Vulnerability Management

Vulnerability Management

Vulnerability Scan and Vulnerability Assessment processes aim to identify all technical vulnerabilities of a single system or the whole IT infrastructure. Both can be requested as stand-alone services or as part of a security assessment. They differ regarding the depth of the analysis involved: vulnerability scanning is performed mainly automatically, by appropriate software tools, while a vulnerability assessment involves a manual check of the relative importance and criticality of each vulnerability found and a significan link with the structure of the IT system.

Comments are closed