Overview: Lumension Security, Inc., a leader in operational endpoint management and security, develops, integrates and markets security software solutions that help businesses protect vital information and manage critical risk across network and endpoint assets.
KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.
Solutions offered by Lumension.
Research offered by Lumension
2014 Ultimate Buyers Guide to Endpoint Security Solutions by Lumension. February 19, 2014 - This informative webcast provides a helpful buyers guide to the top endpoint security solutions on the market today, helping your organization to analyze each tool's offering and determine which would deliver the most benefits.
3 Strategies to Protect Endpoints from Risky Applications by Lumension. September 10, 2010 - Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today’s IT environment. Read this white paper to learn more.
Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by Lumension. May 28, 2009 - The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management.
Achieving North American Electric Reliability Corporation (NERC) Cyber Security Standards by Lumension. March 02, 2009 - Learn about NERC compliance challenges and how to ensure audit-readiness by delivering end-to-end vulnerability management, endpoint protection and data protection solutions.
After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension® by Lumension. October 11, 2013 - This case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
Application Explosion: How to Manage Productivity and Security by Lumension. January 31, 2013 - This paper discusses the risks of uncontrolled applications, best practices for controlling those applications, and the array of choices available, exploring the attributes of Microsoft's built-in tools, of free and open source software, and of third-party commercial application control systems.
Application Whitelisting Best Practices: Lessons from the Field by Lumension. February 17, 2014 - This in-depth resource explores the state of cybercrime, whitelisting strategies and best practices for securing your endpoints.
APT Preparedness: Enterprises Struggle to Adapt to Changing IT Security Risks by Lumension. December 31, 2013 - This exclusive white paper reveals why many enterprises are struggling to adapt to changing IT security risks, and looks at their misplaced sense of confidence in the ability to detect advanced persistent threats (APTs).
Barclays Bank by Lumension. August 2008 - Barclays chose Lumension Security's Sanctuary Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices.
Best Practices to Device Control: An In-Depth Technical Webcast by Lumension. May 16, 2013 - This webcast offers practical steps you can take to implement the device control and encryption technologies that will help you effectively address the vulnerabilities associated with removable storage devices. Watch and learn more about laying the groundwork for data security, technical enforcement, data protection policies and more.
Beyond Compliance: Combating Threats with Endpoint Configuration Management by Lumension. December 31, 2012 - Read this informative whitepaper today to find out how to provide a solid and comprehensive configuration management solution upon which to build the rest of the organization's endpoint security approach.
Booz Allen Hamilton: Securing the Mobile Enterprise & Ensuring Compliance by Lumension. January 12, 2008 - Booz Allen Hamilton has incorporated Lumension Security's PatchLink Update into their automated patch management system. With PatchLink Update, the IT team no longer has to inspect each laptop, making it much more efficient and cost effective.
Closing the Antivirus Protection Gap: A Comparative Study on Effective Endpoint Protection Strategies by Lumension. May 31, 2012 - In this paper, we will benchmark the effectiveness of a standalone AV and O/S resident patching solution versus newer technologies and a defense-in-depth approach of layering multiple endpoint security and operational technologies together.
Committed to Memory: Protecting Against Memory-Based Attacks by Lumension. July 23, 2013 - Gain insight into the inner-workings of memory injections: how they infiltrate your apps, why they are difficult to detect, and how traditional endpoint security strategies cannot protect against them.
Data Protection Solution-Taking Control of Your Data by Lumension. October 30, 2008 - Whatever your industry, safeguarding your data is critical to running your business and protecting the privacy of employees and customers. Learn four critical steps to effectively implement removable device control.
Debunking the Top 5 Misconceptions about Data Protection by Lumension. May 2008 - Check out this white paper to learn about the top 5 misconceptions about data protection and how your company can effectively address them to increase the security of its information assets.
Demystifying IT Risk to Achieve Greater Security and Compliance by Lumension. January 26, 2010 - Read this white paper to learn how organizations need an intelligent approach to gaining the upper hand when it comes to assessing IT risk and managing compliance.
