www.techtarget.com
Open in
urlscan Pro
104.18.18.71
Public Scan
Submitted URL: https://go.techtarget.com/r/304934593/45451293
Effective URL: https://www.techtarget.com/searchitoperations/tip/How-AI-can-automate-IT-patch-management?utm_campaign=20241115_ERU-ACTIVE_...
Submission: On November 18 via api from CA — Scanned from CA
Effective URL: https://www.techtarget.com/searchitoperations/tip/How-AI-can-automate-IT-patch-management?utm_campaign=20241115_ERU-ACTIVE_...
Submission: On November 18 via api from CA — Scanned from CA
Form analysis
1 forms found in the DOMPOST https://www.techtarget.com/search
<form action="https://www.techtarget.com/search" method="post" class="header-search">
<label for="header-search-input" class="visuallyhidden">Search the TechTarget Network</label>
<input class="header-search-input ui-autocomplete-input" id="header-search-input" autocomplete="off" type="text" placeholder="Search the TechTarget Network">
<button aria-label="Search" class="header-search-submit"><i class="icon" data-icon="g"></i></button>
</form>
Text Content
3 Trending Now Red Hat OpenShift Dedicated on Google CloudDownload NowView All3 X 3Hello, these 3 documents have been trending and as a member they are free to you. * Red Hat OpenShift Dedicated on Google CloudDownload Now * How to simplify your Microsoft Azure instance with Red HatDownload Now * Effectively Manage Deployments in Google Cloud with Red Hat InsightsDownload Now Search ITOperations Search the TechTarget Network Login Register Explore the Network * TechTarget Network * Software Quality * App Architecture * Cloud Computing * AWS * TheServerSide * Data Center * Search ITOperations * * Automation & Orchestration * Careers & Skills * Containers & Virtualization * DevOps Tech & Culture * IT Systems Management Other Content * News * Features * Tips * Webinars * 2024 IT Salary Survey Results * Sponsored Sites * More * Answers * Conference Guides * Definitions * Opinions * Podcasts * Quizzes * Tech Accelerators * Tutorials * Videos * Follow: * * * * * * Home * Systems automation and orchestration KOHb - Getty Images KOHb - Getty Images Tip HOW AI CAN AUTOMATE IT PATCH MANAGEMENT AI-BASED PATCH AUTOMATION CAN TAKE PRESSURE OFF THE PROCESS OF SCANNING, TESTING, DEPLOYING AND PRODUCING A REPORT. IS AI THE RIGHT WAY TO GO FOR YOUR ORGANIZATION? * Share this item with your network: * * * * * * * * * * * * By * Nihad Hassan Published: 09 Aug 2024 Organizations can use AI tools to take advantage of the numerous benefits that automated patch management offers, but it comes with some limitations. Patch management uses software devices and procedures to update digital assets such as servers, networking devices or any other digital appliance that run an OS. The goal of patch management is to secure computing devices against cyberthreats and ensure they use the latest drivers, software versions and firmware to run smoothly. Using automated tools for patch management reduces IT support time, makes the attack surface smaller and helps organizations meet compliance requirements. Automated patch tools initiate their tasks automatically based on events, triggers or schedules that admins set to run at predetermined times. A typical manual patch management process involves the following phases: * Scan all computing devices across an organization's IT environment to identify missing patches, outdated applications, firmware and drivers. * Visit each vendor's website to download and install or update the required patch. * Test critical patches, such as those installed on key servers, before applying them to all other devices so they don't stop any feature or function. * Manually install patches on all devices. Automated patch management lets admins execute the previous steps without human intervention. It involves the following phases: * Scan connected devices across an organization's IT environment to identify which devices and applications need security patches or updates. * Automatically connect to each vendor's website to download patches. For example, it can connect to the Cisco portal to patch a Cisco router or firewall. * Test the patch on some devices before applying it to other devices. This is helpful for situations such as applying patches to critical systems that can't go offline. * Produce a detailed report about the patching activities along with their dates, versions and affected systems. These reports are valuable because they act as proof of the business's technical competency and adherence to the best technical standards in protecting users' sensitive data. Later, these reports can be sent to compliance bodies. HOW DOES AI-DRIVEN PATCH MANAGEMENT FACILITATE PATCH MANAGEMENT? AI-powered patch management tools can significantly improve the patching process and make it more intelligent and context aware by performing the following tasks: AUTOMATED PATCH IDENTIFICATION AI can automatically scan connected devices across an organization network and identify relevant vulnerabilities in real time. AI continually monitors patched systems and identifies any anomalies or suspicious behavior. AI then applies remediation actions such as employing additional patches or notifying IT admins to take further actions. PATCH PRIORITIZATION AI-powered patching tools can prioritize required patches based on factors such as the severity of the vulnerability and its impact on core business functions. This lets admins focus on the most critical vulnerabilities that can significantly affect the organization's IT infrastructure and data. BETTER PATCH COMPATIBILITY ANALYSIS AI-powered patching tools use machine learning (ML) models to learn from past patching activities. This improves their ability to identify compatibility issues that might arise when patching systems, allowing them to act promptly and roll back patches or revert systems to their original state. This enhances patching efficiency and saves the time needed to test patches before deployment. LIMITATIONS OF AI-POWERED TOOLS IN PATCH MANAGEMENT Despite the numerous benefits of AI-powered patch management, organizations must consider the following limitations before using the technology: * Compatibility issues. When admins apply patching automatically to complicated environments, it could lead to unexpected issues or system instability. For example, an organization's IT environment