittsburgh Supercomputing Center Server Virtualization and Security Kevin Sullivan Copyright Kevin Sullivan, Pittsburgh Supercomputing.
Chief Information Officer Effectiveness in Higher Education Wayne Brown, Ph.D. Copyright Wayne Brown This work is the intellectual property of the.
Copyright Michael White and Sylvia Maxwell, This work is the intellectual property of the author. Permission is granted for this material to be shared.
© Scottsdale Community College Leveraging the Power of E-Learning Taking your course to a higher level Presented by Sidne Tate Director, Instructional.
1 Carl Berger NlII Spring Focus: Survey results Copyright Carl Berger This work is the intellectual property of the author. Permission is granted.
October 2006 Funded by JISC and ESRC to serve the UK academic and research communities. Voyage of the U.K. JISC Federation: Shibbolizing the U.K.'s Research,
Printing Reduction with PaperCut
SIP Protocol overview SIP Workshop APAN Taipei Taiwan 23rd Aug 2005
Julian Hooker Assistant Managing Director Educause Southwest
Applications of Virtualization & Automation
Evolving Academic Computing Offerings: A Successful Strategy
Adapting Enterprise Security to a University Environment
Designing a Web-Based Student Portfolio System
Copyright Notice Copyright Bob Bailey This work is the intellectual property of the author. Permission is granted for this material to be shared.
Ed Barboni, Senior Advisor, Council of Independent Colleges
Blaine A. Brownell, President,
Project for OnLine Instructional Support (POLIS)
myIS.neu.edu – presentation screen shots accompany:
© Mike Reese This work is the intellectual property of the author
An App A Day Copyright Tina Oestreich and Brian Yuhnke This work is the intellectual property of the author. Permission is granted for this material.
Presentation transcript:

Considerations for Patch Management – an RFP Extensive RFP Extensive RFP Pain in the Butt Pain in the Butt 10 Minutes to tell you about it 10 Minutes to tell you about it If you have to do this process – If you have to do this process – RFP in a box – can save you some time RFP in a box – can save you some time Copyright John DeGolyer This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

What are you After? Microsoft Microsoft Enterprise, A.D., small departments Enterprise, A.D., small departments Multi- O.S. Multi- O.S. Applications Applications Managed service Managed service Different tools – different situations Different tools – different situations

Big Picture – Step back Why is it failing? Why is it failing? Security – Band Aids on Broken Tech Security – Band Aids on Broken Tech OS not built for these times OS not built for these times Built to share information – “groupware” Built to share information – “groupware” Hippies in Redmond Hippies in Redmond M.S. late to IP Ungerman Bass M.S. late to IP Ungerman Bass

Security is changing - Again Firewalls – port 80 attacks Firewalls – port 80 attacks NATS – “Brittle” accountability NATS – “Brittle” accountability VPN / Encryption – encrypts the attack VPN / Encryption – encrypts the attack Host Firewalls – render scanning useless Host Firewalls – render scanning useless Host IPS – Can’t find systems Host IPS – Can’t find systems New attacks – traditional security methods are failing New attacks – traditional security methods are failing

Our criteria? Yet another agent – Really “smart” agent Yet another agent – Really “smart” agent –Talks over NAT –ET calls home –Reports information –Secure communications –Reports vulnerabilities –Safe configurations –Comprehensive Enterprise view

The Best quality: Patching is an Art – not a science Patching is an Art – not a science 1% - 3% failure rate 1% - 3% failure rate 1% sounds low until the 1% is your Dean 1% sounds low until the 1% is your Dean Clones ? Not really – Dell builds Clones ? Not really – Dell builds Software 5% of project cost Software 5% of project cost High Quality Saves time High Quality Saves time Scaling – SQL licensing – gotcha Scaling – SQL licensing – gotcha Per Server – Expensive over enterprise Per Server – Expensive over enterprise

What did we look at? What do we use? Patchlink Patchlink Bigfix – eEye remediation manager Bigfix – eEye remediation manager St. Bernard St. Bernard Everdream Everdream Ecora Ecora Citidel Citidel Shavlik Shavlik Alteris Alteris