HCL SW Blogs
Select Page

Database and middleware patching is an important process for organizations to ensure their systems are secure and up to date. By applying the appropriate patches and security updates, organizations can minimize the risk of malicious attacks and potential data loss. BigFix users can enjoy unified patch management by using a single platform for deploying database and middleware patches as they do with other BigFix-supported software and operating systems.

BigFix patch content is provided for the various databases and middleware shown below:

Databases and Middleware of Bigfix support

BigFix Compliance also provides configuration checks for Oracle, MSSQL and IBM DB2, as recommended by the Center for Internet Security (CIS).

BigFix helps organizations keep their software up to date and secure. For more information, reach out to your BigFix Sales Specialist or Contact Us.

 

Comment wrap
Large-scale Ransomware Campaign
Automation | February 8, 2023
Large-scale Ransomware Campaign exploits a two-year-old VMware Vulnerability
The attack campaigns appear to be exploiting CVE-2021-21974 for which a patch has been available since February 23, 2021. Systems running ESXi versions 7.0, 6.7 and 6.5 are currently being targeted and pose the greatest threat.
Large-scale Ransomware Campaign
Automation | February 7, 2023
Large-Scale Ransomware Campaign Exploits a Two-Year-Old VMware Vulnerability
The attack campaigns appear to be exploiting CVE-2021-21974 for which a patch has been available since February 23, 2021. Systems running ESXi versions 7.0, 6.7 and 6.5 are currently being targeted and pose the greatest threat. 
Zero Trust Security
Automation | February 6, 2023
Zero Trust Security: How To Get Your Endpoints Ready
The attacks that exploited the Log4J vulnerability illustrated that malicious actors work quickly to find new ways of compromising organizations. This trend has been growing for several years, making it clear that organizations need to detect and respond to threats much faster than traditional, perimeter-based approaches allow. That’s why both the government and the private sectors have been embracing the paradigm shift to Zero Trust security.
Close
Filters result by
Sort:
|