Operations | Monitoring | ITSM | DevOps | Cloud

Remotely debug, monitor, and update Nordic IoT devices with Memfault

Nordic Semiconductor customers now have out-of-the-box access to Memfault's platform for remote debugging, continuous monitoring, and over-the-air (OTA) updates for Nordic-powered IoT products. Memfault and Nordic enable IoT device makers to accelerate product development and release more robust products that exceed customer expectations. In this webinar, you'll see how nRF91, nRF53, and nRF52 Series developers can access Memfault’s platform via the nRF Connect SDK for free.

How to Ensure Patch Compliance

Patch compliance indicates the number of compliant devices in your network. This means the number of computers that have been patched or remediated against security threats effectively. The distribution and deployment of patches accomplish nothing if your devices are not compliant. So to establish a good patch management strategy, it is important to pay attention to the effectiveness and reach of your patch deployment activities.

8 Best Practices for Windows Patch Management

Given the numerous cyber-threats that organizations face these days, security has become one of the most serious issues on everyone’s mind. When it comes to protecting business-critical environments from malware, various security measures can make a significant difference. Patching is one such important component of ensuring the security of your infrastructure and data.

Patch Management is Integral for Mature Risk-based Prioritization

The term ‘patch’ triggers many familiar images – affixing a rubber patch to a blown bike tire, the ubiquitous duct tape repairs of myriad objects, and so on. While these temporary fixes won’t heal the underlying cause, they are a quick and easy solution. Our applications and software frequently need patches as well, to fix bugs, security flaws and add feature enhancements. However, in this case, patching is not a temporary band-aid, but rather a proactive planned strategy.

Automated Patch Management and Team Swarming are Key Security Practices

In the blink of an eye, you can miss a new business disrupting security incident. We all recognize that cybersecurity breaches are increasing in volume and sophistication. How we respond to them is critical. Security vulnerabilities force organizations to go outside of their daily activities to execute out-of-band responses. We face numerous challenges in managing security risk.

Simplify the management of third-party updates for Intune with Patch Connect Plus

Enterprise IT administrators and technicians worldwide who are looking to take third-party patch management to the cloud or even expand their endpoint management capabilities can now rejoice, as Patch Connect Plus has introduced Intune Update Management to its patch management toolbox!

5 reasons integrated patch and vulnerability management mitigates risks swiftly and efficiently

ESG research on cyber risk management, which involved 340 cybersecurity professionals, revealed that 40 percent felt tracking patch and vulnerability management over time was their biggest challenge.

Device Firmware Update Best Practices

Implementing OTA (Over The Air) firmware updates is one of the most critical yet complicated processes of building hardware. And unfortunately, many organizations don't invest the same amount of resources in device firmware updates as they do in software. In this recorded webinar, Memfault Founder & CEO François Baldassari walks through the best practices he has learned over the years for device firmware updates. He also presents a device firmware update architecture that will help you avoid spending hours and hours debugging firmware update issues.