Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Automating third-party application patching in Microsoft ConfigMgr or Intune will allow you to save time and increase security. Auto-create applications to automate the initial deployment of products within Microsoft SCCM or Intune. You can include icons, keywords, descriptions, as well as many other things! We will keep the base installations up-to-date automatically. There is no need to wait for updates to apply or deploy old apps. SCCM already supports the installation of products. This includes task sequences and collection deployments. To perform environment-specific configurations, you can add your own pre/post-update scripts. To ensure that you are able to manage when and how updates are applied in your enterprise, disable the self-update function within applications.

Description

Incorporating robust security measures into the software delivery lifecycle enhances both efficiency and agility significantly. It is crucial that security policies remain adaptable, easy to understand, and unaffected by any existing technical debt. Applications should be securely deployed whether in on-premises, hybrid, or cloud environments. Automating compliance with established security protocols is essential to reduce delays and prevent urgent issues from arising. Ensuring that your applications maintain security during runtime with minimal performance overhead—ideally below 3%—is vital in production settings. For organizations operating under stringent regulatory standards, agent-less solutions pose considerable challenges due to their limitations in meeting strict security requirements. Consequently, Waratek utilizes an agent to facilitate autonomous operations, allowing it to effectively address previously unknown threats, which sets it apart from agent-less approaches. Furthermore, it is possible to virtually upgrade applications and their dependencies, such as Log4j, without necessitating code alterations, vendor updates, or interruptions in service. This capability ensures that organizations can maintain security and compliance without sacrificing operational continuity.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

No details available.

Integrations

No details available.

Pricing Details

$2 per device per year
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Patch My PC

Founded

2011

Country

United States

Website

patchmypc.com/third-party-patch-management-for-sccm-and-intune

Vendor Details

Company Name

Waratek

Founded

2009

Country

Ireland

Website

waratek.com/secure/

Product Features

IT Management

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Patch Management

Alerts/Notifications
Automatic Approval
Automatic Patch Deployment
Automatic Scans
Compliance Management
Custom Patches
Dashboard
Network Wide Management
Patch Prioritization
Patch Testing
Remote Access/Control
Vulnerability Scanning

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Product Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Patch Management

Alerts/Notifications
Automatic Approval
Automatic Patch Deployment
Automatic Scans
Compliance Management
Custom Patches
Dashboard
Network Wide Management
Patch Prioritization
Patch Testing
Remote Access/Control
Vulnerability Scanning

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Alternatives

Alternatives

SanerNow Reviews

SanerNow

SecPod Technologies