Intelligent Issue 22 - Page 12





one are the days when

G sysadmin simply schedule patches to their network a week or two after Patch Tuesday and call it a day . Given the complexity of the current digital landscape , i . e , the scale and diversity of endpoints , applications , and operating systems on the network spread across the globe , many organizations face greater cyberrisk today . Not to mention the rate at which vulnerabilities are burgeoning .

Worse still , the coverage of attack vectors beyond the scope of vulnerabilities is constantly widening . This puts pressure on organizations to reorganize their priorities around vulnerability management . But often , organizations are overwhelmed with a flood of concerns .
How often should I scan my network ? Which areas should I focus on first ? Will vulnerability management actually lower risks , or is it merely a compliance chore ? What factors should I consider to prioritize high-profile risks ? How do I define a better remediation method ? Should my security architecture be entirely dependent upon patching ? What if I come across a zeroday vulnerability in my network ?
In this e-book , we ' re tackling 7 essential vulnerability management questions to dispel all your doubts once and for all . This e-book is not only a consolidated source of answers to the top vulnerability management questions , but also as a guide to adopting the best possible course of action at various stages of your vulnerability management endeavors . For this e-book , you ' ll need to be familiar with the fundamentals of vulnerability management .
Though this e-book is written in a sequential order , every section is self-contained . Feel free to dip in and out of this book as you prefer . Use the links in the table of contents to jump to a section that appeals to you or read it from cover to cover .
Does agent-based vulnerability management give you an edge ? What about in remote work conditions ?
Eliminating blind spots is the key to an efficient vulnerability management program , and endpoint agents do a great job of this . The scope of visibility , accuracy , and efficiency offered by agent-based scanning simply can ' t be achieved with agentless scanning .
Agentless scanning is network intrusive and is likely to result in traffic congestion every time a network-based scan is performed to discover and retrieve the vulnerability status of network assets . Additionally , it requires host credentials to access and run a detailed scan against an asset to inspect the file system , registry , and configurations . This brings up further issues with staying up to date with changing credentials and investing in secure storage options to prevent credential compromise . On the other hand , agents are lightweight , multipurpose tools that reside within the endpoints . �
12 intelligent
. tech
Intelligent SME . tech