Vulnerability assessment (VA) provides baseline and discovery functions in support of vulnerability management. VA products scan an endpoint and attempt to determine vulnerable conditions based on a database of known vulnerabilities. VA products can also determine many other aspects of the endpoint, including open ports, running services and protocols, applications, and operating system. This information provides security groups with the data they need to measure security postures. When your security group documents the weakness of the network and host infrastructure, you can begin to make decisions on how to eliminate the root cause of the majority of exploits, reduce the potential attack vectors and limit the impact of a security incident.

Source: Gartner

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: