Join our daily and weekly newsletters to obtain the latest updates and exclusive content on the coverage of the industry leader. Get more information
Non blinking systems are a time pump. Fifty -seven percent of cyber attack victims recognize that available patches would have avoided infractions, but almost a third admits not having acted, aggravating The risk.
Ponmon Research shows that organizations now take an alarming average of 43 days to cybernetic days, just after a patch is launched, compared to the 36 days of the previous year. According to the Verizon 2024 data research research report, the ability of attackers to exploit vulnerabilities increased by 180% from 2023 to 2024.
Chronic fire fighting causes manual or partially automated patches to be heavier, further pushing team priorities lists.
KidneyElying in manual or partial automated patches systems is to consult too much time, further reducing the patches to the lower part of the list of action articles. This is consistent with an Ivanti study that the majority (71%) of IT and security professionals think that patches are excessively complex, cumbersome and that require a lot of time.
When it comes to patches, the complacency kills
The attackers aggressively exploit the common vulnerabilities and exhibitions inherited (CVE), or ten or more years.
A safe sign of how the crafts of effective attackers to attack Legacy CVE is their success with vulnerabilities in some cases, more than 10 years. A safe sign that the attackers are finding new ways of arming ancient vulnerabilities is reflected in the surprising statistic of 76% of water vulnerabilities by ransomware, between 2010 and 2019 were reported. The misalignment between delays and security equipment of security equipment is delayed delayed delays. Almost a quarter does not agree with patches schedules. One of the unexpected benefits of automobile mating management is to break the dead point between IT and security when it comes to administering the workload of the patch.
“Usually, on average, a company can patch 90% or desktop computers within two to four weeks, 80% or Windows servers within the six -week databases and Onacle within six months after the patch release date,” we are recent, “we are recent,” we are recent. “
Ring deployment: proactive scale defense
All final points or the surface surface of the surface invite attackers to exploit it. Companies are losing patches’ career, which further motivates attackers.
Meanwhile, the patch has become exponentially more challenging for security and IT teams to administer the craft. About a decade ago, the ring implementation was based on networks dominated by Microsoft. Since then, ring implementations have proliferated in risk management systems and cloud -based patches. Ring deployment provides an automated strategy, attackers windows and breach risks.
Ring deployment displays patches incremental through carefully controlled stages or rings: “
- Test ring (1%): Core Ti The teams quickly validate the stability of the patch.
- Early adoption ring (5–10%): A broader internal group confirms the compatibility of the real world.
- Production ring (80-90%): Deployment of the entire company after completing the stability proven.
The recent launch of Ivanti of Ring Implementation is designed to provide safety equipment greater control over when patches will be implemented, what systems and how each sequence of updates will be administered. When addressing early patching problems, the objective is to minimize risks and reduce and eliminate interruptions.

The ring deployment crushes MTTP, ends reactive patches chaos
Trusting obsolete vulnerability qualifications to lead patches management strategies only increases the risk of rape as companies run to keep up with the growing patches attacks. That is or when the patch becomes the endless nightmare of Cyber Security, with attackers seeking to capitalize on the many inherited CVE that remain unprotected.
Gartner’s taking in his recent report “modernizing windows and patches of third -party applications” leaves the point brutally clear, showing how traditional patch methods routinely do not keep the pace. In contrast, companies that adopt the implementation of the ring are obtaining measurable results. His research finds the implementation of the ring achieves a “99% patch success within 24 hours for up to 100,000 PCs”, leaving traditional methods far behind.
Duration An interview with Venturebeat, Tony Miller, vice president of Ivanti or business services, emphasized that “Ivanti neurons for patches management and rings deposit implementation are an important part of our zero customer trip.” He said that the company uses many or its own products, which allows a rapid feedback cycle and provides developers an idea of the weak points of customs.
Miller added: “We have tested the ring implementation internally with a limited group, and we are in the process of implementing it throughout the organization. In our test group, we have benefited from implementing patches based on the challenge of real world updates for any IT organization.”
Venturebeat also spoke with Jesse Miller, senior vice president and IT director in Southstar Bank, about the risk of dynamic vulnerability of Ivanti (VRR), a system promoted by Ia continuously recalibrated with real -time ate.
Miller Stateed Clearly: “This is an important change for us and the entire industry. Judging a Patch Based on its cvs now is like working in a vacuum. When Judging How Impactful Subject Can Be, You Have Industry, Your, and Moreon and More Must and More Must and More Must and More Must and More Must and More Must and More Must and More Must and More Must and Moreon and Moreon and Moreon and Moreon and Moreon and Moreon and Moreon and Moreon and Moreon and Moreon and Moreon and More -Sighthed and more synchronization and more sincere hand of the hand, and more Delmento, and the most useless thing
Miller also highlighted the strategy of prioritization of his team: “We have bone capable of concentrating on prioritizing zero and priority patches to go first, as well as anything exploited live in nature. Using the shot of patches to eliminate ourselves, eliminate, eliminate ourselves, we eliminate that we eliminate eliminate. Our attack surface as quickly as possible.”
By combining ring deployment and VRR dynamic technology, Ivanti neurons provide structured visual orchestrations companies for incremental patches deployment. This approach sharply reduces the average time to stop (MTTP), accelerating patches of the tests directed through the complete implementation and the significant decrease of the exposure windows exploited by the attackers.
Comparison of Ivanti neurons, Microsoft Autath, Tanium and Serviceenow: key forces and holes
When selecting business patches management solutions, apparent differences between leading suppliers, including Microsoft Autath, Tanium, Servicewow and Ivanti Neurons arise.
Microsoft Autathch is based on the implementation of the ring, but is restricted to Windows environments, including Microsoft 365 applications. Ivanti neurons expands in this concept by covering a broader spectrum, including Windows, Macos, Linux and several third -party applications. This allows patches management throughout the company for organizations with large -scale and diverse infrastructure.
Tanium stands out for its robust visibility of the end point and its detailed reports of reports, but its infrastructure requirements generally align better with resources intensive in resources. Meanwhile, the Servicenow strength lies in the MANAGEMENT OF WORK FLOW SERVICES and IT automation services. The execution of real patches often requires significant additional customization or third -party integrations.
Ivanti neurons aim to differentiate through the integration of dynamic risk assessments, gradual ring implementations and automated workflows within a single platform. It directly addresses common business challenges in patches management, including visibility gaps, operational complexity and uncertainty about vulnerability prioritization with real -time risk assessments and intuitive visual panels.
Transform patches management into a strategic advantage
Patches alone cannot eliminate exposure to vulnerability. Gartner analysts continue to emphasize the need to integrate compensation controls, including final point protection platforms (PPE), multifactorial authentication and network segmentation to reinforce security beyond the basic patch.
The combination of ring implementation with integrated compensation controls that are part of a broader zero confidence frame guarantees safety, allows IT equipment with exposure to exposure and administer cyber risks.
The Ivanti approach for ring deployment incorporates real -time risk assessments, automated remediation workflows and built -in threat management, directly aligning patches management with broader commercial resilience strategies. The design decision to make part of the neurons for patches management delivers the scale that companies need to improve the real -time visibility of risk management.
In a nutshell: The integration of ring implementation with compensation controls and prioritization tools transforms patches management of a reactive ignition to a strategic advantage.