Home/ Services/ Patch & Vulnerability Management
SERVICE · PATCH

Close the
known holes.
Leave nothing
for a scanner.

Managed patch and vulnerability management for Windows, macOS and third-party apps

Most breaches exploit CVEs that had a patch available for months. Automated patching for OS and 400+ third-party apps, continuous scanning, and a clear weekly report of what was closed — and what still needs attention.

Action1 / NinjaOne Intune co-managed Qualys-class scanning CE+ aligned
01 / WHAT'S INCLUDED

The whole
patch surface.

01

OS patching

Windows 10/11, Server, macOS. Ring-deployed with rollback. Reboots scheduled, not surprise.

02

Third-party apps

400+ apps auto-patched: browsers, Zoom, Teams, Adobe, Java, archivers, dev tools. Where most exploitation actually happens.

03

Continuous vuln scanning

Internal scanning via the agent; external scanning against your public perimeter. CVSS-scored, exploit-intelligence-weighted.

04

CVE prioritisation

Not every CVE matters. We rank by actual exploit availability (CISA KEV, EPSS) so you fix what attackers are actually using.

05

Ring deployment

IT pilot → 10% canary → 50% → 100%. Breakage surfaces in 20 people, not 200.

06

Weekly report

Plain-English weekly: what was patched, what failed, what's outstanding, risk posture. One page you'd actually read.

02 / HOW WE RUN IT

Inventory. Rank.
Deploy. Verify.

  1. STEP 01

    Inventory

    Full software inventory across every device. You'll be surprised what's out there. Unmanaged apps surfaced for removal or bringing into policy.

    • Full inventory
    • Rogue app register
    • Baseline CVE count
  2. STEP 02

    Rank

    CVEs ranked by CVSS, exploit intelligence and business context. Your specific apps, your specific exposure. Known-exploited first.

    • CVSS + KEV
    • EPSS weighting
    • Risk register
  3. STEP 03

    Deploy

    Ring-deploy critical within 72h, high within a week. Maintenance windows negotiated with you — business hours, after hours, your call.

    • Ring deploy
    • Scheduled windows
    • Rollback ready
  4. STEP 04

    Verify

    Re-scan after deployment. Patches that didn't apply get flagged, investigated, and retried. Nothing silently stays broken.

    • Post-patch scan
    • Fail retry loop
    • Weekly report
03 / WHY IT MATTERS

The breach
you'll have
is almost
certainly a patch.

Year after year, the majority of breaches exploit a CVE with a patch available. Patching is unglamorous, tedious, and the highest-leverage preventive control you can buy. Get this right and EDR/SOC have a quieter, more tractable job.

  • CVE-driven breaches collapseIf the hole is closed, they'll have to work a lot harder.
  • CE+ and insurance-alignedCyber Essentials Plus needs 14-day critical patching. We beat that.
  • Scanners see nothing interestingOpportunistic scans that find juicy CVEs elsewhere find nothing at you.
  • Rollback built-inBad patch? Ring-deploy catches it early; RMM or EDR reverts it cleanly.
CVE RANK · 30 DAY CVE-2026-01042 · Chrome · RCE 9.8 CVE-2026-00871 · Win · LPE · KEV 9.1 CVE-2026-00419 · Zoom · RCE 7.8 CVE-2026-00233 · 7-Zip 7.5 CVE-2026-00119 · Adobe Reader PATCHED CVE-2025-9911 · Win · CVE-KEV PATCHED CVE-2025-9622 · macOS Safari PATCHED 4 OPEN · 92% COMPLIANT
04 / FAQ

Questions
we hear a lot.

Doesn't Windows Update handle this?

It handles Windows. It doesn't handle Chrome, Zoom, Adobe, 7-Zip, Notepad++, Java, Teams standalone, the 400 other apps your users install, or macOS. Third-party patching is where most actual exploitation lives.

How fast do you patch critical CVEs?

Targets: critical CVEs within 72 hours, high within 7 days, everything else within 30. Actively-exploited CVEs are escalated immediately — ring-deployed within hours.

What if a patch breaks something?

Ring deployment: IT pilot → 10% → 50% → 100%. Anything bad surfaces in the first two rings before it hits everyone. We can roll back via RMM and/or EDR rollback.

Do you scan for vulnerabilities too?

Yes. Continuous internal scanning via the RMM agent; scheduled external scans against your public perimeter. CVSS-ranked, remediation tickets generated automatically.

Can users defer reboots?

Yes, within reason. Configurable per-fleet: typically 3 snooze opportunities, then a forced reboot window. We don't make users work on a "please reboot me" pop-up forever.

What about servers and network gear?

Servers: yes, with scheduled change windows. Network gear: on request — firewalls, switches, APs patched as part of a co-managed arrangement. Not auto-patched blind.

NEXT STEP

Free vuln
baseline scan.

One-shot internal and external scan. You'll see exactly where the known holes are, ranked by what attackers are actually exploiting. No obligation.

CRITICAL
72 hr
APPS
400+
CE+
Aligned