Aug 08, 2019
03:00 PM
It depends upon just what you mean by High Availability. We do offer a cloud version where we host SVM 2019 in AWS (as opposed to on-prem). If you mean you would like to use your own virtual infrastructure to have High Availability on-prem, I'm sure it could be done but it would be up to your implementation versus anything we'd be able to provide. Please let me know if that does not sufficiently answer your question.
... View more
Aug 06, 2019
09:33 AM
3 Kudos
Repackager is exclusive to AdminStudio and is not provided as part of InstallShield. I will see about having this made more explicitly clear, but InstallShield does not currently document what is not included. Still, a comparison of what comes with AdminStudio versus InstallShield is a good idea.
As you suspected, licensing does not permit you to use the copy of the Stand Alone Repackager purchased for your previous organization at your current organization. Copies from other customers, or trials may not be used to create production packages for your organization-- such is indeed a breach of the license agreement.
... View more
Aug 02, 2019
07:08 AM
1 Kudo
Yes, you can install in a VM. There are no license restrictions here. However, I would suggest installing AdminStudio on your physical machine and running Repackager on your VM from a mapped drive or network share. This way you minimize contamination of your reference system and avoid the complications of maintaining the AdminStudio application catalog database in an environment constantly being reset.
... View more
Aug 02, 2019
07:02 AM
2 Kudos
SVM provides EOL status and not dates at this time. There is an Advisory Published date you can sort on if you are trying to determine age. As we work to unify the back end data between our various products our goal is to not only reduce the need for different agents but to unlock the ability to leverage data between offerings (in this case to expose EOL dates from Data Platform which were outside the scope of our original security data for SVM).
... View more
Jul 31, 2019
08:34 AM
4 Kudos
The team at Flexera continues to deliver on the promise of providing a better way to mitigate security risk for organizations that simply can't afford to keep throwing people at the challenge of addressing software vulnerabilities.
Proper software vulnerability management means effectively identifying and prioritizing the work of patch management, leveraging insights based on threat and vulnerability intelligence. With over 20,000 new vulnerabilities every year, businesses simply can't patch all applications and so must spend their time and effort only on those that represent a significant risk to their IT infrastructure. This can be achieved with Software Vulnerability Manager thanks to four key attributes necessary for success.
Reliable Research
Effective Assessment
Intelligent Prioritization
Rapid Remediation
Improving the power of SVM, we’ve had significant new advances in the areas of both prioritization and remediation. But let’s quickly address each to better appreciate the context of these recent enhancements …
Reliable Research. Acquired by Flexera in 2015, Secunia is well known for quality security research. The Secunia Research team has written over 3,300 insightful security advisories so far this year and it is this valuable research on which SVM is built. Advisories are product-version focused and may contain multiple CVE references. This makes understanding and ranking the importance of updates much easier by focusing on the product version's collective vulnerabilities, versus on specific individual vulnerabilities. Vulnerabilities are validated, documented and rescored based on very specific criteria, providing a normalized view as compared to the wild inconsistencies you’ll observe in a raw resource like the National Vulnerability Database (NVD).
Effective Assessment. File signatures are leveraged to quickly and accurately identify vulnerable versions of software. In many cases, a simple inventory does not provide the granularity necessary to accurately identify the existence of a vulnerable software version. SVM detects over 50k vulnerable software versions.
Intelligent Prioritization. SVM shows you how many vulnerable software instances exist and where they are. Not all assets represent the same risk so you may wish to focus on one group of devices over another. Naturally, with the research attached, you can prioritize based on criticality rating or CVSS score, leveraging our vulnerability intelligence. Further, you can now consider which vulnerabilities have exploits in the wild, leveraging our threat intelligence. Most organizations have more to patch than they have resources to do so, with more popping up regularly. Ensuring you are focusing on those that represent the most risk to your organization is crucial.
Rapid Remediation. With the new SVM Vendor Patch Module, you can now leverage over a thousand out-of-the- box patches (as well as get help with an additional thousand others). Over 50% of time spent on patching is typically focused on researching and testing how to create a patch. Get that time back with integrated access to the largest set of patch information available on the market.
SVM keeps getting better. The recent addition of threat intelligence, and now a gigantic set of out-of- the-box patches is just the beginning. SVM has also just recently released a documented API for SVM 2019, so that you can integrate with other systems and automate custom reporting. Stay tuned for more great enhancements to the best way to protect your organization from the dangers of unpatched software.
... View more
- Tags:
- SVM
Labels
Jul 29, 2019
09:01 AM
1 Kudo
To clarify, SVR supports SSO. SVM 2019 (either hosted or on-prem) does not support SSO today, but it is indeed planned and something we are working to deliver. Thanks!
... View more
Jul 24, 2019
10:24 AM
1 Kudo
Today marks the release of SVM 2019 R3 (for cloud, the on-prem edition will be updated next week) which has some new capabilities I think you’ll really appreciate! It includes the new Vendor Patch Module, documented APIs, as well as agent and smart group enhancements.
