PRO+ Premium Content/E-Handbooks

Thank you for joining!
Access your Pro+ Content below.
October 2015

What to look for in vulnerability management

Sponsored by SearchSecurity.com

Every enterprise has its security vulnerabilities and some are easy to spot. The trick is how to prioritize and fix the flaws in the system. This is an increasingly difficult task for information security teams, and therefore the right vulnerability management tool is increasingly important.

This Buyer's Essentials is intended for those InfoSec pros considering purchasing a vulnerability management product. It explains the security problem and what available tools can do to alleviate those problems. It then highlights the key features corporate InfoSec pros should look for in their next vulnerability management tool, as well as some "nice to have" features. This Buyer's Essential also considers such issues as compatibility with existing security infrastructure and ease-of-management considerations. It offers technology buyers a "bottom line" assessment of what a new tool needs to be able to do and how best to evaluate vendor offerings.

About The Author

Mike Chapple - Senior Director of IT Service Delivery

Mike Chapple, Ph. D., CISA, CISSP, is a senior director of IT ...Read More

Table Of Contents

  • Explained
  • How It works
  • Features
  • The bottom line

More PRO+ Content

View All