Managed Vulnerability Assessment
Hacker attacks are no longer limited to high-profile organizations such as banks and governments. Automated tools have made it easier to identify and exploit network exposures, swelling the ranks of hackers. At the same time, viruses, worms, and trojans have evolved into sophisticated, self-propagating attacks resistant to detection.

IT groups rely on four technologies to protect their networks: virus detection, firewalls, intrusion detection systems (IDS), and vulnerability assessment. Each has a place in a comprehensive security strategy. Only vulnerability assessment provides a proactive approach, identifying network and device vulnerabilities before damaging network attacks can take place.

Companies can choose from several approaches for vulnerability assessment: manual testing using software-based products, consultants’ penetration testing, and self-service third-party solutions. With the latter approach, commonly called Managed Vulnerability Assessment (MVA), scans are conducted by remote servers that are hosted and maintained by a third party. MVA offers clear cost and security advantages over other methods of vulnerability assessment.

This white paper explains the value of the various approaches to network security. It focuses on the unique role of vulnerability assessment, and MVA in particular. The paper concludes with a description of the QualysGuard MVA solution.

Download the paper in PDF format here.

Spotlight

Implementing an effective risk management framework

How do we balance the benefit of the free flow of information with the risk of inappropriate access and/or disclosure? What are the consequences of not doing so?


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Thu, Mar 26th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //