Unpatched systems are a ticking time bomb. Seven -fifty percent From cyber attack victims recognize that available patches would have prevented violations, but almost almost A 3rd don’t act, compound The risk.
Ponmon research now shows firms an alarming average of 43 Days to acknowledge cyber attacks even after a patch has been published 36 Days within the previous 12 months. After Verizon 2024 Investigation report for data injuriesthe flexibility of the attackers to make use of weaknesses 180% from 2023 to 2024.
Chronic fire brigade makes manual or partially automated patching overly stressful and further presses the priority lists of the patching teams.
REly-on manual or partially automated patching systems is taken into account too time-consuming, which further reduces patching to a team's motion article list. That is In accordance with an Ivanti study This showed that almost all (71%) of IT and security specialists consider that patching is excessively complex, cumbersome and time -consuming.
When it involves patching, complacency kills
Interrorders use aggressive legacies shared vulnerabilities and exposure (CVES), often ten or more years old.
A protected sign of how effective attackers of crafts on the Legacy-CVE are dependent, your success with weaknesses is greater than 10 years in some cases. A protected sign that attackers find latest ways to master old weaknesses is reflected within the surprising status that 76% of the weaknesses lived by ransomware were reported between 2010 and 2019. The misalignment between IT and security teams improves delays, with 27% of the coherent patch patch strategies and almost 1 / 4 to not disabilities to the patch time plans. One of the unexpected benefits of automating the patch management is to interrupt the dead end between it and the safety in relation to managing the patch workload.
“Usually an organization can patch a mean of 90% of the desktop inside two to 4 weeks, 80% of the Windows servers inside six weeks and only 25% of the Oracle databases inside six months after the patch date,” writes it Gardener In her last report “,”We don't put ourselves out of vulnerability exposure. “” “The report says that” the cold, hard reality is that no one can get vertically in the dimensions organization, geography or industries. “
Processed ring: Proactive defense in Skala
Every unpatched end point or threat interface invites attackers to make the most of it. Companies lose the patching race that motivates the attackers much more.
In the meantime, patching for security and IT teams has change into more exponentially difficult with the intention to manually manage. About a decade ago, the usage of the ring began to depart Microsoft dominated networks. Since then, ring proposals in local and cloud-based patch and risk management systems have increased. The ring provision offers a gradual automated strategy, shrinking attacking windows and injury risks.
The ring provision introduces in gradual patches through rigorously controlled phases or “rings:” incrementally
- Test ring (1%): Core IT teams quickly validate the patch stability.
- Early prosecutor ring (5–10%): A wider internal group confirms the compatibility of the true world.
- Production ring (80–90%): Enterprise-Wide rollout after stability is clearly demonstrated.
Ivanti's most up-to-date publication of Ring Deployment should enable security teams to supply greater control over the management of patches by providing patches to which systems and the way each episode of updates is managed. By starting patching problems early, the goal is to attenuate risks and reduce and eliminate disorders.
Ring preparation crushed MTTP, ends reactive patch chaos
If you depend on outdated vulnerability evaluations to guide Patch management strategies, the danger of a violation is just increased because firms run to maintain up with growing patch residues. This is commonly the infinite nightmare of cyber security when patching, with attackers who want to learn from the numerous legacy cves who remain unprotected.
Gartner's admission to her last report “ModernZE Windows and third-party use patching“Makes the purpose brutally and shows how conventional patching methods routinely keep step. In contrast, firms that include the supply of ring deployments. Your research leads to the undeniable fact that the ring preparation leads to a” 99% fatch success inside 24 hours for as much as 100,000 PCs “and leave traditional methods far behind.
During an interview with Venturebeat, Tony Miller, Ivantis VP of Enterprise Services, emphasized that “Ivanti neurons for patch management and the implementation of the ring provision are a crucial a part of our customer dull trip”. He said that the corporate uses a lot of its own products, which enables quick feedback loop and provides developers an insight into the pain points of consumers.
Miller added: “We tested the ring provision internally with a limited group, and we’re within the strategy of publishing them organizationally. In our test group, we benefited from this, patches based on the true risk based on the true risk and ensuring that updates don’t interrupt the productivity of a crucial challenge for an IT organization.”
Venturebeat also spoke to Jesse Miller, SVP and director of IT at Southstar Bank, concerning the use of Ivantis dynamic weakness risk assessment (VRR), an AI-controlled system that was repeatedly re-calibrated with real-time threat information, live exploit activities and current attack data.
Miller clearly explained: “This is a crucial change for us and your complete industry. To judge a patch on the premise of its CVSS, as in a vacuum. If you judge how impressive something will be, you’ve to do all the things from current events, your industry, your surroundings and more within the equation. We simply make us condemn that we simply don’t do the worth value rankings.
Miller also emphasized the prioritization strategy of his team: “We were capable of consider the prioritization of zero-day and priority patches to get out first and all the things that’s exploited live within the wild. The use of patch prioritization helps us first eliminate our best risk in order that we will reduce our attack surface as quickly as possible.”
Through the mix of ringing and dynamic VRR technology, Ivanti -Neuron firms offers structured visual orchestration of incremental patch -rollouts. This approach significantly reduces the medium-sized-time-to-patch (MTTP), accelerates patches from targeted tests through complete provision and significantly reduces the exposure window that the attackers exploit.

Comparison of Ivanti neurons, Microsoft Autopatch, Tanium and ServiceNow: key strength and gaps
When selecting company -patch management solutions, there are obvious differences among the many leading providers, including Microsoft autopatch, tanium, service and Ivanti neurons.
Microsoft Autopatch relies on the supply of ring, but is restricted to Windows environments, including Microsoft 365 applications. Ivanti neurons expand this idea by covering a wider spectrum, including Windows, MacOS, Linux and various third -party applications. This enables an enterprising patch management for organizations with large-scale, diverse infrastructure.
Tanium is characterised by its robust endpoint visibility and detailed reporting functions. In the meantime, the strength of ServiceNow lies within the workflow automation and IT service management integrations. The execution of actual patches often requires considerable additional adjustments or integrations of third -party providers.
Ivanti neurons want to distinguish by integrating dynamic risk assessments, phased ring proposals and automatic workflows inside a single platform. It deals directly with common corporate problems in patch management, including visibility gaps, operational complexity and uncertainty about prioritization of vulnerability with real-time risk reviews and intuitive visual dashboards.

Transform the patch management right into a strategic advantage
Patching alone cannot remove exposure to vulnerability. Gartner's analysts proceed to emphasise the necessity to integrate compensation controls, including endpoint protection platform (EPP), multifactor authentication and network segmentation with the intention to increase the security beyond the fundamental patchs.
The combination of ringing with integrated compensation controls, that are a part of a wider zero-trust frameworks, ensures security, the IT teams can reduce the exposure windows and higher manage the cyber risks.
Ivanti's approach for ringing the ring includes real-time risk reviews, automated renovation and integrated threat management, which direct patch management directly with wider strategies for resilience for firms. The design decision to make it a part of neurons for patch management provides the standards that firms need to enhance the real-time visibility of risk management.
Conclusion: The integration of ringing in compensation into compensating controls and prioritization tools transforms patch management from a reactive stress to a strategic advantage.