I am the security manager of the company, and we have a system communications department and IT. They manage the platform in order to monitor some PCs and servers to have them updated and patched.
We wanted to save time by implementing Vicarius vRx. Before vRx, we spent a lot of time searching for vulnerabilities that came out and patching them manually. With Active Directory integration and many other things, we now have it all centralized in the vRx Console.
Vicarius vRx consolidates vulnerability discovery, prioritization, and remediation in a single platform. This is very important for us. We are spending less time on these tasks. Previously, we had a team of three people for these tasks. After implementing Vicarius vRx, thanks to the vRx Console, we only have one person.
We have done some automation for vulnerability management. For some devices, we have automation to patch critical and high vulnerabilities in less than an hour of being discovered by Vicarius vRx. Previously, we had three people, whereas we now have only one person handling the work. It has saved about 1,800 hours a year.
After implementing Vicarius vRx, we realized that we were not aware of all the vulnerabilities. We did not know how insecure our systems were, whereas now, we know that our systems are not affected by so many CVEs. This knowledge of how secure we are is a major benefit of Vicarius vRx.
Vicarius vRx assists us in spending less time discovering vulnerabilities and knowing whether we are affected or not.
Patchless Protection is helpful in some cases, such as some critical zero-day vulnerabilities. We do not know if it works very well or not, but we activate Patchless Protection until the official patch is released.
We have one script to roll back the changes of our update. We have some automated tasks to apply patches. In case the patching makes a platform unstable, we have a script to go back to and recover a previous version.
Before Vicarius vRx, we were not aware of some vulnerabilities, so our meantime to remediate them was essentially infinite because we never patched them. Previously, it would take us a week to apply a patch for Microsoft vulnerabilities after they came out, whereas now, we can apply them on the same day as they are published.