Skip to main content
PDQ.com mobilePDQ.com desktop
Support

Is PDQ Deploy / PDQ Inventory Safe? An Introspection

Jordan HammondJordan Hammond
·

With the recent news of Solarwinds getting hacked and sending out an update that has compromised their security, people are understandably taking an in-depth look at their third-party software. Let’s first give out our security team-approved response to those concerned, but then dive into some of the finer details that we can give.

The Security Team Version

Our security team does not allow us to discuss what tools we use internally. However, that being said, to the best of our knowledge, we have not been affected by any recent attacks or breaches including the recent news about SolarWinds.

Now let’s walk the fine line of discussing what we can while not specifically talking about our internal tools! Concerns can come from 2 vectors. The first is how do we ensure our software has not been breached; the second is the package library where we offer pre-built installs for your environment.

Internal Protections

Internally we use various advanced network monitoring tools and monitor on three levels:

  1. We search for anomalous behavior on our networks.

  2. We constantly monitor the latest virus/malware/exploit software.

  3. We monitor for malicious activities that are used for lateral movement within the network.

We think our process is pretty damn great, but that does not mean we are sitting back and letting things go lax. We always stay on top of the newest security practices and fine-tune and adjust to meet the best possible standard at all times.

Package Library Protections

Offering pre-built installers is pretty handy. Who doesn’t love recovering all that time installing software in your environment? It involves building around installers, which means we need to take steps to make sure that they are as safe as possible.

Whether new or an update on an existing package, every package built gets scanned for vulnerabilities and malware. After it has passed all scanning, we will compare the hash to make sure that the file we have vetted and tested has not been modified during our process. This allows us to be sure the installer we started with is the same as the one we ended with.

Conclusion

Security is an ever-changing landscape, where you must adapt to keep your environment safe. We will continue to rely on industry leaders and best practices to keep us protected and as secure as possible on each level. If needed, Alex will even dive in and punch any and all malicious packets out of our network. He is that committed.

Ready to get started with PDQ Deploy & Inventory? Work less, automate more.

Start your 14-day free trial
Sign up in seconds

Don't miss the next post!

Monitoring Disk Usage With PDQ Inventory And WizTree

When disk space is limited, every gigabyte counts. Learn how to remotely monitor disk usage with PDQ Inventory and WizTree.

PDQ.com
© 2021 PDQ.com Corporation

Products

  • PDQ Deploy ®
  • PDQ Inventory ®
  • PDQ Link ®
  • Enterprise SL
  • Pricing
  • Downloads
  • Licensing
  • Buy