The Vendor Patch Module is a new optional feature of SVM 2019 that provides over a thousand out-of-the-box patches as well as details to help you easily create over a thousand others.
API Support is now documented allowing you to integrate SVM 2019 with other systems and processes as well as to pull data for the creation of custom reports.
A signed version of the SVM agent is now available. The standard agent downloads are still available which inject a token to match the agent to your account. This is simple to use but breaks our ability to sign the agent. For those that wish to use a signed version of the agent, a separate download is now provided for which you can specify your account token via an INI file or registry entry (see documentation for details).
CVSS scores have been added as available criteria when creating new Product or Advisory based smart groups. This way, you can focus on specific ranges of products and advisories based on criticality. You’ll also notice the SVM login screen looks different—this was introduced for some consistency between products.
For more details on SVM 2019 R3, please see the release notes. For more details on the Vendor Patch Module, see this blog post.
... View more
Labels
Jul 24, 2019
10:16 AM
7 Kudos
As you see what this is and what’s gone into it, I think you’ll quickly appreciate that this is the result of a very large effort by a lot of people. It took a very long time to bring it to you—I am appropriately excited to finally unveil it to you!
SVM takes software patch management far beyond that of a simple patch catalog. It provides integrated vulnerability research by our Secunia Research team, assesses where vulnerable software is found and provides you with easy-to-leverage insights for prioritizing remediation efforts. It also provides patches so you can more quickly remediate popular applications by publishing updates via WSUS or SCCM. Our patches are wrapped in scripts that provide consistency and customization options. They can also handle edge cases where the vendor update may not behave as expected. To offer such patches, many criteria needed to be met, including the need for the set up to be freely distributable, silently installable and to behave as reliably as expected. Additionally, SVM is all about addressing software vulnerabilities, so we only created patches when a known security vulnerability would be addressed.
Organizations spend way too much time creating deployment packages to update software, and see a patch catalog as a way to offset some percentage of that effort. SVM offers far more patch management capabilities than any patch catalog ever could. However, choosing SVM for all its insights and capabilities should not mean compromising on accessing a large number of time-saving patches.
Today, with the release of the Vendor Patch Module, SVM can now provide over a thousand patches out of the box, as well as details on more than a thousand others to help you create even more patches faster.
With awareness of so many vulnerabilities (thanks to Software Vulnerability Manager) and so many patches at your disposal (thanks to the Vendor Patch Module) you are likely to quickly appreciate the need for intelligent prioritization. Some environment-specific testing is still required, and so you must resist just publishing huge numbers of patches, and prioritize appropriately to patch responsibly. SVM helps you to prioritize by prevalence (how many affected devices are out there), by criticality (the seriousness of a vulnerability), by affected assets (it is common to prioritize some groups of devices over others), and finally, by our new threat score. A threat score is a 0-99 value illustrating the likelihood the vulnerability is being exploited.
Threat Intelligence introduces a new level of insight in prioritization. Most exploited vulnerabilities see a CVSS score between 4 and 7 which would make them outside a typical prioritization that focused on criticality alone. In fact, if you look at the top 20 biggest software vendors, they only represent about 20% of last year's exploited vulnerabilities. SVM with the Threat Intelligence Module and the new Vendor Patch Module work great together by helping you to better prioritize the many patches now at your disposal.
And to that end, there is a promotion on now for the first 100 customers who purchase the Vendor Patch Module: We will provide a free year of the Threat Intelligence Module. Contact your customer support manager or sales representative today to take advantage or contact us here.
Resources
Webinar Registration
Datasheet
List of Patches Included
Documentation
... View more
Labels
Jul 22, 2019
09:39 AM
3 Kudos
It shows this way because the agent is not signed. When you download the agent from your account, a token is injected on the fly to identify your account which prevents our ability to offer a signed agent today. In our upcoming release, we will provide the option to used a signed agent and look to an INI file or registry entry for the token instead of injecting it in this way. This enhancement is planned for release later this month (July 2019).
... View more
Jul 17, 2019
01:34 PM
I'll come back and update this response if I hear otherwise, but I have initial confirmation that nothing has been done since 7.6.1.2 that is expected to have impacted compatibility and so there are no concerns regarding support for Server 2019.
... View more
Jul 17, 2019
07:56 AM
Please open a support ticket to have your activation reset. Just choose "Get Support > Open New Case" above.
... View more
Jul 17, 2019
07:20 AM
4 Kudos
No, SVM 2019 does not perform assessment based on a simple inventory. Such often does not provide the granularity necessary to determine the specific build of an installed application which is necessary to confirm if the installed version is vulnerable or not. To accomplish this we leverage file signatures (both a quick and accurate method).
The good news is that you do not need to install the agent to perform a scan. Many customers choose to simply run the SVM scan as a scheduled task using SCCM, BigFix, Workspace ONE, etc. A simple command line can do the trick and avoids the need for an installation of the agent. Alternatively, SVM can leverage an SCCM inventory if it is configured to collect details about EXE, DLL and OCX files (which are necessary to support a File Signature based scan).
