www.techtarget.com Open in urlscan Pro
104.18.18.71  Public Scan

Submitted URL: https://go.techtarget.com/r/304934593/45451293
Effective URL: https://www.techtarget.com/searchitoperations/tip/How-AI-can-automate-IT-patch-management?utm_campaign=20241115_ERU-ACTIVE_...
Submission: On November 18 via api from CA — Scanned from CA

Form analysis 1 forms found in the DOM

POST https://www.techtarget.com/search

<form action="https://www.techtarget.com/search" method="post" class="header-search">
  <label for="header-search-input" class="visuallyhidden">Search the TechTarget Network</label>
  <input class="header-search-input ui-autocomplete-input" id="header-search-input" autocomplete="off" type="text" placeholder="Search the TechTarget Network">
  <button aria-label="Search" class="header-search-submit"><i class="icon" data-icon="g"></i></button>
</form>

Text Content

3
Trending Now

Red Hat OpenShift Dedicated on Google CloudDownload NowView All3
X
3Hello, these 3 documents have been trending and as a member they are free to
you.
 * 
   Red Hat OpenShift Dedicated on Google CloudDownload Now
 * 
   How to simplify your Microsoft Azure instance with Red HatDownload Now
 * 
   Effectively Manage Deployments in Google Cloud with Red Hat InsightsDownload
   Now




Search ITOperations
Search the TechTarget Network
Login Register
Explore the Network
 * TechTarget Network
 * Software Quality
 * App Architecture
 * Cloud Computing
 * AWS
 * TheServerSide
 * Data Center

 * Search ITOperations
 * * Automation & Orchestration
   * Careers & Skills
   * Containers & Virtualization
   * DevOps Tech & Culture
   * IT Systems Management
   Other Content
    * News
    * Features
    * Tips
    * Webinars
    * 2024 IT Salary Survey Results
    * Sponsored Sites
    * More
       * Answers
       * Conference Guides
       * Definitions
       * Opinions
       * Podcasts
       * Quizzes
       * Tech Accelerators
       * Tutorials
       * Videos

 * Follow:
 * 
 * 
 * 
 * 
 * 


 * Home
 * Systems automation and orchestration

KOHb - Getty Images

KOHb - Getty Images

Tip


HOW AI CAN AUTOMATE IT PATCH MANAGEMENT




AI-BASED PATCH AUTOMATION CAN TAKE PRESSURE OFF THE PROCESS OF SCANNING,
TESTING, DEPLOYING AND PRODUCING A REPORT. IS AI THE RIGHT WAY TO GO FOR YOUR
ORGANIZATION?

 * Share this item with your network:
 * 
 * 
 * 
 * 
 * 

 * 
 * 
 *  * 
    * 
    * 
    * 


By
 * Nihad Hassan

Published: 09 Aug 2024

Organizations can use AI tools to take advantage of the numerous benefits that
automated patch management offers, but it comes with some limitations.



Patch management uses software devices and procedures to update digital assets
such as servers, networking devices or any other digital appliance that run an
OS. The goal of patch management is to secure computing devices against
cyberthreats and ensure they use the latest drivers, software versions and
firmware to run smoothly.

Using automated tools for patch management reduces IT support time, makes the
attack surface smaller and helps organizations meet compliance requirements.
Automated patch tools initiate their tasks automatically based on events,
triggers or schedules that admins set to run at predetermined times. A typical
manual patch management process involves the following phases:

 * Scan all computing devices across an organization's IT environment to
   identify missing patches, outdated applications, firmware and drivers.
 * Visit each vendor's website to download and install or update the required
   patch.
 * Test critical patches, such as those installed on key servers, before
   applying them to all other devices so they don't stop any feature or
   function.
 * Manually install patches on all devices.

