Managed Vulnerability Assessment
Hacker attacks are no longer limited to high-profile organizations such as banks and governments. Automated tools have made it easier to identify and exploit network exposures, swelling the ranks of hackers. At the same time, viruses, worms, and trojans have evolved into sophisticated, self-propagating attacks resistant to detection.

IT groups rely on four technologies to protect their networks: virus detection, firewalls, intrusion detection systems (IDS), and vulnerability assessment. Each has a place in a comprehensive security strategy. Only vulnerability assessment provides a proactive approach, identifying network and device vulnerabilities before damaging network attacks can take place.

Companies can choose from several approaches for vulnerability assessment: manual testing using software-based products, consultants’ penetration testing, and self-service third-party solutions. With the latter approach, commonly called Managed Vulnerability Assessment (MVA), scans are conducted by remote servers that are hosted and maintained by a third party. MVA offers clear cost and security advantages over other methods of vulnerability assessment.

This white paper explains the value of the various approaches to network security. It focuses on the unique role of vulnerability assessment, and MVA in particular. The paper concludes with a description of the QualysGuard MVA solution.

Download the paper in PDF format here.

Spotlight

Internet Explorer vulnerabilities increase 100%

Posted on 23 July 2014.  |  Bromium Labs research determined that Internet Explorer vulnerabilities have increased more than 100 percent since 2013, surpassing Java and Flash vulnerabilities.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Jul 23rd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //