Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > AlienVault > Vulnerability Management: What you Need to Know to Prioritize Risk
 

Vulnerability Management: What you Need to Know to Prioritize Risk

Webinar Published By: AlienVault
AlienVault
Published:  Oct 21, 2014
Type:  Webinar

While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security.
Join AlienVault for this session to learn:

  • The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated
  • Vulnerability scores and how to interpret them
  • Best practices for prioritizing vulnerability remediation
  • How threat intelligence can help you pinpoint the vulnerabilities that matter most



Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value