Announcement

Collapse
No announcement yet.

Why use a Patchman?

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Why use a Patchman?

    What’s the use of Patchman?

  • #2
    Patchman is installed as an agent on your server which scans your websites and reports any vulnerabilities back to the path man portal.

    Comment


    • #3
      Nowadays, hosting providers suffer daily from the consequences of the many security vulnerabilities found in commonly used PHP applications such as WordPress, Drupal and Joomla.

      Comment


      • #4
        Can some state some of its advantages?

        Comment


        • #5


          Advantages:

          1) The main goal of Patchman is to protect the CMS.

          2) Detecting malware and removing them.

          3) Fast set-up.

          4) Its portal is user-friendly.

          5) Patchman makes the job of a website hosting provider much easier.

          Comment


          • #6
            In which year it was developed?​

            Comment


            • #7
              I think in 2014. it was developed in 2014.​

              Comment


              • #8
                What is the work process of Patchman?​

                Comment


                • #9
                  The work process of Patchman is as follows:

                  1. When a vulnerability is discovered, the client is notified and given instructions on how to remedy the problem.

                  2. If the issue is not fixed after two days, the customer is reminded.

                  3. If the issue has not been rectified within 3 days, the vulnerability is automatically patched and the client is notified.

                  Comment


                  • #10
                    Some of the disadvantages are:

                    a) Consume server resources.

                    b) The cost of a server licence

                    c) A control panel is required (cPanel, Plesk or DirectAdmin)

                    d) Starting a vulnerability and malware scan takes less than 60 seconds.

                    e) There is no real-time vulnerability protection.

                    Comment


                    • #11
                      It was a great conversation. Thanks all for participating actively.

                      Comment

                      Working...
                      X