Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      Beyond instinct: how AI is reshaping retail store layouts in South Africa

      15 May 2025

      Company behind South African-built geyser claims up to 84% energy savings

      15 May 2025

      PIC appoints new CEO

      15 May 2025

      Huge crypto exchange hit by cyberattack

      15 May 2025

      Trump tells Tim Cook: stop building iPhone plants in India

      15 May 2025
    • World

      Microsoft to lay off 3% of workforce in organisation-wide cuts

      14 May 2025

      AI-voiced audiobooks are coming to Audible

      13 May 2025

      Apple turns to AI to tackle iPhone battery woes

      13 May 2025

      Vodafone CFO to step down

      7 May 2025

      Lights, camera, tariffs: Trump declares war on foreign flicks

      5 May 2025
    • In-depth

      South Africa unveils big state digital reform programme

      12 May 2025

      Is this the end of Google Search as we know it?

      12 May 2025

      Social media’s Big Tobacco moment is coming

      13 April 2025

      This is Europe’s shot to emerge from Silicon Valley’s shadow

      10 April 2025

      Microsoft turns 50

      4 April 2025
    • TCS

      Meet the CIO | Schalk Visser on Cell C’s big tech pivot

      13 May 2025

      TCS | Kiaan Pillay on fintech start-up Stitch and its R1-billion funding round

      7 May 2025

      TCS+ | Switchcom and Huawei eKit: networking made easy for SMEs

      6 May 2025

      TCS | How Covid sparked a corporate tug-of-war over Adapt IT

      30 April 2025

      TCS+ | Inside MTN’s big brand overhaul

      11 April 2025
    • Opinion

      Solar panic? The truth about SSEG, fines and municipal rules

      14 April 2025

      Data protection must be crypto industry’s top priority

      9 April 2025

      ICT distributors must embrace innovation or risk irrelevance

      9 April 2025

      South Africa unprepared for deepfake chaos

      3 April 2025

      Google: South African media plan threatens investment

      3 April 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SkyWire
      • Solid8 Technologies
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Information security » ESET introduces proactive vulnerability and patch management

    ESET introduces proactive vulnerability and patch management

    Promoted | Keeping your company safe from vulnerabilities is not only better for business, it makes it easier to obtain protective cyber insurance, says ESET.
    By ESET22 August 2023
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp
    ESET's Steve Flynn
    ESET’s Steve Flynn

    Cybersecurity remains top of mind for all organisations, whatever their size and wherever they are on their digital transformation journey. Naturally, this means that cyber insurance has become an important consideration. However, with policies that exclude specific security issues, businesses face the challenge of knowing how to protect critical data while meeting insurers’ requirements.

    Steve Flynn, sales and marketing director at ESET Southern Africa, notes that IBM Security’s Cost of a Data Breach Report 2022 indicates that 13% of security breaches are trackable to vulnerabilities in third-party software. More crucially, the time needed to identify and contain a breach averages 284 days, which demonstrates that insurers have some valid prejudices. Most notably, coverage is likely to be stopped by the provider if a company fails to act on a known software vulnerability, despite having access to industry-supported updates – particularly if this failure leads to a security breach.

    ESET has worked to ensure that its enterprise-grade offerings clearly reflect the changing needs of businesses

    “While cyber insurance stands as a rearguard precaution against acute risks, the best way to ensure these insurance providers will offer your business the protection you need is to implement a high-quality vulnerability and patch management solution. This is the solution that is ultimately your eyes and ears in respect of identifying vulnerabilities,” he says.

    With this in mind, says Flynn, ESET has introduced its own Vulnerability Assessment (VA) and Patch Management (PM) capability. This falls under the company’s diverse ESET Protect platform.

    “This product suite is aimed at helping businesses of all sizes to proactively detect and remediate security threats, in a timely and efficient manner. By lowering the risk of data breaches and other cyberattacks, while also focusing on other key areas of liability, the solution meets the prerequisites demanded for cyber insurance.”

