Contact Us

Need help? We're here for you.

Request PricingContact Us

Patch Management and Endpoint Security

Experience robust security with the KACE K1000 Systems Management Appliance  Automate patch management and deploy patches from one of the largest patch libraries in the industry – including patches for Windows and Mac operating systems and leading third-party vendors, such as Adobe, Oracle, Mozilla and Symantec.  Conduct IT security audits and identify vulnerabilities with OVAL and SCAP scanning.  Remedy vulnerabilities and enforce security policies with K1000’s comprehensive system configuration management capabilities.  Benefit from in-depth, easy-to-use security capabilities using an intuitive interface, plus powerful scripting, customizable reporting and routine task automation.

How it works:

Comprehensive patch management and deployment
Reduce infrastructure and resource costs by using a single solution to manage patches for heterogeneous environments.  Achieve peace of mind by making sure Windows and Mac platforms as well as potentially vulnerable third-party applications (like Adobe Reader® or Oracle Java®) are patched and up to date. Get powerful administrative capabilities, including customizable and automated patch scheduling based on dynamic filtering and detailed tracking and reporting on status of patches.
Employ remote replication for multiple worksites
Significantly reduce the network impact of large patch deployments with the K1000’s remote-replication capabilities – even if your organization has multiple locations. You simply designate a system in a remote location as the replication share. The K1000 data is sent once over your network to the replication share, and all other systems at that remote office then directly pull patches from the designated remote replication share through the LAN instead of from the K1000 — without the need for dedicated hardware or personnel at the remote facility.
Robust, standards-based vulnerability scanning (OVAL* and SCAP)
Quickly discover vulnerabilities in your environment and identify systems that aren’t compliant with your security and configuration policies with powerful security audits.  Employ OVAL-based vulnerability scanning for all managed Windows systems. Manage common endpoint configurations and confirm organizational compliance with easy-to-use, automated SCAP (Security Content Automation Protocol) scheduling and detailed reporting.
Simplified system configuration management and security policy enforcement
Streamline configuration and security policy enforcement processes, such as firewall, browser and registry settings, for Windows, Mac and Linux systems by automatically deploying scripts based on specific conditions, or manually running a script based on need. Easily create scripts that target individual systems, a specific group of systems or an entire network – or use a variety of pre-built scripts. Gain the ability to set and enforce desktop configurations, and manage McAfee and Symantec antivirus packages.  
* OVAL is the information community standard endorsed by the US Computer Emergency Readiness Team (US Cert.) and the Department of Homeland Security.   


White Paper

Best Practices in Lifecycle Management: Comparing Suites from Dell, LANDesk, Microsoft, and Symantec
Best Practices in Lifecycle Management: Comparing Suites from Dell, LANDesk, Microsoft, and Symantec

IT system lifecycle management includes a broad array of essential and complex processes for ensuring optimal reliability and performance of technology investments.

Free inventory tool
Free inventory tool

Windows hardware and software inventory