What Sets Security Controls Apart from the Others?
Features
Item |
Description |
Ease of use |
Security Controls can be installed and used to deploy missing patches within minutes; not days, weeks, or months. |
Real-time patch validation |
Security Controls utilizes data files that are updated the moment a security patch is released. |
Agentless and agent-based operation |
Provides the ability to manage network machines directly from a console and to manage hard-to-reach |
Background (non-modal) tasking |
Enables multiple tasks to run at the same time. Simultaneously perform patch |
Patch replacement |
Only those patches that are necessary and applicable to the scanned platform are evaluated during the scan process. Unnecessary and replaced patches are not presented (although you can configure the program to do this if you want). |
Provides the ability to support additional non-Microsoft products simply by updating the necessary data files. |
|
Virtual machine support |
Operates exactly the same on both physical machines and on virtual machines that are online. |
Security and Integrity
Item |
Description |
Detailed Patch Analysis and Validation |
File versions and registry keys are evaluated to aid in determining patch status. Solutions that rely solely on registry keys and/or minimum file versions are unable to differentiate between legitimate files and trojaned files, including patches that have been re-released by Microsoft. |
External validation data |
File data used to perform patch validation tests are obtained from a signed source independent of the machine being scanned. |
Data file anti-spoofing protection |
The data definition file is parsed only if obtained from a valid, specifically signed CAB file or SSL location. |
Trojan protection |
All digitally-signed vendor files are validated prior to patch deployment.
|