... View more
Jul 16, 2019
11:25 AM
2 Kudos
Yes, the SVM agent is supported on Windows Server 2019 and we will update documentation references accordingly. Thanks!
... View more
Jun 28, 2019
07:27 AM
In Software Vulnerability Manager (formerly Secunia), you can use our white list/black list feature to control what paths are scanned to effectively exclude unwanted applications. Please see the documentation link below and let us know if you have any further questions!
https://helpnet.flexerasoftware.com/csi/Default.htm#helplibrary/Scan_Paths.htm
... View more
Jun 28, 2019
06:58 AM
1 Kudo
Thanks @RDanailov . Worry not, I'm monitoring the forums and captured the feedback. I'm hoping to have our ideation capability up soon which will be much better than this, but I actually prefer individual forum topics over one large thread like this because the back and forth becomes a bit hard to follow with several topics going on in a single thread.
... View more
About
Founder of ITNinja (formerly AppDeploy), author, Microsoft MVP and regular speaker on topics related to application and desktop management and security. Check out a portfolio of my work at https://www.bkelly.com
Director, Product Management
Charlotte, NC
Latest posts by bkelly
Subject | Views | Posted |
---|---|---|
127 | Mar 27, 2023 10:20 AM | |
49 | Mar 27, 2023 10:17 AM | |
48 | Mar 27, 2023 10:03 AM | |
48 | Mar 27, 2023 10:01 AM | |
53 | Mar 27, 2023 08:26 AM | |
50 | Mar 27, 2023 08:23 AM | |
47 | Mar 27, 2023 08:22 AM | |
49 | Mar 27, 2023 08:21 AM | |
48 | Mar 27, 2023 08:20 AM | |
41 | Mar 27, 2023 08:18 AM |
Activity Feed
- Posted Re: Package Feed Request: Amazon Redshift ODBC Driver (x64) on AdminStudio Forum. Mar 27, 2023 10:20 AM
- Posted Re: Package Feed Request: IBM Semeru Runtime Open Edition (JRE) (x86) on AdminStudio Forum. Mar 27, 2023 10:17 AM
- Posted Re: Package Feed Request: IBM Semeru Runtime Open Edition on AdminStudio Forum. Mar 27, 2023 10:03 AM
- Posted Re: Package Feed Request: IBM Semeru Runtime Open Edition on AdminStudio Forum. Mar 27, 2023 10:01 AM
- Posted Re: Package Feed Request: IBM Semeru Runtime Open Edition (JDK) (x64) on AdminStudio Forum. Mar 27, 2023 08:26 AM
- Posted Re: Package Feed Request: IBM Semeru Runtime Open Edition (JDK) 18 (x64) on AdminStudio Forum. Mar 27, 2023 08:23 AM
- Posted Re: Package Feed Request: IBM Semeru Runtime Open Edition (JRE) 18 (x64) on AdminStudio Forum. Mar 27, 2023 08:22 AM
- Posted Re: Package Feed Request: IBM Semeru Runtime Open Edition (JDK) 17 (x64) on AdminStudio Forum. Mar 27, 2023 08:21 AM
- Posted Re: Package Feed Request: IBM Semeru Runtime Open Edition (JDK) 11 (x64) on AdminStudio Forum. Mar 27, 2023 08:20 AM
- Posted Re: Package Feed Request: IBM Semeru Runtime Open Edition (JRE) 17 (x64) on AdminStudio Forum. Mar 27, 2023 08:18 AM
- Posted Re: Package Feed Request: IBM Semeru Runtime Open Edition (JRE) 11 (x64) on AdminStudio Forum. Mar 27, 2023 08:17 AM
- Posted Re: Docker Desktop 4.17.0.99724 from Package Feed Module detected virus (false positive?) on AdminStudio Forum. Mar 27, 2023 08:12 AM
- Posted Re: Package Feed Request: IBM Semeru Runtime Open Edition (JDK) 16 (x64) on AdminStudio Forum. Mar 27, 2023 07:55 AM
- Posted Re: Package Feed Request: IBM Semeru Runtime Open Edition (JRE) 16 (x64) on AdminStudio Forum. Mar 27, 2023 07:54 AM
- Posted Re: Package Feed Request: IBM Semeru Runtime Open Edition (JDK) (x86) on AdminStudio Forum. Mar 27, 2023 07:52 AM
- Posted Re: Package Feed Request: IBM Semeru Runtime Open Edition (JRE) (x64) on AdminStudio Forum. Mar 27, 2023 07:51 AM
- Posted Re: Package Feed Request: Amazon Redshift ODBC Driver (x64) on AdminStudio Forum. Mar 24, 2023 10:48 AM
- Got a Kudo for New SBOM Management in Flexera One. Mar 09, 2023 01:01 PM
- Got a Kudo for Re: New SBOM Management in Flexera One. Mar 09, 2023 10:01 AM
- Got a Kudo for New SBOM Management in Flexera One. Mar 09, 2023 09:37 AM