Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Vulnerability assessment strategies revealed: a primer for novices and further education for experts

Download Now

To download this white paper you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

Risk assessment is at the heart of security vulnerability analysis, but for many hard-pressed IT managers, knowing where to start on this essential process is just the start of the equation.

The problem facing IT managers conducting such analyses is that several stages of the process are, at best, based on fuzzy logic and imprecise strategies, often involving the security conundrum that involves `thinking outside of the box.'

Current security methodologies mandate that the process of managing vulnerabilities involves setting up a team to scan an enterprise IT environment against a database of known vulnerabilities, and then asking a second operations team to resolve the vulnerable conditions uncovered in the scan.

The good news is that, with two teams involved, the chances of picking up on non-standard vulnerabilities requiring lateral thinking is increased by the additional head count.

The bad news is that the results from the operations team can only be as good as the data that the scanning team produces.

Perhaps worse, the scanning team's data only represents a given point in time, and, as we all know, things can change in the IT space very quickly.

This informative and timely white paper - supplied by BigFix, an IT security vendor with more than a decade of experience in its sector - outlines the current state of play about vulnerability management processes and details methodologies that allow managers to efficiently pre-empt most possible security threats.

Along the way, you'll learn how to take a more prescriptive approach to the process of asset compliance and configuration baselines, as well as gaining a better understanding of how to differentiate between the different categories of security risks that you will encounter in your analysis.

You'll also gain an understanding of how carefully-planned and pro-active configuration management can make your life in IT security a lot simpler and headache-free.

Please complete the following registration form to access the whitepaper in PDF format.