Developing Best Practices for Patch and Remediation: An In-Depth Technical Webcast by Lumension. May 14, 2013 - Discover the steps you can take to improve patch management and your ability to mitigate risk. Watch today's webcast and learn why patch management is important, best practices for patch management, critical areas to address, and more.
Developing Best Practices to Application Whitelisting: An In-Depth Technical Webcast by Lumension. May 14, 2013 - This video covers the important steps involved with laying the groundwork for application whitelisting, how to prevent unwanted or dangerous changes while maintaining flexibility, and maintaining your environment as application, user, and other needs change. Watch and learn more.
E Is for Endpoint: Six Security Strategies for Highly Effective IT Professionals by Lumension. January 23, 2012 - Security professionals know that effective endpoint protection calls for a layered, defense-in-depth approach. But endpoint security now requires a new way of thinking that goes beyond just battling threats to actually enable operational improvement. Read this whitepaper to learn the six steps you need to think different about endpoint security.
Endpoint Security Value Calculator by Lumension. August 12, 2009 - This flexible, easy to use tool enables you to rapidly evaluate a wide range of scenarios and gather compelling proof of the dramatic impact that Lumension Security’s effective application and device whitelisting can have on your bottom line.
Endpoint Security, Endpoint Management: The Cost-Cutter's Case for Convergence by Lumension. March 18, 2009 - This analyst report is for any organization that relies on end-user computing platforms (personal computers, workstations, laptops, notebooks) - and their associated applications, data, and network connectivity - to carry out strategic business objectives. It describes how the companies with top results keep these endpoints "clean and ready."
Endpoint Security: Anti-Virus Alone is Not Enough by Lumension. December 31, 2012 - Access this analyst report that provides researched proof as to why organizations need more than anti-virus and firewall protection to defend endpoints and networks from malicious threats.
Enterprise antimalware excess? Managing antimalware security products by Lumension. April 27, 2012 - Antimalware products implemented on your networks can pile up overtime. And while layered security is traditionally the best way to mitigate risk, this accumulation can lead to a confusing, costly and inefficient mess. Access this guide for expert tips on how to manage antimalware products and determine how much is enough.
Fact or Fiction Security Survival Guide by Lumension. February 02, 2009 - This guide serves as a good first step in preparing us from falling into the trap of security misconceptions and sets the record straight about each misconception that are most likely to encounter while talking to colleagues or vendors.
Fact or Fiction: Debunking the Top 5 Misconceptions about Endpoint Security by Lumension. May 2008 - Check out this white paper and learn about the top 5 misconceptions about endpoint security and how your company can mitigate the risks of the eroding network perimeter.
Four DLP Best Practices To Enhance Security by Lumension. December 10, 2012 - Read this eGuide to learn what is involved with implementing full-blown DLP and how it can help improve the security of your business. Topics covered include best practices for introducing DLP to your business, understanding the relationship between DLP and the cloud, and more.
Four Steps to Cure Your Patch Management Headache by Lumension. February 11, 2010 - Using patch and vulnerability management as the principal component of your risk mitigation strategy and taking prudent measures to establish a best practices approach can help reduce costs and risks in the long term.
Four Steps to Cure Your Patch Management Headache by Lumension. January 06, 2011 - The need to speed up patch deployment across today’s highly complex and distributed IT environment has never been more important. Read this free white paper and learn four steps to cure your patch management headache.
How to Achieve Device Control Peace of Mind by Lumension. July 31, 2013 - Uncover which solution one of your peers implemented to help them find peace of mind and stop worrying about data loss and malware intrusion from removable USB drives and other portable storage devices.
How to Deal with Todays Multi-Platform, Multi-Vendor Patch Management Mess by Lumension. February 19, 2014 - This exclusive resource discusses a patch management solution that provides endpoint protection that goes well beyond the typical operating system, allowing your organization to ensure that patches run smoothly and that any security holes are plugged up.
