PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
September 2003

Does your vulnerability assessment process need more products?

Now that we've taken giant steps to stop viruses in their tracks, detect and prevent intrusions, and thwart DoS attacks, what's next? Before we speculate about the "next big thing" in infosecurity tools, how about stepping back to recall just why you're buying and installing all these solutions in the first place: To ensure that your company can use IT resources to conduct business and minimize the impact of people who attack systems. Every resource you devote to minimizing threats and every security widget you buy impacts the bottom line. Vulnerability and risk management are at the heart of maintaining strong security. Doing it right involves much more than scanning for weaknesses and, as best you can, applying remediation. You need to prioritize threats and corrective actions according to the real risk -- what's the vulnerable asset worth to your company, and what's the likelihood of a successful attack? That kind of analysis is cumbersome and costly. So, perhaps the most important advance in infosecurity isn't the next point...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

-ADS BY GOOGLE

Close