might contain a mix of Windows 10 and XP machines. An AI tool would struggle to automatically patch both systems because each one belongs to a different generation of OS. * Lack of context awareness. Patching isn't merely dependent on understanding the technical issues of the target IT environment. Admins must consider other factors when they apply patches, such as regulatory compliance and business priorities. Human insight and guidelines are still required during the patch lifecycle. * Training data quality. The effectiveness of AI-powered patching tools depends on the ML models on which they are trained. For instance, if the underlying training datasets are incomplete, poisoned or have low quality, the patch tool will provide inaccurate recommendations that can severely affect an organization's security posture. * Vendor lock-in. Depending on a specific AI vendor to provide all of your organization's patch management services could result in a vendor lock-in situation. This makes shifting to another patch tool complex and costly. * Cost. Many SMBs can't afford the costs to maintain an AI-based patch automation tool. This can lead to them outsourcing this function, and possibly falling victim to vendor lock-in issues. Nihad A. Hassan is an independent cybersecurity consultant, an expert in digital forensics and cyber open source intelligence, and a blogger and book author. Hassan has been actively researching various areas of information security for more than 15 years and has developed numerous cybersecurity education courses and technical guides. DIG DEEPER ON SYSTEMS AUTOMATION AND ORCHESTRATION * TOP 7 MOBILE DEVICE MANAGEMENT TOOLS TO CONSIDER By: Gary Olsen * OVERVIEW OF NETWORK MANAGEMENT TASKS AND BEST PRACTICES By: Andrew Froehlich * WINDOWS SERVER UPDATE SERVICES (WSUS) By: Kinza Yasar * SOFTWARE PATCH By: Cameron Hashemi-Pour Sponsored News * Three Ways to Beat the Complexity of Storage and Data Management to Spark ... –HPE * Three Innovative AI Use Cases for Natural Language Processing –Dell Technologies * Universal Network Visibility Empowers Modern Digital Infrastructure –HPE * See More Related Content * Overview of network management tasks and best ... – Search Networking * How to mitigate EMM security threats – Mobile Computing * 8 WSUS alternatives for patch management – SearchWindows Server Latest TechTarget resources * Software Quality * Application Architecture * Cloud Computing * AWS * Java * Data Center Search Software Quality * Scrum master responsibilities: What does a Scrum master do? While the title may sound authoritative, Scrum masters have little control over their team. So, what exactly does a Scrum master ... * Ultimate Markdown guide: 5 rules to know Markdown is crucial to documentation writers. Learn the vendor-based variations and several basic formatting rules to get started... * How to improve DevOps through collaboration Collaboration is key in DevOps, surpassing any one tool, product or individual. Discover why collaboration is crucial and tips ... Search App Architecture * Webhooks explained simply, with examples Webhooks make significant use of basic API call mechanisms and set event triggers in a few clicks of a button -- all without the ... * Managing complexity: Event-driven architecture explained Event-driven architecture is complex, but so are today's data challenges. Discover ways to manage dynamic and distributed ... * 8 microservices best practices to remember From integrating domain-driven design to securing APIs, explore a range of microservices best practices for building a resilient ... Cloud Computing * How to build a business case for cloud migration Successful cloud migrations start with a solid business plan that details the costs, benefits, risks and challenges to key ... * Managed identity vs. service principal for Azure apps Managed identities automate identity management for Azure-native applications, while service principals are ideal for external ... * Top cloud migration service providers and how to choose one Tools, services and pricing vary widely, and often, the options are platform-specific. Here's a rundown of seven representative ... Search AWS * Compare Datadog vs. New Relic for IT monitoring in 2024 Compare Datadog vs. New Relic capabilities including alerts, log management, incident management and more. Learn which tool is ... * AWS Control Tower aims to simplify multi-account management Many organizations struggle to manage their vast collection of AWS accounts, but Control Tower can help. The service automates ... * Break down the Amazon EKS pricing model There are several important variables within the Amazon EKS pricing model. Dig into the numbers to ensure you deploy the service ... TheServerSide.com * MySQL vs. PostgreSQL: Compare popular open source databases This deep dive compares two popular open source database options, MySQL vs. PostgreSQL, across key categories including ... * OKRs vs. KPIs: Driving bold outcomes and measuring steady performance KPIs track outputs, and OKRs focus on outcomes or changes in user behavior. Here's how business can use them together to measure ... * How to solve the pinning problem in Java virtual threads Virtual threads in Java offer many benefits, but they're not a drop-in replacement for traditional threads. Understand and plan ... Search Data Center * Projections and feasibility of data centers in space Earth has a limited amount of land, and data centers occupy large amounts of it. Data centers in space would reduce land use and ... * CHIPS Act expected to survive, change under Trump Changes to the Biden administration's application guidelines for the CHIPS Act, some of which Republicans fought against, are ... * Solar shift: How data centers can embrace renewable energy Demand for electricity calls for integration of renewable resources. Solar power provides data centers with energy independence, ... * About Us * Editorial Ethics Policy * Meet The Editors * Contact Us * Advertisers * Partner with Us * Media Kit * Corporate Site * Contributors * Reprints * Answers * Definitions * E-Products * Events * Features * Guides * Opinions * Photo Stories * Quizzes * Tips * Tutorials * Videos All Rights Reserved, Copyright 2016 - 2024, TechTarget Privacy Policy Cookie Preferences Cookie Preferences Do Not Sell or Share My Personal Information Close