A look at vulnerability assessment tools

Peter Stephenson, technology editor, SC Magazine
Peter Stephenson, technology editor, SC Magazine
We always look forward to this group because there always is something new to report. This year is no exception. Vulnerability assessment has changed over the years, and we hope to shed a bit of light on those changes.
It is important that, when performing vulnerability assessment, one keeps a perspective on exactly what one is doing. Doing a simple vulnerability scan tells little, taken by itself. Performing a penetration test in isolation is even more limiting. So, the implication is that vulnerability assessment is a holistic process. And that, it turns out, is exactly the case.

In the formative days of vulnerability assessment and penetration testing, everything was about finding the vulnerability and, if one was clear on the concept, verifying whether the vulnerability could be exploited. Today, that is only a piece of the process. Vulnerabilities – real vulnerabilities – need to be verified for their exploitability. That is where pen testing comes in. If one wants to address the vulnerability, one needs to add vulnerability management. That is not anywhere near as simple as it sounds.

This month, the biggest thing we saw was the maturing of vulnerability assessment into vulnerability management, which is good news for the information assurance community. It means that the biggest issue that we face is, at least, identifiable and manageable.

However, there are complexities that simply referring to a vulnerability as a risk don't address. The message is clear: To manage vulnerabilities fully we need threat and vulnerability information. Then we need to apply management techniques.

Just because some vendor wants one to believe that vulnerabilities are risks, don't take the easy way out and just fix the vulnerability. The fact is that one is likely to see far more vulnerabilities than can be fixed economically, and represent a serious hole in one's enterprise. This is all about triage. What can one afford to fix – or not fix? That is what we'll try to help answer in this month's Group Test.
close

Next Article in Reviews

Sign up to our newsletters

More in Reviews

Stopping distributed denial-of-service attacks

Stopping distributed denial-of-service attacks

FortiDDoS is an appliance that examines data packets in a variety of ways to separate DDoS packets from legitimate packets.

SIEM City

This month we look at security information and event management (SIEM) tools.

Emerging products: Virtual system security

Don't presume the vShield will protect you. That actually is not the case, says Peter Stephenson.