How to Effectively Protect Data in Transit and Assure Governance with NHS Directive by Lumension. February 13, 2008 - This document examines how Lumension solutions assure NHS Trusts of governance with all of the stated requirements for securing data in transit and maps the solution's capabilities to these specific requirements.
How to Prevent Security Breaches Through Effective Management and Control of USB Devices by Lumension. August 12, 2009 - Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.
Improving Server Performance and Security: An Impact Comparison of Application Control and Traditional Anti-Virus Solutions by Lumension. April 10, 2013 - This analyst report unveils the impact an application control solution – which promises to reduce server CPU resource consumption – had on servers and reveals the level of protection from malware that it can provide.
Integrating Vulnerability Assessment and Remediation by Lumension. August 2008 - An outline for successfully integrating vulnerability scanning and remediation capabilities is presented in this whitepaper. This will ensure that organizations maintain a secure environment while complying with internal and external security policies.
IT GRC: Managing Risk, Improving Visibility, and Reducing Operating Costs by Lumension. May 11, 2009 - This Aberdeen Group benchmark report describes the policy, planning, process, and organizational elements of successful IT GRC implementations. Learn what top performing companies do to gain a competitive edge regarding compliance and IT risk management.
Keeping Bot Herders Off Your Servers and Breaking the Lateral Kill Chain of Today's Attackers by Lumension. May 14, 2013 - In this presentation, security expert Randy Franklin Smith of Ultimate Windows Security describes exactly why and how application security is such a critical component of any modern security plan, and how you can go about implementing the detection and prevention measures you need to stay secure.
Laying the IT Security Foundation by Lumension. April 06, 2009 - Learn how in today's evolving threat landscape you need to lay the proper IT security foundation that proactively addresses the root cause of attacks such as Conficker.
Lumension Endpoint Management and Security Suite by Lumension. September 13, 2010 - A new wave of vulnerabilities is threatening our endpoints and browsers at a much greater rate than operating systems and servers, which is why the SANS Institute has ranked “patching client-side software” as the number one security priority.
Lumension Endpoint Protection - Whitelisting Technology Improves Security, Reliability, and Performance via Trusted Change by Lumension. September 01, 2008 - Learn how whitelisting guards your systems by allowing only approved processes and applications to run on the endpoint and preventing malware and viral programs. With whitelisting technology, you can improve total data security and overall system performance.
Lumension Endpoint Security: Device Control and Application Control by Lumension. September 13, 2010 - The increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection.
Lumension Guide to Device Control Best Practices by Lumension. September 14, 2012 - This white paper provides a practical guide to assist you with the deployment of a device control module as part of your endpoint security management. Learn how you can prevent malware, ensure data protection and more.
Lumension Guide to Patch Management Best Practices by Lumension. September 14, 2012 - Access this white paper to discover patch management best practices. Learn how to better mitigate risk and remediate vulnerabilities.
Lumension Patch Management: Picking the Low-Hanging Fruit by Lumension. January 12, 2012 - This white paper explores a centralized, comprehensive approach to application patching, allowing security pros to automatically detect risks, deploy patches and protect business information across a complex, highly distributed physical and virtual environment.
Lumension Sanctuary Device & Application Control for Endpoint Security -- 30-day Free Trial by Lumension. January 2008 - Protecting networks from malware can seem like an insurmountable challenge. In this 30-day free trial download, see how Lumension's Sanctuary Device and Application Control enable only authorized applications to run and only authorized devices to connect to a laptop or desktop, removing the risk of data leakage and malware.
Lumension Sanctuary Device Control by Lumension. February 13, 2009 - Lumension's Sanctuary Device Control minimizes the risk of data theft from removable devices through its policy-based enforcement of device use that controls the flow of inbound and outbound data from your endpoints.
Lumension Vulnerability Management - Automating the Vulnerability Management Lifecycle by Lumension. November 01, 2008 - Learn how Lumension Vulnerability Management enables organizations to mitigate their critical risk by integrating the five phases of vulnerability management: discovering assets, assessing vulnerabilities and misconfigurations, prioritizing risks, remediating vulnerabilities and continuous reporting.