    “The security landscape requires rapid and effective action, the moment a threat arises. Managing vulnerabilities should therefore be a core aspect of your IT security. Implementing vulnerability and patch management means your business is less likely to experience an interruption of business continuity or a breach resulting from an unpatched known vulnerability,” he continues.

    ESET: on the mitigation frontline

    Flynn is quick to note that the average cost of a data breach in 2022 was calculated to be nearly US$4.35-million. This shows why cyber-insurance firms are reluctant to offer policies to companies without proper vulnerability protection.

    “A 2022 ServiceNow study conducted by the Ponemon Institute found that 57% of victims claimed a breach was due to unpatched vulnerabilities, and even worse, the same study indicated that 34% of these players were already aware of the vulnerability.

    “This is why an automated vulnerability and patch management solution is necessary – not only do you not have to wait for a human to implement the patch, but it can also be difficult and time-consuming to identify and prioritise vulnerabilities based on severity. This could easily lead to inefficient allocation of resources, which in turn creates increased risk.”

    Such tools are vital for businesses of all sizes, he adds. However, for SMEs that might otherwise not be inclined, or may fail to stay in the know about cyber liabilities and vulnerabilities that could devastate their business, a managed service provider (MSP) offers the answer. This benefits them not only from a cost perspective, but also leaves this crucial aspect of the business in the hands of experts.

    It may be considered one of the basics of security, but vulnerability assessment and patch management – when implemented and maintained in league with endpoint security – sits on the frontline when it comes to mitigating cyberattacks.

    “Although security today often tends to focus on threat detection and response, it remains vital that they do not neglect the prevention phase that includes vulnerability assessment and patch management. Moreover, as cyberattacks keep evolving and security demands become increasingly complex, ESET has worked to ensure that its enterprise-grade offerings now clearly reflect the changing needs of businesses of all sizes as they navigate the threat landscape,” continues Flynn.

    For enterprises, managing patches and executing updates across entire networks is a foundation of good security practice. Small and medium businesses, on the other hand, want an easy-to-use solution that will keep them safe from disruption, while also keeping their costs down.

    “Ultimately, the customisable patching policies in ESET Vulnerability and Patch Management give businesses flexibility and control so that their endpoints can be optimally patched promptly, thus minimising the risk of attack. Adopting this capability also ensures they can adhere to increasingly stringent cybersecurity insurance demands, not to mention regulatory requirements. In this way, you can always ensure you remain ahead of the bad actors out there,” he concludes.

    About ESET
    For more than 30 years, ESET has been developing industry-leading IT security software and services to protect businesses, critical infrastructure and consumers worldwide from increasingly sophisticated digital threats. From endpoint and mobile security to endpoint detection and response, encryption and multifactor authentication, ESET’s high-performing, easy-to-use solutions unobtrusively protect and monitor 24/7, updating defences in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company that enables the safe use of technology. This is backed by ESET’s R&D centres worldwide, working in support of our shared future. For more information, visit www.eset.com/za or follow us on LinkedIn, Facebook and Instagram.

    • Read more articles by ESET on TechCentral
    • This promoted content was paid for by the party concerned


    ESET Steve Flynn
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleSouth Africa is at serious risk of catastrophic internet disruption
    Next Article Incredible introduces innovative online business portal

    Related Posts

    TCS+ | From gen AI to deepfakes – the latest infosec threats

    1 October 2024

    TCS+ | ESET’s Adrian Stanford: how AI will transform cybersecurity

    10 June 2024

    AI’s double-edged sword requires a human security approach

    4 June 2024
    Add A Comment

    Comments are closed.

    Company News

    Retailers: take back control of your tech stack with self-enablement

    15 May 2025

    Sigfox South Africa unveils next-gen asset intelligence for smarter logistics

    15 May 2025

    How microgrids deliver and optimise every kilowatt in CPG environments

    15 May 2025
    Opinion

    Solar panic? The truth about SSEG, fines and municipal rules

    14 April 2025

    Data protection must be crypto industry’s top priority

    9 April 2025

    ICT distributors must embrace innovation or risk irrelevance

    9 April 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.