Vulnerability Management

Vulnerability Management

Vulnerability Scan and Vulnerability Assessment processes aim to identify all technical vulnerabilities of a single system or the whole IT infrastructure. Both can be requested as stand-alone services or as part of a security assessment. They differ regarding the depth of the analysis involved: vulnerability scanning is performed mainly automatically, by appropriate software tools, while a vulnerability assessment involves a manual check of the relative importance and criticality of each vulnerability found and a significan link with the structure of the IT system.

Tweet about this on TwitterShare on LinkedInShare on FacebookShare on RedditShare on Google+Email this to someonePrint this page

Comments are closed