Java & ActiveX problems persist.

Java & ActiveX problems persist.

By Ben Katz, Matt Heller, and Jack Morrone

With all the investment in time and money securing your estate against web-based threats, there are still dark areas which are overlooked. Unlike traditional threats which can be identified and patched by updating binaries, the web increasingly relies on the use of add-ons, extensions, and non-binary real-time code.

These approaches are not visible to existing management tools, leaving you with potentially older versions of Java and ActiveX controls that are unmanaged, and in many cases invisible, presenting a security and compatibility nightmare.

These untracked or unknown add-ons, extensions and non-binary instances along with Java, are increasing attack vectors for malicious actors.

Do you know:

·     Who has what installed?

·     What apps are they being used on?

·     Where else are they being used?

·     If you still need them?

Answering these questions is critical to taking control of your environment. Without knowing these answers, you're open to potential security threats from old/outdated/insecure versions.

Continuing to maintain unused components wastes time and money pushing out updates to these components. Test and QA teams waste time validating unnecessarily. Moreover, there is the potential for slowdowns or other impacts on system performance.

Imagine if you had the capabilities below:

·     Know which browser versions exist for upgrade and compatibility

·     Detail the relationship between apps, browsers, and add-ons to upgrade or migrate

·     Understand Java and ActiveX instances and version details for improved security

·     Identify unused Java versions that can be removed to reduce the attack surface

·     Document which web extensions exist and on which machines to mitigate potential security threats

·     Understand app execution from user endpoints to correct app performance

·     Determine which lines of business use which applications

·     Enable legacy Java to work securely in modern browsers

·     See all versions of Java that are installed and used

#java, #activex #Itom #systems management #sccm

要查看或添加评论,请登录

Ben Katz的更多文章

  • The end of Internet Explorer. Again. For Real.

    The end of Internet Explorer. Again. For Real.

    June 15, 2022, is here. Internet Explorer is being retired.

    1 条评论
  • Protecting against Log4j vulnerability and more

    Protecting against Log4j vulnerability and more

    Written by Browsium Founder - Matt Heller By now, you’ve heard and read extensively about the log4j vulnerability…

  • Internet Explorer 11 isn’t going away next week

    Internet Explorer 11 isn’t going away next week

    By Matt Heller: Read time 2 min 12 sec The timeline for Internet Explorer 11’s final demise is confusing. Microsoft…

    3 条评论
  • Windows 11 is on the way!

    Windows 11 is on the way!

    Microsoft introduced the world to Windows 11, and it looks like they’ve been focused on advancing the platform without…

  • Flash is finally, finally dead...

    Flash is finally, finally dead...

    Although the Adobe Flash EOL’s roadmap has been well documented and precise to the day, in traditional Microsoft…

    1 条评论
  • Spartan is dead, long live Spartan!

    Spartan is dead, long live Spartan!

    When Microsoft announced the end of Project Spartan (Edge Legacy), it seemed like yet another thing people would read…

    1 条评论
  • Edge Legacy End of Life

    Edge Legacy End of Life

    The web moves fast, but the lifetime for Edge ‘legacy’ was short by every measure. Not that we’d argue it should be…

    1 条评论
  • Just like that, Flash is gone

    Just like that, Flash is gone

    Adobe has been talking about the end of Flash support for a few years now. The once-dominant solution for interactive…

    4 条评论
  • Microsoft to force opening on Edge

    Microsoft to force opening on Edge

    In another step towards moving people from Internet Explorer to Edge, Microsoft will be introducing functionality in an…

  • Domain security runs through the browser

    Domain security runs through the browser

    By Matt Heller Founder of Browsium As previously discussed, the browser is at the center of the competitive efforts to…

    2 条评论

社区洞察

其他会员也浏览了