Automated patch management lets admins execute the previous steps without human
intervention. It involves the following phases:

 * Scan connected devices across an organization's IT environment to identify
   which devices and applications need security patches or updates.
 * Automatically connect to each vendor's website to download patches. For
   example, it can connect to the Cisco portal to patch a Cisco router or
   firewall.
 * Test the patch on some devices before applying it to other devices. This is
   helpful for situations such as applying patches to critical systems that
   can't go offline.
 * Produce a detailed report about the patching activities along with their
   dates, versions and affected systems. These reports are valuable because they
   act as proof of the business's technical competency and adherence to the best
   technical standards in protecting users' sensitive data. Later, these reports
   can be sent to compliance bodies.


HOW DOES AI-DRIVEN PATCH MANAGEMENT FACILITATE PATCH MANAGEMENT?

AI-powered patch management tools can significantly improve the patching process
and make it more intelligent and context aware by performing the following
tasks:


AUTOMATED PATCH IDENTIFICATION

AI can automatically scan connected devices across an organization network and
identify relevant vulnerabilities in real time. AI continually monitors patched
systems and identifies any anomalies or suspicious behavior. AI then applies
remediation actions such as employing additional patches or notifying IT admins
to take further actions.


PATCH PRIORITIZATION

AI-powered patching tools can prioritize required patches based on factors such
as the severity of the vulnerability and its impact on core business functions.
This lets admins focus on the most critical vulnerabilities that can
significantly affect the organization's IT infrastructure and data.


BETTER PATCH COMPATIBILITY ANALYSIS

AI-powered patching tools use machine learning (ML) models to learn from past
patching activities. This improves their ability to identify compatibility
issues that might arise when patching systems, allowing them to act promptly and
roll back patches or revert systems to their original state. This enhances
patching efficiency and saves the time needed to test patches before deployment.


LIMITATIONS OF AI-POWERED TOOLS IN PATCH MANAGEMENT

Despite the numerous benefits of AI-powered patch management, organizations must
consider the following limitations before using the technology:

 * Compatibility issues. When admins apply patching automatically to complicated
   environments, it could lead to unexpected issues or system instability. For
   example, an organization's IT environment might contain a mix of Windows 10
   and XP machines. An AI tool would struggle to automatically patch both
   systems because each one belongs to a different generation of OS.
 * Lack of context awareness. Patching isn't merely dependent on understanding
   the technical issues of the target IT environment. Admins must consider other
   factors when they apply patches, such as regulatory compliance and business
   priorities. Human insight and guidelines are still required during the patch
   lifecycle.
 * Training data quality. The effectiveness of AI-powered patching tools depends
   on the ML models on which they are trained. For instance, if the underlying
   training datasets are incomplete, poisoned or have low quality, the patch
   tool will provide inaccurate recommendations that can severely affect an
   organization's security posture.
 * Vendor lock-in. Depending on a specific AI vendor to provide all of your
   organization's patch management services could result in a vendor lock-in
   situation. This makes shifting to another patch tool complex and costly.
 * Cost. Many SMBs can't afford the costs to maintain an AI-based patch
   automation tool. This can lead to them outsourcing this function, and
   possibly falling victim to vendor lock-in issues.

Nihad A. Hassan is an independent cybersecurity consultant, an expert in digital
forensics and cyber open source intelligence, and a blogger and book author.
Hassan has been actively researching various areas of information security for
more than 15 years and has developed numerous cybersecurity education courses
and technical guides.



DIG DEEPER ON SYSTEMS AUTOMATION AND ORCHESTRATION

 * TOP 7 MOBILE DEVICE MANAGEMENT TOOLS TO CONSIDER
   
   
   By: Gary Olsen

 * OVERVIEW OF NETWORK MANAGEMENT TASKS AND BEST PRACTICES
   
   
   By: Andrew Froehlich

 * WINDOWS SERVER UPDATE SERVICES (WSUS)
   
   
   By: Kinza Yasar

 * SOFTWARE PATCH
   
   By: Cameron Hashemi-Pour

Sponsored News
 * Three Ways to Beat the Complexity of Storage and Data Management to Spark ...
   –HPE
 * Three Innovative AI Use Cases for Natural Language Processing –Dell
   Technologies
 * Universal Network Visibility Empowers Modern Digital Infrastructure –HPE
 * See More

Related Content
 * Overview of network management tasks and best ... – Search Networking
 * How to mitigate EMM security threats – Mobile Computing
 * 8 WSUS alternatives for patch management – SearchWindows Server


Latest TechTarget resources
 * Software Quality
 * Application Architecture
 * Cloud Computing
 * AWS
 * Java
 * Data Center

Search Software Quality
 * Scrum master responsibilities: What does a Scrum master do?
   
