LATEST INTELLIGENCE you ’ ll need to be familiar with the fundamentals of vulnerability management . and efficiency offered by agent-based scanning simply can ’ t be achieved with agentless scanning .
Though this e-book is written in a sequential order , every section is self-contained . Feel free to dip in and out of this book as you prefer . Use the links in the table of contents to jump to a section that appeals to you or read it from cover to cover .
Does agent-based vulnerability management give you an edge ? What about in remote work conditions ?
Eliminating blind spots is the key to an efficient vulnerability management program , and endpoint agents do a great job of this . The scope of visibility , accuracy ,
Agentless scanning is network intrusive and is likely to result in traffic congestion every time a networkbased scan is performed to discover and retrieve the vulnerability status of network assets . Additionally , it requires host credentials to access and run a detailed scan against an asset to inspect the file system , registry , and configurations . This brings up further issues with staying up to date with changing credentials and investing in secure storage options to prevent credential compromise .
On the other hand , agents are lightweight , multipurpose tools that reside within the endpoints . p