Lumension Vulnerability Scanner Offer by Lumension. March 11, 2009 - This network-based scanning utility provides comprehensive visibility into the IT environment through in-depth scans and the automated discovery of all assets, both managed and unmanaged. Scan up to 25 nodes.
Lumension® Device Control for Microsoft® System Center by Lumension. January 21, 2010 - Read how through centrally managing, deploying, enforcing and monitoring device/port access, and more, Microsoft SCCM customers can significantly reduce implementation costs and quickly enhance their security policy enforcement.
New Insider Threat Emerges in the New Economy by Lumension. February 02, 2009 - Learn how employees and partners are engaging with IT assets and intellectual property.
Patch Management 2.0: Evolving Your Patch Management Technology to Proactively Combat Security Challenges by Lumension. June 2008 - Read this white paper to get up-to-date technology alternatives to help better manage your patch management environment.
Patch Tuesday Alerts by Lumension. July 2008 - Each Tuesday, Lumension Security reviews the Microsoft Security Bulletins and provides specific comments, recommendations and key considerations to help customers implement the latest round of security updates as quickly and effectively as possible.
PC on a Stick: A Portable Endpoint Security Nightmare by Lumension. January 01, 2007 - Devices are growing increasingly more complex and manufacturers will soon develop the "PC on a stick". Because of this evolution, enterprise endpoint security must also grow to address the increasing concerns.
Presentation Transcript: Content Monitoring in the Enterprise by Lumension. January 04, 2013 - This presentation transcript will help readers learn key strategies to meet both business security needs and user demands. Discover more about topics such as setting content monitoring goals, data loss prevention technologies, database activity monitoring, and more.
Preventing Weaponized Malware Payload in Advanced Persistent Threats: Strategies for Layered Endpoint Defense Against the APT Kill Chain by Lumension. February 04, 2013 - This white paper explores a solution through a defense-in-depth approach to endpoint security that will help bolster your security posture including: antivirus, device control, hard-drive and media encryption, and more.
Proving Your Vulnerability Compliance: Patches, Configuration, Reports and More by Lumension. January 30, 2013 - This whitepaper explores your strategies for simplifying and streamlining your vulnerability compliance efforts. Read on to see how you can make patch management and configuration auditing consistent and automated, allowing you to save both time and money.
Putting Security First in the Newly Virtualized World by Lumension. July 2008 - At Lumension Security are experts are in tune with the latest security problems posed by virtualization. In a new and largely untested IT world it is necessary to apply security at every stage of the process, keeping it safe from hackers and data breaches
Putting Security in a Positive Light - A Guide to Proactively Managing Endpoint Risk by Lumension. August 2008 - This white paper outlines the importance of adopting a positive security model that combines the power of vulnerability management, automated remediation, whitelist application and device control to eliminate the risk of the unknown.
Reduce the Cost to Achieving HIPAA Security Compliance with Lumension® Solutions by Lumension. October 19, 2009 - Healthcare organizations face a host of HIPAA Security Rule compliance challenges with the move to put patient medical records online. Lumension helps organizations address these compliance challenges by providing the proactive IT risk management and the required audit readiness to meet many aspects of the HIPAA Security Rule.
Reducing IT TCO with Effective Endpoint Security Management by Lumension. August 12, 2009 - This audiocast includes the findings from Aberdeen Group's latest report "Endpoint Security, Endpoint Management: The Cost Cutter's Case for Convergence", information about which endpoint security management technologies are used by "Best-in-Class" organizations, and recommendations to improve your security and ultimately reduce IT TCO.
Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management by Lumension. October 06, 2009 - This whitepaper will examine PCI DSS and explain how Lumension® Compliance and IT Risk Management can help organizations reduce the cost of addressing compliance.
Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management by Lumension. December 31, 2009 - In this white paper, gain critical information about a streamlined compliance and risk management solution that helps identify, assess, remediate, and manage IT environments to demonstrate PCI DSS requirements.
