Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Silicon batteries are about to upend smartphone battery life

      Silicon batteries are about to upend smartphone battery life

      9 January 2026
      AI hardware booms at CES, but consumer adoption is uncertain

      AI hardware booms at CES, but consumer adoption is uncertain

      9 January 2026
      Major overhaul coming to Gmail

      Major overhaul coming to Gmail

      9 January 2026
      Telecoms firms lose bid to rein in US tech giants

      Telecoms firms lose bid to rein in US tech giants

      9 January 2026
      Watts & Wheels: S1E1 - 'William, Prince of Wheels'

      Watts & Wheels: S1E1 – ‘William, Prince of Wheels’

      8 January 2026
    • World
      Samsung forecasts record operating profit as AI demand sends memory chip prices sharply higher worldwide - TM Roh

      Samsung cashes in on AI data centre boom as memory prices soar

      8 January 2026
      EU pressure mounts on Musk's X over AI 'undressing' images - Wolfram Weimer

      EU pressure mounts on Musk’s X over AI ‘undressing’ images

      7 January 2026
      Intel launches Panther Lake, its next-gen PC chip

      Intel launches Panther Lake, its next-gen PC chip

      6 January 2026
      Starlink plans to lower satellite orbit to enhance safety

      Starlink plans to lower satellite orbit to enhance safety

      4 January 2026
      Lou Gerstner, the man who saved IBM, dies at 83

      Lou Gerstner, the man who saved IBM, dies at 83

      29 December 2025
    • In-depth
      Digital authoritarianism grows as African states normalise internet blackouts

      Digital authoritarianism grows as African states normalise internet blackouts

      19 December 2025
      TechCentral's South African Newsmakers of 2025

      TechCentral’s South African Newsmakers of 2025

      18 December 2025
      Black Friday goes digital in South Africa as online spending surges to record high

      Black Friday goes digital in South Africa as online spending surges to record high

      4 December 2025
      DStv dodges channel blackout in last-minute deal with Warner Bros

      Canal+ plays hardball – and DStv viewers feel the pain

      3 December 2025
      Jensen Huang Nvidia

      So, will China really win the AI race?

      14 November 2025
    • TCS
      TCS+ | Africa's digital transformation - unlocking AI through cloud and culture - Cliff de Wit Accelera Digital Group

      TCS+ | Cloud without culture won’t deliver AI: Accelera’s Cliff de Wit

      12 December 2025
      TCS+ | How Cloud on Demand helps partners thrive in the AWS ecosystem - Odwa Ndyaluvane and Xenia Rhode

      TCS+ | How Cloud On Demand helps partners thrive in the AWS ecosystem

      4 December 2025
      TCS | MTN Group CEO Ralph Mupita on competition, AI and the future of mobile

      TCS | Ralph Mupita on competition, AI and the future of mobile

      28 November 2025
      TCS | Dominic Cull on fixing South Africa's ICT policy bottlenecks

      TCS | Dominic Cull on fixing South Africa’s ICT policy bottlenecks

      21 November 2025
      TCS | BMW CEO Peter van Binsbergen on the future of South Africa's automotive industry

      TCS | BMW CEO Peter van Binsbergen on the future of South Africa’s automotive industry

      6 November 2025
    • Opinion
      ANC's attack on Solly Malatsi shows how BEE dogma trumps economic reality - Duncan McLeod

      ANC’s attack on Solly Malatsi shows how BEE dogma trumps economic reality

      14 December 2025
      Netflix, Warner Bros deal raises fresh headaches for MultiChoice - Duncan McLeod

      Netflix, Warner Bros deal raises fresh headaches for MultiChoice

      5 December 2025
      BIN scans, DDoS and the next cybercrime wave hitting South Africa's banks - Entersekt Gerhard Oosthuizen

      BIN scans, DDoS and the next cybercrime wave hitting South Africa’s banks

      3 December 2025
      ANC's attack on Solly Malatsi shows how BEE dogma trumps economic reality - Duncan McLeod

      Your data, your hardware: the DIY AI revolution is coming

      20 November 2025
      Zero Carbon Charge founder Joubert Roux

      The energy revolution South Africa can’t afford to miss

      20 November 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Information security » ESET introduces proactive vulnerability and patch management

    ESET introduces proactive vulnerability and patch management

    Promoted | Keeping your company safe from vulnerabilities is not only better for business, it makes it easier to obtain protective cyber insurance, says ESET.
    By ESET22 August 2023
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp
    ESET's Steve Flynn
    ESET’s Steve Flynn

    Cybersecurity remains top of mind for all organisations, whatever their size and wherever they are on their digital transformation journey. Naturally, this means that cyber insurance has become an important consideration. However, with policies that exclude specific security issues, businesses face the challenge of knowing how to protect critical data while meeting insurers’ requirements.

    Steve Flynn, sales and marketing director at ESET Southern Africa, notes that IBM Security’s Cost of a Data Breach Report 2022 indicates that 13% of security breaches are trackable to vulnerabilities in third-party software. More crucially, the time needed to identify and contain a breach averages 284 days, which demonstrates that insurers have some valid prejudices. Most notably, coverage is likely to be stopped by the provider if a company fails to act on a known software vulnerability, despite having access to industry-supported updates – particularly if this failure leads to a security breach.

    ESET has worked to ensure that its enterprise-grade offerings clearly reflect the changing needs of businesses

    “While cyber insurance stands as a rearguard precaution against acute risks, the best way to ensure these insurance providers will offer your business the protection you need is to implement a high-quality vulnerability and patch management solution. This is the solution that is ultimately your eyes and ears in respect of identifying vulnerabilities,” he says.

    With this in mind, says Flynn, ESET has introduced its own Vulnerability Assessment (VA) and Patch Management (PM) capability. This falls under the company’s diverse ESET Protect platform.

