General and deployment

This solution is the comparison’s first integration-based product. For the solution to work, you need to have a Windows server, SCCM (System Center Configuration Manager) and WSUS (Windows Server Update Services) services as installed components, and a SQL database.

The deployment did not go too smoothly with this product. We were able to install the complex solution that needed several components to work, but the patch management didn’t work on the terminal. This had its effects on the comparison, when looking at the installed updates and their packages.

The solution allows you to manage 3rd party applications and Windows updates. As the product integrates into SCCM, you can also update business applications. The product does have a self-guided deployment, but when a problem arose, it took us three hours to move forward. Because of this, the solution does not score well in reliability and even less so in usability.

Information security and vulnerability management

Information security was among the best in the comparison, and vulnerability management average. It was a nice surprise to find an admin monitoring log and information on the packages’ origins, albeit in link form.

Deployment and installation of application updates

The solution has everything you need for update installation. It uses both SCCM and WSUS for distribution, and these services are the basis for the solution’s basic functionalities. Solarwinds adds some details, like restart configuration on deployment.

Inventory and update verification

As with other integration products, in this one as well the inventory and reporting is done with a RMM product, here namely SCCM. All the devices, applications, and their versions are available.

The solution also has basic reporting, and you can schedule the reports to a SCCM console.

Capacity for best corporate practices

Unfortunately, we were unable to update applications during the test period, meaning we couldn’t evaluate them. We do know for sure the solution’s centralized installation on terminals works, as does the silent application updating.

Comparison to CSM products

  • Solarwinds has been in our comparison before, and it’s one of the solutions that integrate into an existing on-premises system. Solarwinds and CSM both have integrations into Microsoft’s WSUS and SCCM products.
  • In WSUS integration, the used technology is very similar in both solutions. Any 3rd party applications are published like Microsoft’s own updates.
  • For the SCCM integration, Solarwinds publishes the updates as a separate catalog, and here the approach differs from Centero Software Manager: with Centero, 3rd party updates are always treated as separate applications in SCCM.

Summary on the Compared Features

  • Solution type: Integrating on-premises-solutions
  • Number of supported applications: 34

Scoring

  • Supported applications: 2.00/4.00
  • Pricing, versatility, and infrastructure: 0.86/4.00
  • General features and test use: 2.40/4.00
  • Information security: 2.80/4.00
  • Vulnerability management: 1.20/4.00
  • Inventory and evaluation: 2.00/4.00
  • Restart management: 2.40/4.00
  • Setting management: 3.20/4.00
  • Setting adjustments: 2.00/4.00
  • Update verification: 3.00/4.00
  • Capacity for corporate practices: 0.00/4.00
  • Solution deployment: 0.67/4.00

Pricing

  • Price per year for smaller companies: € 3,055
  • Price per year for larger companies: € 12,345

In the next post of the blog series we’ll see how Centero Software Manager did in the comparison.

For detailed information on the comparison’s results, and the features of the compared applications, check out our Free Patch Management Tools’ Comparison Guide.
Download the guide here »

Read more on this topic:

September brings patch tuesday once again

Microsoft released information on 129 vulnerabilities this September. 23 of them are classified as critical. It seems that months with over 100 vulnerabilities is a new normal. Nevertheless, this patch Tuesday is not very special one. Which is a good thing. There are two vulnerabilities CVE-2020-1210 and CVE-2020-1595 with as high as 9.9 CVSS-rating. Both of the vulnerabilities are […]