Managed Vulnerability Assessment

Hacker attacks are no longer limited to high-profile organizations such as banks and governments. Automated tools have made it easier to identify and exploit network exposures, swelling the ranks of hackers. At the same time, viruses, worms, and trojans have evolved into sophisticated, self-propagating attacks resistant to detection.

IT groups rely on four technologies to protect their networks: virus detection, firewalls, intrusion detection systems (IDS), and vulnerability assessment. Each has a place in a comprehensive security strategy. Only vulnerability assessment provides a proactive approach, identifying network and device vulnerabilities before damaging network attacks can take place.

Companies can choose from several approaches for vulnerability assessment: manual testing using software-based products, consultants’ penetration testing, and self-service third-party solutions. With the latter approach, commonly called Managed Vulnerability Assessment (MVA), scans are conducted by remote servers that are hosted and maintained by a third party. MVA offers clear cost and security advantages over other methods of vulnerability assessment.

This white paper explains the value of the various approaches to network security. It focuses on the unique role of vulnerability assessment, and MVA in particular. The paper concludes with a description of the QualysGuard MVA solution.

Download the paper in PDF format here.

Don't miss