    “This product suite is aimed at helping businesses of all sizes to proactively detect and remediate security threats, in a timely and efficient manner. By lowering the risk of data breaches and other cyberattacks, while also focusing on other key areas of liability, the solution meets the prerequisites demanded for cyber insurance.”

    “The security landscape requires rapid and effective action, the moment a threat arises. Managing vulnerabilities should therefore be a core aspect of your IT security. Implementing vulnerability and patch management means your business is less likely to experience an interruption of business continuity or a breach resulting from an unpatched known vulnerability,” he continues.

    ESET: on the mitigation frontline

    Flynn is quick to note that the average cost of a data breach in 2022 was calculated to be nearly US$4.35-million. This shows why cyber-insurance firms are reluctant to offer policies to companies without proper vulnerability protection.

    “A 2022 ServiceNow study conducted by the Ponemon Institute found that 57% of victims claimed a breach was due to unpatched vulnerabilities, and even worse, the same study indicated that 34% of these players were already aware of the vulnerability.

    “This is why an automated vulnerability and patch management solution is necessary – not only do you not have to wait for a human to implement the patch, but it can also be difficult and time-consuming to identify and prioritise vulnerabilities based on severity. This could easily lead to inefficient allocation of resources, which in turn creates increased risk.”

    Such tools are vital for businesses of all sizes, he adds. However, for SMEs that might otherwise not be inclined, or may fail to stay in the know about cyber liabilities and vulnerabilities that could devastate their business, a managed service provider (MSP) offers the answer. This benefits them not only from a cost perspective, but also leaves this crucial aspect of the business in the hands of experts.

    It may be considered one of the basics of security, but vulnerability assessment and patch management – when implemented and maintained in league with endpoint security – sits on the frontline when it comes to mitigating cyberattacks.

    “Although security today often tends to focus on threat detection and response, it remains vital that they do not neglect the prevention phase that includes vulnerability assessment and patch management. Moreover, as cyberattacks keep evolving and security demands become increasingly complex, ESET has worked to ensure that its enterprise-grade offerings now clearly reflect the changing needs of businesses of all sizes as they navigate the threat landscape,” continues Flynn.

    For enterprises, managing patches and executing updates across entire networks is a foundation of good security practice. Small and medium businesses, on the other hand, want an easy-to-use solution that will keep them safe from disruption, while also keeping their costs down.

    “Ultimately, the customisable patching policies in ESET Vulnerability and Patch Management give businesses flexibility and control so that their endpoints can be optimally patched promptly, thus minimising the risk of attack. Adopting this capability also ensures they can adhere to increasingly stringent cybersecurity insurance demands, not to mention regulatory requirements. In this way, you can always ensure you remain ahead of the bad actors out there,” he concludes.

    About ESET
    For more than 30 years, ESET has been developing industry-leading IT security software and services to protect businesses, critical infrastructure and consumers worldwide from increasingly sophisticated digital threats. From endpoint and mobile security to endpoint detection and response, encryption and multifactor authentication, ESET’s high-performing, easy-to-use solutions unobtrusively protect and monitor 24/7, updating defences in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company that enables the safe use of technology. This is backed by ESET’s R&D centres worldwide, working in support of our shared future. For more information, visit www.eset.com/za or follow us on LinkedIn, Facebook and Instagram.

    • Read more articles by ESET on TechCentral
    • This promoted content was paid for by the party concerned


    ESET Steve Flynn
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleSouth Africa is at serious risk of catastrophic internet disruption
    Next Article Incredible introduces innovative online business portal

    Related Posts

    TCS+ | From gen AI to deepfakes – the latest infosec threats - Adrian Stanford ESET

    TCS+ | From gen AI to deepfakes – the latest infosec threats

    1 October 2024
    TCS+ | ESET's Adrian Stanford: how AI will transform cybersecurity - Adrian Stanford

    TCS+ | ESET’s Adrian Stanford: how AI will transform cybersecurity

    10 June 2024
    AI's double-edged sword requires a human security approach - Adrian Stanford ESET Southern Africa

    AI’s double-edged sword requires a human security approach

    4 June 2024
    Add A Comment

    Comments are closed.

    Company News
    Owning the right data is the new competitive moat in AI - CallMiner

    Owning the right data is the new competitive moat in AI

    9 January 2026
    Why trust is the real currency in modern media

    Why trust is the real currency in modern media

    6 January 2026
    Why banks and insurers need a single decisioning brain as pressures collide - SAS

    Why banks and insurers need a single decisioning brain as pressures collide

    29 December 2025
    Opinion
    ANC's attack on Solly Malatsi shows how BEE dogma trumps economic reality - Duncan McLeod

    ANC’s attack on Solly Malatsi shows how BEE dogma trumps economic reality

    14 December 2025
    Netflix, Warner Bros deal raises fresh headaches for MultiChoice - Duncan McLeod

    Netflix, Warner Bros deal raises fresh headaches for MultiChoice

    5 December 2025
    BIN scans, DDoS and the next cybercrime wave hitting South Africa's banks - Entersekt Gerhard Oosthuizen

    BIN scans, DDoS and the next cybercrime wave hitting South Africa’s banks

    3 December 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Silicon batteries are about to upend smartphone battery life

    Silicon batteries are about to upend smartphone battery life

    9 January 2026
    AI hardware booms at CES, but consumer adoption is uncertain

    AI hardware booms at CES, but consumer adoption is uncertain

    9 January 2026
    Major overhaul coming to Gmail

    Major overhaul coming to Gmail

    9 January 2026
    Owning the right data is the new competitive moat in AI - CallMiner

    Owning the right data is the new competitive moat in AI

    9 January 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}