Vulnerability Management Tools
Vulnerability Management Tools Overview
What is Vulnerability Management Tools?Vulnerability management tools are an approach to network security that differs from peripheral solutions like firewalls, antivirus and antispyware software, and Intrusion Detection Systems (IDS). All of these peripheral approaches are designed to prevent unauthorized attack to network assets by focusing on attacks as they happen. Vulnerability management tools instead searches for potential network weaknesses and fixing them before an attempted intrusion occurs.
Vulnerability management tools initially assess the network using a network and port scanners, IP scanners etc. and then prioritize any revealed weaknesses so that the most significant are addressed first.
Reducing network weaknesses in this way, reduces dependence on peripheral intrusion detection technologies since even if access to the network is achieved, there are no vulnerabilities to exploit. However, for this to work, it is imperative that any vulnerabilities discovered as a result of scans must be remediated quickly in accordance with a priority schedule. A best practice is to do limited scans and then remediate immediately, instead of very extensive scans which leave vulnerabilities unremediated for too long.
Vulnerability Management Products
FireMon's Network Security Policy Management (NSPM) platform gives security and operations teams automated visibility and analysis for network security devices. FireMon's web-based UI allows users to dissect their network security policies, locate compliance failures, and assess security...
Qualysguard, from San Francisco-based Qualys, is network security and vulnerability management software.
Tenable SecurityCenter, from Tenable Network Security in Baltimore, presents a vulnerabiliy management option.
OSSIM leverages the power of the AlienVault Open Threat Exchange by allowing users to both contribute and receive real-time information about malicious hosts. AlienVault OSSIM is an open source Security Information and Event Management (SIEM) product. It is a unified platform providing: Asset...
IP360 from Tripwire is a vulnerability management solution; the technology was acquired with nCircle in 2013 and based on the nCircle 360 Suite product.
New York-based SecurityScorecard presents a vulnerability management solution.
BeyondTrust offers vulnerability management, with the Retina Network Security Scanner. This technology was developed by eEye, before that company's acquisition by BeyondTrust in 2012.
The Penetrator Vulnerability Scanner from Denmark-based SecPoint is a vulnerability management solution.
Dallas-based Critical Watch offers FusionVM, a vulnerability management solution.
Mountain View, California based Skyport Systems presents a vulnerability management solution.
Boston-based Recorded Future presents a vulnerability management solution.
Ivanti Endpoint Security, powered by Heat (formerly known as Heat Unified Endpoint Management & Security, which in turn was formerly a Lumension supported product) presents a vulnerability management and antivirus solution.
Foundstone is a vulnerability management option from Intel Security / McAfee.
San Francisco-based Digital Shadows presents a vulnerability management solution.
Attivo Networks in Fremont, California presents a vulnerability management solution.
Aptean Verdiem includes Verdiem Surveyor and Verdiem EvokeIT and presents a device wake and power management solution to measure keyboard, mouse, CPU, print network, and disk activity as well as support patching and updating, conserve power, and prevent vulnerabilities across the network.
SecPod Saner endpoint security solution provides continuous visibility and control for all endpoints. It proactively remediates risks and detects and responds to threats. Saner combines endpoint vulnerability, patch and compliance management with endpoint threat detection and response into one easy...
AnchorPoint’s Integrated Threat Response (ITR) service is a combination of advanced security tools, threat intelligence, and expert action. This service focuses on detection and response. The primary purpose of ITR is to decrease attacker dwell time in an organization’s network. According to the...
SIEMphonic Essentials is designed to help organizations strengthen their security defenses, respond effectively, control costs, and optimize their team's capabilities. The vendor says they have automated and simplified SIEM capabilities to analyze event data in real time, then collect, store,...
Code Dx Enterprise is an automated vulnerability management tool for applications, meant to provide security while integrating with application lifecycle management tools as well.