Vulnerability management tools: Dos and don'ts

Avoid common vulnerability management errors and get the most out of your tools

By Neil Roiter, CSO |  Security, security, vulnerabilities

DO integrate vulnerability management with other security tools. Security information and event management (SIEM) heads the list. Vulnerability management is a critical source of information for SIEM as part of your overall risk management program. As soon as a vulnerability or configuration issue is detected, the information should be fed to the SIEM tool to correlate with information from other sources, such as firewalls and intrusion protection systems.

Vulnerability management also integrates well with intrusion protection systems, which can use asset inventory and vulnerability information to determine which attacks represent real threats and which can be safely ignored.

If the vulnerability management tool includes application scanning, the results can be used to create or modify protection rules for Web application firewalls.

Originally published on CSO |  Click here to read the original story.
Join us:






Spotlight on ...
Online Training

    Upgrade your skills and earn higher pay

    Readers to share their best tips for maximizing training dollars and getting the most out self-directed learning. Here’s what they said.


    Learn more

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Ask a Question