Vulnerability management tools: Dos and don'ts

Avoid common vulnerability management errors and get the most out of your tools

By Neil Roiter, CSO |  Security, security, vulnerabilities

DO integrate vulnerability management with other security tools. Security information and event management (SIEM) heads the list. Vulnerability management is a critical source of information for SIEM as part of your overall risk management program. As soon as a vulnerability or configuration issue is detected, the information should be fed to the SIEM tool to correlate with information from other sources, such as firewalls and intrusion protection systems.

Vulnerability management also integrates well with intrusion protection systems, which can use asset inventory and vulnerability information to determine which attacks represent real threats and which can be safely ignored.

If the vulnerability management tool includes application scanning, the results can be used to create or modify protection rules for Web application firewalls.


Originally published on CSO |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question
randomness