PR Newswire: news distribution, targeting and monitoring
Home Page > News Releases > Industry News > Implementation of Vulnerability Management to Enhance Cyber Security Defense for Businesses

Implementation of Vulnerability Management to Enhance Cyber Security Defense for Businesses

2017-07-12 21:00
Share with Twitter

Frost & Sullivan article discusses how businesses can ensure the most accurate vulnerability scan data

SANTA CLARA, California, July 12, 2017 /PRNewswire/ -- Over the last several years, the number and magnitude of cyber security breaches has steadily increased. To date, numerous institutions, big and small, both private and public, have disclosed that databases containing customer identities and other private information have been exposed and compromised. Yet, there is hope for organizations and their employees alike, in the form of sophisticated cyber defense tools and security safeguards and solutions. There are numerous strategies and tools currently available that can create friction for hackers and discourage those who would attempt to breach security.

Frost & Sullivan's latest article, Leveraging Vulnerability Management for Enhanced Security, discusses how security is becoming more complex, requiring sophisticated processes and approaches such as Vulnerability Management (VM). The article reveals that North America accounted for the most VM sales, 76.8 percent, in 2016. By 2021, that share will increase to 77.8 percent.

To download the complimentary article, please visit: http://frost.ly/1mf 

"The importance of vulnerability assessment scanning cannot be overstated. The best cyber security posture is not threat incident detection and response, nor is it other threat mitigation techniques." noted Frost & Sullivan Network Security Industry Analyst Christopher Kissel. "The best threat response is prevention."

There are many challenges related to the accuracy of data and measurement in dynamic network environments. Accuracy is very important with VM and the sharing of data obtained. One particular challenge involves scan to scan host correlation. To start, there are many different scanning technologies to choose from. Often, organizations will use a technique known as network unauthenticated scanning, where scanning is remote to the devices, then sends out internet messaging, based upon device responses. This technique allows for the scanning of devices and open ports and can highlight configuration issues and other vulnerabilities.

"VM tools must be easy and intuitive to use and in the case of smaller and mid-sized companies, there has to be a mechanism where VM tools can be integrated into every day IT workflow," continued Kissel. "For example, the fundamental strength of Digital Defense, Inc.'s VM solution is that it accurately tracks the host controls in a network, and as such, the host environment is understood, and the chance for the false positives from scan data from endpoints is greatly diminished."

About Frost & Sullivan

Frost & Sullivan, the Growth Partnership Company, works in collaboration with clients to leverage visionary innovation that addresses the global challenges and related growth opportunities that will make or break today's market participants. For more than 50 years, we have been developing growth strategies for the global 1000, emerging businesses, the public sector and the investment community. Contact us: Start the discussion

Contact:
Clarissa Castaneda
Corporate Communications – North America
P: 210.477-4841
F: 210.348.1003
E: clarissa.castaneda@frost.com

http://www.frost.com

 

Source: Frost & Sullivan
Related Links:

Featured Video

Recent Releases

Computer Software Recent Releases

Computer/Electronics Recent Releases

High Tech Security Recent Releases

New products/services Recent Releases

Public Safety Recent Releases

Advanced Search
Search
  
  1. Products & Services
  2. News Releases
  3. Knowledge Center
  4. For Journalists & Media
  5. Multimedia Theater
  6. Contact Us