Join our daily and weekly newsletters for the latest updates and the exclusive content on AI coverage. Learn more
Unconlected systems are a delay bomb. Fifty-seven percent Victims of cyber attacks recognize that the available patches would have prevented violations, but almost A third party admit Do not act, aggravating risk.
Poned search shows that organizations are now taking an alarming average of 43 days to detect cyber attacks, even after the release of a patch, from 36 days the previous year. According to the Verizon Investigation report on data violations 2024the ability of attackers to exploit vulnerabilities increased by 180% from 2023 to 2024.
The fight against chronic fires makes manual or partially automated fixes too heavy, growing more the priority lists of the teams.
RElying on systems of manual or partially automated correction is considered to be too long, which reduces the correction at the bottom of the list of a team’s action items. It is In accordance with an Ivanti study This revealed that the majority (71%) of IT and security professionals think that the fixes are too complex, heavy and long.
Regarding the patch, complacency kills
The attackers aggressively exploit vulnerabilities and inherited common exhibitions (CVE), often aged ten years or more.
A sure sign of the effectiveness of attackers who become effective in targeting the inherited CVE is their success with vulnerabilities in some cases, more than 10 years. A sure sign that attackers find new ways to arm old vulnerabilities are reflected in surprising statistics that 76% of the vulnerabilities drawn by ransomware were reported between 2010 and 2019. The mesh between security teams and compound safety teams, with 27% missing of cohesive patch strategies and almost a quarter of disagreements on programs. One of the unexpected advantages of automation of the management of fixes is to break the dead end between IT and security when it comes to managing the workload of patches.
“As a general rule, on average, a company can repair 90% of office computers in two to four weeks, 80% of Windows servers in the six weeks and only 25% of Oracle databases within six months from the date of release of the patch”, writes Gartner In their recent report, “We do not give our path of vulnerability exposure. “The report indicates that” cold and hard reality is that no one is repairing actors in the threat on a large scale in any organization, geography or vertical industry. “
Ring deployment: large -scale proactive defense
Each endless termination point or the threat surface invites the attackers to exploit it. Companies lose the patch race, which motivates the attackers even more.
In the meantime, the fix has become exponentially more difficult for security and the IT teams to manage manually. About ten years ago, the deployment of the ring began to count on Microsoft predominantly networks. Since then, ring deployments have proliferated in patch and risk management systems based on cloud and cloud. The deployment of rings provides a progressive automated strategy, narrowing the windows of the attacker and the risk of violation.
The deployment of the rings deploys the fixes progressively through carefully controlled stages or “rings:”
- Test ring (1%): Core IT teams quickly validate the stability of the patch.
- Ring with early adopters (5–10%): A wider internal group confirms the compatibility of the real world.
- Production ring (80–90%): The deployment on the scale of the company after stability is proven in a conclusive manner.
The recent version of the Ivanti Ring deployment is designed to give security teams greater control when the fixes are deployed, systems and how each update sequence will be managed. By attacking correction problems early, the objective is to minimize risks and reduce and eliminate disturbances.
The deployment of the ring crushes MTTP, ends the reactive chaos
Based on obsolete vulnerability notes to direct patches management strategies only increases at the risk of violation, because companies are stored to follow the arrears of increasing patches. It is often when the patch becomes the endless nightmare of cybersecurity, the attackers who seek to capitalize on the many inherited cves which remain unprotected.
Gartner’s point of view in their recent report “ModernZE Windows and a third -party application correction“Makes the point brutally clear, showing how traditional correction methods fail to keep pace. On the other hand, companies embracing the deployment of rings get measurable results. Their research finds that the deployment of the ring realizes a” success of 99% of the patchs within 24 hours up to 100,000 pc “, leaving traditional methods far.
During an interview with Venturebeat, Tony Miller, vice-president of Ivanti business services, stressed that “the Ivanti neurons for the management of patches and the implementation of the deployment of the rings are an important part of our trip to zero customers”. He said the company uses several of its own products, which allows a quick feedback loop and gives developers an overview of customer pain points.
Miller added: “We have tested the deployment of internal rings with a limited group, and we are deploying it on the organizational scale. In our test group, we have benefited from the deployment of fixes according to the real risks and ensuring that updates do not interrupt the productivity of employees – an important challenge for IT organization.”
VentureBeat also spoke with Jesse Miller, SVP and Director of Computer Science in Southstar Bank, on the implementation of the Risk of Dynamic Vulnerability of Ivanti (VRR), a system based on recalibrated AI with real -time threat intelligence, live operating activity and current attack data.
Miller has clearly said: “This is an important change for us and all the industry. Judging a patch based on your CVS now is like working in a vacuum. When you judge how something can have an impact, you have to take everything from current events, your industry, your environment and more in the equation. In the end, we simply added more wise decisions.”
Miller also highlighted the prioritization strategy of his team: “We were able to focus on the priority of zero day and priority fixes to go out first, as well as everything that is operated live in nature. The use of the priority of patches helps us to eliminate our biggest risk so that we can reduce our attack surface as quickly as possible. ”
By combining the deployment of rings and dynamic VRR technology, the Ivanti neurons provides companies with structured visual orchestration of the deployments of incremental patch. This approach strongly reduces the average time (MTTP), accelerating the fixes of the tests targeted by the complete deployment and considerably reducing the exposure windows that the attackers exploit.

Comparison of Ivanti, Microsoft Autopatch, Tanium and ServiceNow neurons: Forces and Keys
When selecting business patches management solutions, apparent differences emerge between the main suppliers, including Microsoft Autopatch, Tanium, ServiceNow and Ivanti neurons.
Microsoft Autopatch Bases on the deployment of rings but is limited to Windows environments, including Microsoft 365 applications. Ivanti neurons develop this concept by covering a wider spectrum, including Windows, MacOS, Linux and various third -party applications. This allows a management of company -scale patches for organizations with large -scale and diversified infrastructure.
Tanium is distinguished by its solid visibility and its detailed report features, but its infrastructure requirements generally align better with companies with a high intensity of resources. Meanwhile, the ServiceNow Force lies in the automation of the workflow and the management of IT services. The execution of real fixes often requires significant additional personalization or third -party integrations.
Ivanti neurons aim to differentiate themselves by integrating the evaluations of dynamic risks, deployments in progressive rings and automated workflows in a single platform. It directly reports to the challenges of the current business in the management of patches, including visibility gaps, operational complexity and uncertainty about the prioritization of vulnerability with real -time risk assessments and intuitive visual dashboards.

Transforming patches management into a strategic advantage
The fix alone cannot eliminate exposure to vulnerability. Gartner analysts continue to underline the need to integrate compensation controls, including the termination points protection platforms (EPP), multifactorial authentication and network segmentation to strengthen security beyond basic corrections.
The combination of the deployment of rings with integrated compensation orders which are part of a wider zero confidence frame guarantees security, allows IT teams to reduce exhibition windows and better manage cyber liking.
Ivanti’s approach to the deployment of rings incorporates real -time risks assessments, automated sanitation workflows and integrated threat management, directly aligning patches management with wider commercial resilience strategies. The design decision to be part of the neurons for the management of patches offers companies on scale must improve real -time visibility of risk management.
Conclusion: The integration of the deployment of rings into remuneration controls and prioritization tools transforms the management of patches of a reactive burden on a strategic advantage.