Vulnerability assessment strategies revealed: a primer for novices and further education for experts

Download Now

To download this white paper you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Risk assessment is at the heart of security vulnerability analysis, but for many hard-pressed IT managers, knowing where to start on this essential process is just the start of the equation.

The problem facing IT managers conducting such analyses is that several stages of the process are, at best, based on fuzzy logic and imprecise strategies, often involving the security conundrum that involves `thinking outside of the box.'

Current security methodologies mandate that the process of managing vulnerabilities involves setting up a team to scan an enterprise IT environment against a database of known vulnerabilities, and then asking a second operations team to resolve the vulnerable conditions uncovered in the scan.

The good news is that, with two teams involved, the chances of picking up on non-standard vulnerabilities requiring lateral thinking is increased by the additional head count.

The bad news is that the results from the operations team can only be as good as the data that the scanning team produces.

Perhaps worse, the scanning team's data only represents a given point in time, and, as we all know, things can change in the IT space very quickly.

This informative and timely white paper - supplied by BigFix, an IT security vendor with more than a decade of experience in its sector - outlines the current state of play about vulnerability management processes and details methodologies that allow managers to efficiently pre-empt most possible security threats.

Along the way, you'll learn how to take a more prescriptive approach to the process of asset compliance and configuration baselines, as well as gaining a better understanding of how to differentiate between the different categories of security risks that you will encounter in your analysis.

You'll also gain an understanding of how carefully-planned and pro-active configuration management can make your life in IT security a lot simpler and headache-free.

Please complete the following registration form to access the whitepaper in PDF format.

Should you download this content your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.