Vulnerability Management Tools Buyersguide Part1
Vulnerability Management Tools Buyersguide Part1
Vulnerability
Management Tools
Buyers Guide part 1
Your expert guide to vulnerability management tools
E-guide
In this e-guide
Introduction to vulnerability management
Introduction to tools
vulnerability management
tools Ed Tittel, Writer, Trainer, Internet Consultant
Organizations today, from small businesses with Web and email access to
multisite global enterprises, face increasingly sophisticated attacks carried out
over the Internet. Once an attacker gains access to internal networks, the
damage that ensues can be catastrophic, resulting in data disclosures and
destruction, business disruption and damage to an organization's reputation.
Even with solid perimeter defenses (e.g., firewalls, intrusion
detection/prevention systems, VPNs and so on), hardened systems and
endpoint protection, security breaches still occur. The question is when and how
will these security breaches happen?
Page 1 of 13
E-guide
internal servers, storage systems and endpoints -- and the data they hold and
In this e-guide transfer -- is to discover and close those vulnerabilities. That's where
vulnerability management tools come into play.
Introduction to
vulnerability management
tools
What is vulnerability management?
The business case for Vulnerability management is a continuous process of discovering, prioritizing
vulnerability management and mitigating vulnerabilities in an IT environment. Although vulnerability
tools management tools vary in strength and feature sets, most include the following:
Page 2 of 13
E-guide
Organizations tackle the most severe vulnerabilities first and work their way
In this e-guide down to the least severe as time and resources permit. Some vulnerabilities
don't pose a serious threat to the organization and may simply be accepted,
Introduction to which means they are not remediated. In other words, the risk is judged to be
vulnerability management
less than the costs of remediation.
tools
Page 3 of 13
E-guide
detailed results, although some vendors claim their products can perform
In this e-guide complete scans without any such firewall modifications.
When a vulnerability management tool is put in place, the initial scan that's run
should be as complete as possible. This also serves to establish a baseline.
Subsequent scans then show trends and help administrators understand the
security posture of the environment over time. Most vulnerability management
products provide detailed trend analysis reports and charts for display on the
console or in print for distribution to managers and executives.
Page 4 of 13
E-guide
Page 5 of 13
E-guide
Page 6 of 13
E-guide
Introduction to Even the smallest of organizations (i.e., those with less than 25 users) need
vulnerability management some type of vulnerability management tool, but it's a critical part of a sound
tools security posture for SMBs and enterprises. For organizations that must meet
compliance measures, such as HIPAA, Gramm-Leach-Bliley and PCI DSS,
The business case for vulnerability management is required.
vulnerability management
tools The next article in this series presents the business case for vulnerability
management in more detail. It will also look at various use cases where
vulnerability management is a must-have.
Next article
Page 7 of 13
E-guide
What might pique the interest of managers and senior executives even more is
the fact that the average total cost of a data breach, according to IBM's 2015
Cost of Data Breach study, is around $3.79 million. Granted, we're not talking
about mom-and-pop businesses, but the monetary losses are staggering all the
same.
Page 8 of 13
E-guide
So which organizations truly need vulnerability management tools, and how can
In this e-guide they help them? Here are several use cases for different sized organizations
that show the value of vulnerability management tools.
Introduction to
vulnerability management
tools
Use case #1: Small businesses
The business case for When reading about vulnerability management, personnel roles like security
vulnerability management officer, asset owner and IT engineer often come into play. Rarely are those
tools roles found in a small business, but any business -- even a small business --
with a live Internet connection and staff that sends and receives emails is
enough to warrant some sort of vulnerability management product that can be
managed by any IT person who wears lots of hats.
Why? Even with a reputable and well-tuned firewall, antivirus software and an
intrusion detection system (IDS), small organizations are still at risk. Typical
firewalls aren't designed to protect networks or systems from vulnerabilities, and
a misconfigured firewall is a major vulnerability. Antivirus software catches
known viruses, Trojan horses and so on, but cannot always identify hitherto
unknown threats. An IDS can flag most incoming threats, but can also be
bypassed by remotely executed code.
Page 9 of 13
E-guide
Page 10 of 13
E-guide
strategy, and they react to problems rather than proactively managing layered
In this e-guide security.
Introduction to Another concern is that the midsize organization may have more resources to
vulnerability management throw at security than a small business, but the concept of a "company needing
tools to look like a bigger company" can result in an urgent requirement to grow
quickly. This common situation creates challenges beyond staff members'
The business case for experience and capabilities. A company that is suddenly involved with
vulnerability management managing new operations and interests can easily lose sight of essential
tools security planning and practices.
Cloud services that offer data storage, server infrastructure and even entire IT
infrastructures as a service are increasingly popular with the midsize
organization that's growing or simply cannot afford to maintain everything itself.
However, unless the service is part of a managed services agreement, the
subscribing organization may still be responsible for protecting all of the data
and systems that now reside off premises, adding a new wrinkle to maintaining
security.
Also consider that the effort and cost of IT staff identifying and recovering from a
damaging vulnerability exploitation or security breach could be more expensive
than simply implementing a vulnerability management tool in the first place.
Page 11 of 13
E-guide
Introduction to Enterprise organizations have always been and will always be key targets of
vulnerability management attackers. They also have huge attack surfaces with thousands of network
tools nodes spread across campuses and remote business locations.
The business case for Given that a typical vulnerability assessment scan in a high-node environment
vulnerability management can yield thousands to millions of findings, from low to high criticality, it's easy to
tools see why an enterprise needs a comprehensive vulnerability management tool.
Not only does it reduce vulnerabilities, it eliminates manual configuration of
security scanning and provides a vehicle for managing the voluminous amount
of scan data and reports.
Once the need for vulnerability management tools is established, the next step
is to select one that best meets your organization's business requirements and
budget. Find out about the vulnerability management purchase selection
process in the next article in this series.
Page 12 of 13
E-guide
Page 13 of 13