Managed Vulnerability Assessment
Hacker attacks are no longer limited to high-profile organizations such as banks and governments. Automated tools have made it easier to identify and exploit network exposures, swelling the ranks of hackers. At the same time, viruses, worms, and trojans have evolved into sophisticated, self-propagating attacks resistant to detection.

IT groups rely on four technologies to protect their networks: virus detection, firewalls, intrusion detection systems (IDS), and vulnerability assessment. Each has a place in a comprehensive security strategy. Only vulnerability assessment provides a proactive approach, identifying network and device vulnerabilities before damaging network attacks can take place.

Companies can choose from several approaches for vulnerability assessment: manual testing using software-based products, consultantsí penetration testing, and self-service third-party solutions. With the latter approach, commonly called Managed Vulnerability Assessment (MVA), scans are conducted by remote servers that are hosted and maintained by a third party. MVA offers clear cost and security advantages over other methods of vulnerability assessment.

This white paper explains the value of the various approaches to network security. It focuses on the unique role of vulnerability assessment, and MVA in particular. The paper concludes with a description of the QualysGuard MVA solution.

Download the paper in PDF format here.


Harnessing artificial intelligence to build an army of virtual analysts

PatternEx, a startup that gathered a team of AI researcher from MIT CSAIL as well as security and distributed systems experts, is poised to shake up things in the user and entity behavior analytics market.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Thu, Feb 4th