Reflective Memory Attacks Deep Dive: How They Work; Why They're Hard to Detect by Lumension. February 19, 2014 - This crucial webcast takes an in-depth look at reflective memory attacks, analyzing how they work, why they're so critical a threat, and what your organization can do mitigate these kinds of attacks.
Reflective Memory Injection: How it Works and How to Stop It by Lumension. June 30, 2013 - This informative white paper addresses how RMI works, what it looks like, and how your organization can stop these security incidents from occurring in your environment.
Salvation Army Protects the Integrity of Data and Global Brand by Lumension. October 14, 2013 - In this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met.
Salvation Army Protects the Integrity of Data and Global Brand by Lumension. October 31, 2007 - Protecting data integrity without hindering their care-givers and officers is paramount for The Salvation Army. This case study reveals how the organization implemented plug and play flexibility for their users with USB devices and mitigated potential data threats with endpoint security.
SC Magazine Security Brief: Under the Radar by Lumension. December 31, 2013 - This article includes reader surveys on various aspects of APTs focuses on removable media. Additionally, you will find the results from a recent survey of 329 SC Magazine readers that address the security challenges posed by removable memory devices.
SecuritySCAPE Virtual Conference 2012: IT Security Made Simple by Lumension. September 25, 2012 - Register now to attend SecuritySCAPE 2012, this year's premiere IT security virtual event. Gain insight into topics including endpoint security, vulnerability, data theft, and more from industry analysts, thought leaders, and IT pros from around the world.
Strategic Endpoint Security for C-Level Executives by Lumension. February 28, 2013 - Uncover the different endpoint security solutions available – and the challenges of implementing one. In addition, discover why putting multiple protective layers on your perimeters and endpoints is crucial to achieving a defense-in-depth security strategy that will keep your organization secure.
Strategies for Layered Endpoint Defense Against the APT Kill Chain by Lumension. February 28, 2013 - Take a look at what we need to learn from highly-publicized weaponized attacks such as Stuxnet, DuQu, Flame, and Gauss and explore why a defense-in-depth security architecture is crucial to defending against them.
Taking the Sting Out of Java Vulnerabilities by Lumension. June 30, 2013 - Access this white paper to discover a defense-in-depth strategy with overlapping layers of protection, backed up by flexible application whitelisting to address not just Java vulnerabilities, but the security profile of your entire IT infrastructure.
Targeted Threat Defense Framework by Lumension. September 30, 2013 - This informative resource discusses the characteristics of target threats while offering guidance and a framework to protect your company.
The 2014 Endpoint Security Buyers Guide by Lumension. August 16, 2013 - This exceptional endpoint security buyer's guide provides clear buying criteria for solutions in anti-malware, mobility, and BYOD. Additionally, scan over 10 questions you should ask when buying this new technology.
The Best PCI Audit of Your Life by Lumension. August 13, 2009 - This white paper will detail a strategy that enables companies to easily gain PCI compliance and ensure effective security. By mapping technical controls to PCI standards and by continuously monitoring, assessing, and reporting the status of your environment, you can make your PCI audit the most efficient and actionable of your life.
The Busy IT Pros Guide to Vulnerability Management: Top 5 Tips for Avoiding Preventable Attacks by Lumension. February 29, 2012 - Many businesses suffer attacks because they leave their endpoints unpatched and insecurely configured. Protecting every aspect of your organizations valuable information is an essential part of the security process. This white paper provides five tips for avoiding preventable attacks and creating a comprehensive vulnerability management plan.
The CISOs Guide to Measuring IT Security by Lumension. January 12, 2012 - In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
The Critical Security Controls – Moving Beyond the Checklist Mentality by Lumension. August 13, 2009 - The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.
The Extraordinary Failure of Anti-Virus Technology by Lumension. February 12, 2008 - Anti-virus technology fails to prevent computers from virus infections. And because it fails, it inadvertently assists many security woes that plague the computer population.
The Total Economic Impact of Lumension Security's Sanctuary by Lumension. September 2007 - Lumension's Sanctuary Application and Device Control is an IT-driven solution that automatically enforces endpoint security policies. The financial impact of moving from a "voluntary" compliance solution to an "automatic" one is illustrated
The Total Economic Impact of Lumension Security’s Sanctuary Application And Device Control by Lumension. September 12, 2012 - Consult this study to find out more about the financial impact of moving from "voluntary" compliance solution to an IT-driven solution that automatically enforces endpoint security policies. Read in-depth interviews with John C. Lincoln hospitals to see the benefits first-hand.
Think Your Anti-Virus Software Is Working? Think Again by Lumension. April 01, 2011 - This paper examines how anti-virus software hasn’t been keeping up. Studies show that even though most organizations use anti-virus software, more and more are succumbing to attacks. Lumension Intelligent Whitelisting integrates the most effective third party security tools and techniques. The result is more effective endpoint security.
Think Your Anti-Virus Software Is Working? Think Again by Lumension. March 31, 2011 - Many people who subscribe to anti-virus offers think that's enough, however, studies show that more and more organizations are suffering from attacks because the software is inefficient. In order to prevent attacks, businesses need to take other steps for further protection.
Third-Party Applications in the Enterprise: Management and Risk Mitigation by Lumension. January 31, 2013 - This Computing Research report unveils the results of a recent survey on the perceived risks of third-party apps and available mitigation strategies. View now to uncover the significant issues third-party apps present and learn why so many organizations are struggling to defend themselves against them.
Three Tips to Prevent USB Insecurity In Your Enterprise by Lumension. January 31, 2012 - Today, what virtualization software can accomplish is nearly limitless. But has your computer security methodology and software kept up? This whitepaper will take an in-depth look at virtualization security risks and mitigations.
Three Ways to Prevent Insider Risk Within Your SCCM-Managed Environment by Lumension. January 27, 2010 - Read this white paper to learn how removable device policy enforcement can prevent risks while enabling managed use of necessary productivity tools—seamlessly within your Microsoft® System Center Configuration Manager-managed environment.
Three Ways to Prevent USB Insecurity by Lumension. October 14, 2013 - This crucial white paper examines how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools.
Three Ways to Prevent USB Insecurity in Your Enterprise by Lumension. January 06, 2011 - USB flash drives and other portable devices are valuable tools in the typical government staffer’s virtual toolkit. These handy devices allow workers to efficiently accomplish their duties and carry out their tasks for the public good. Read this paper to learn how to enable the use of these productivity tools, while mitigating the risk.
Video - Vulnerability Management in a Web 2.0 World by Lumension. January 28, 2009 - Lumension Security's Sr. Director of Solutions and Strategy, Don Leatham, discusses Vulnerability Management challenges in a Web 2.0 world, and how to defend against these threats.
Weaponized Malware - A Clear and Present Danger by Lumension. September 30, 2012 - Weaponized malware and advanced persistent threats raise the bar on endpoint security. Originally intended for cyber-espionage and cyber-warfare, these sophisticated attacks are now available to any cyber-criminal. How can security pros protect their organizations from these emerging perils?
Weaponized malware now threatens the private sector by Lumension. September 12, 2012 - Access this resource for crucial information about the next class of advanced persistent threats (APT) and uncover how you can boost endpoint security management to reduce the risk of these attacks.
Why "Free" Patch Management Tools Could Cost You More by Lumension. November 01, 2008 - While "free" tools appear to be an enticing solution for patch management, looking deeper into the needs of the organization leads to selection of a more complete patch management solution which results in reduced long-term risk and optimized operating expense.
Why Free Patch Management Tools Could Cost You More by Lumension. January 13, 2012 - This white paper explores why so-called "free" patch management solutions could really end up costing your organization more in the long run.
WSUS for Secure Patching: Top Tips, Tricks and Scripts for Overcoming Limitations and Challenges by Lumension. February 25, 2014 - In this webinar, Windows expert Randy Franklin Smith shares some the best tips, tricks and scripts for addressing patching issues within WSUS.