SCN Solutions - Providing IT Your Way
Call: 215-820-6412

Patch Management

Our system patches Microsoft Windows desktops,servers, Mac® OS X®, Linux® and more than 50 third-party operating systems and applications.  It can deploy both security and non-security patches.

More than 50,000 vulnerability assessments are carried out across your networks, including virtual environments. We scan your operating systems, virtual environments and installed applications through vulnerability check databases such as OVAL and SANS Top 20. This enables you to diagnose the state of your network security, identify security risks to your network, and address how to take action before it is compromised.

Patch Management Features

Supports Windows ProductsSupports ALL updates (including non-security updates) for Microsoft Windows and other Microsoft products including Office and Exchange.

Browser SupportCovers all 5 major browsers – Explorer, Chrome, Firefox, Safari and Opera

Third Party ApplicationsSupport includes most commonly exploited Adobe and Oracle Java, Other vendor support including Apple, Mozilla, Zip tools and more as well as Skype and Yahoo Messenger.

Key Capabilities

Patch Management
And Applications

Patch management is vital to your business. Small and medium based businesses face network security breaches most commonly because of missing network patches. Scans detect network vulnerabilities before they are exposed, reducing the time required to patch machines on your network. Our system patches Microsoft Windows desktops and servers, Mac® OS X®, Linux® and more than 50 third-party operating systems and applications, and deploys both security and non-security patches.

More than 50,000 vulnerability assessments are carried out across your networks, including virtual environments. We scan your operating systems, virtual environments and installed applications through vulnerability check databases such as OVAL and SANS Top 20. This enables you to diagnose the state of your network security, identify security risks to your network, and address how to take action before it is compromised.

Vulnerability Audit Checks

During security audits, vulnerability assessments are conducted., you can perform multi-platform scans (e.g., Windows®, Mac OS®, Linux®; and iOS, Android™ and Windows phone devices that connect to the Exchange servers) across all environments, including virtual machines, and analyze your network’s security setup and status.

As well as running vulnerability checks on computers on your network, Our system also supports vulnerability scanning on smartphones and tablets running Windows®, Android™ and iOS, plus a number of network devices such as printers, routers and switches from manufacturers like HP and Cisco.

Network auditing gives you a comprehensive view of your network: connected USB devices, smartphones and tablets; software that is installed; any open shares, open ports and weak passwords in use; and hardware information.

Monitor Server / Desktop
Critical Functions

Our Server Monitors maximizes your network availability by monitoring most aspects of your Windows and Linux servers, workstations and devices.

Linux users can monitor CPU usage, printer availability, file existence, process running, folder size, file size, users and groups membership, disk partition check and disk space.

Once our system detects a failure, it sends alerts to you via SMS, email, or even a network message. You can configure specific periods for your reports or as an alert so you are notified immediately.

Asset Tracking And
Remote Management

Remote web monitor offers system a great deal of freedom, enabling us to quickly and effectively service our clients from anywhere in the world where you can use a browser. That reduces response times to system issues, enabling us to minimize down time in your organization.

Asset tracking gives you a comprehensive view of your network: smartphones and tablets; software that is installed; any open shares, open ports and hardware information. Our in-depth reports give you an important and real-time snapshot of your network’s status.

Automated network security audits scan, with the help of agents, across all client machines. The administrator simply needs to define the network perimeter and provide credentials to enable automatic network discovery, agent deployment and auditing of the client machines.