   While the title may sound authoritative, Scrum masters have little control
   over their team. So, what exactly does a Scrum master ...

 * Ultimate Markdown guide: 5 rules to know
   
   Markdown is crucial to documentation writers. Learn the vendor-based
   variations and several basic formatting rules to get started...

 * How to improve DevOps through collaboration
   
   Collaboration is key in DevOps, surpassing any one tool, product or
   individual. Discover why collaboration is crucial and tips ...

Search App Architecture
 * Webhooks explained simply, with examples
   
   Webhooks make significant use of basic API call mechanisms and set event
   triggers in a few clicks of a button -- all without the ...

 * Managing complexity: Event-driven architecture explained
   
   Event-driven architecture is complex, but so are today's data challenges.
   Discover ways to manage dynamic and distributed ...

 * 8 microservices best practices to remember
   
   From integrating domain-driven design to securing APIs, explore a range of
   microservices best practices for building a resilient ...

Cloud Computing
 * How to build a business case for cloud migration
   
   Successful cloud migrations start with a solid business plan that details the
   costs, benefits, risks and challenges to key ...

 * Managed identity vs. service principal for Azure apps
   
   Managed identities automate identity management for Azure-native
   applications, while service principals are ideal for external ...

 * Top cloud migration service providers and how to choose one
   
   Tools, services and pricing vary widely, and often, the options are
   platform-specific. Here's a rundown of seven representative ...

Search AWS
 * Compare Datadog vs. New Relic for IT monitoring in 2024
   
   Compare Datadog vs. New Relic capabilities including alerts, log management,
   incident management and more. Learn which tool is ...

 * AWS Control Tower aims to simplify multi-account management
   
   Many organizations struggle to manage their vast collection of AWS accounts,
   but Control Tower can help. The service automates ...

 * Break down the Amazon EKS pricing model
   
   There are several important variables within the Amazon EKS pricing model.
   Dig into the numbers to ensure you deploy the service ...

TheServerSide.com
 * MySQL vs. PostgreSQL: Compare popular open source databases
   
   This deep dive compares two popular open source database options, MySQL vs.
   PostgreSQL, across key categories including ...

 * OKRs vs. KPIs: Driving bold outcomes and measuring steady performance
   
   KPIs track outputs, and OKRs focus on outcomes or changes in user behavior.
   Here's how business can use them together to measure ...

 * How to solve the pinning problem in Java virtual threads
   
   Virtual threads in Java offer many benefits, but they're not a drop-in
   replacement for traditional threads. Understand and plan ...

Search Data Center
 * Projections and feasibility of data centers in space
   
   Earth has a limited amount of land, and data centers occupy large amounts of
   it. Data centers in space would reduce land use and ...

 * CHIPS Act expected to survive, change under Trump
   
   Changes to the Biden administration's application guidelines for the CHIPS
   Act, some of which Republicans fought against, are ...

 * Solar shift: How data centers can embrace renewable energy
   
   Demand for electricity calls for integration of renewable resources. Solar
   power provides data centers with energy independence, ...

 * About Us
 * Editorial Ethics Policy
 * Meet The Editors
 * Contact Us
 * Advertisers
 * Partner with Us
 * Media Kit
 * Corporate Site

 * Contributors
 * Reprints
 * Answers
 * Definitions
 * E-Products
 * Events
 * Features

 * Guides
 * Opinions
 * Photo Stories
 * Quizzes
 * Tips
 * Tutorials
 * Videos

All Rights Reserved, Copyright 2016 - 2024, TechTarget

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information


Close