Scanless Vulnerability Assessment. A Next-Generation Approach to Vulnerability Management

Size: px
Start display at page:

Download "Scanless Vulnerability Assessment. A Next-Generation Approach to Vulnerability Management"

Transcription

1 Scanless Vulnerability Assessment A Next-Generation Approach to Vulnerability Management

2 WHITEPAPER Overview Vulnerability scanning, or the process of identifying a list of known security gaps in the network environment, is the focal point for most enterprise vulnerability management programs. Before any action can be taken to assess risks or prioritize vulnerabilities for remediation, you have to know the extent of your vulnerability challenge. The use of vulnerability scanners as security assessment tools is nearly ubiquitous in large organizations. Regular network scans are recommended by security industry best practices and required by numerous regulations. However, as network infrastructures have grown more complex and identified vulnerabilities have multiplied, the effectiveness of vulnerability scanning as a security management tool has declined. In a July 2015 Skybox Security survey, enterprise IT personnel reported several major challenges that limited their use of traditional active vulnerability scanning. Respondents indicated that even with one or more active scanners, they are not able to respond to new vulnerabilities and threats quickly. Most lack the ability to prioritize accurately based on their network context. Blind spots left by unscannable devices and zones leave open risks, and false positives waste valuable time. The sheer magnitude of the enterprise vulnerability problem is daunting. In today s enterprise networks, scanners may identify tens of thousands or hundreds of thousands of vulnerabilities at once. Review and remediation efforts may take weeks, while new vulnerabilities and threats are introduced daily. Simply put there is no way for most enterprises to examine, prioritize and remediate vulnerabilities frequently enough; and, over a large enough portion of the network infrastructure, to bring risk level down on time, before exploitation. A next-generation approach is needed.

3 WHITEPAPER Contents Overview Achieving Broad and Frequent Vulnerability Discovery 4 6 The Active Scanning Bottleneck Business Costs and Management Time The New Approach to Vulnerability Discovery Finding Vulnerabilities Without an Active Scan Vulnerability Discovery with Rule-Driven Profiling (RDP) Data Sources for Product Profiling Benefits of Scanless Vulnerability Assessment Mixing Scanless Assessment and Active Scanning Approaches Summary About Skybox Security

4 Achieving Broad and Frequent Vulnerability Discovery WHITEPAPER A new approach to vulnerability management starts with the way vulnerabilities are discovered in the first place. Vulnerability management programs are only effective at preventing attacks and data breaches if the organization can minimize both the risk exposure window (the amount of time between identifying a risk and resolving it) and the attack surface (all the ways in which an enterprise s IT systems are vulnerable to threats). To shrink the risk exposure window, the organization needs continuous visibility of attack vectors, and must drive mitigation of the most important risks before an attacker exploits them first. This makes the frequency of vulnerability scans and remediation efforts is highly important. To map out and then minimize the attack surface, the organization must have a comprehensive understanding of available attack vectors across the network, and identify those attack vectors that contribute most to the size of the attack surface. This makes the coverage of vulnerability scans is important as well. And with enterprise networks continuing to grow at an exponential pace, 50 percent scan coverage today might mean 0.5 percent coverage two years from now. How effective is your scan approach? Assume that you live in a huge home with dozens of doors and hundreds of windows. Break-ins are common, and you want to reduce the chance of theft. To protect against intruders, you check half of the doors on Wednesday, the other half on Friday, and the windows every other week. Sound effective? Of course not. Yet this is sadly similar to the round robin scheduling approach used for network vulnerability scans in many organizations. The message is clear: the next-generation of vulnerability management must include a discovery approach that keeps pace with new vulnerabilities, threat updates and daily network changes and covers as much of the network as possible. The Active Scanning Bottleneck In vulnerability management, there exists a scanning conundrum. If up-to-date scanning that covers more systems is so important to understanding and responding to vulnerabilities, why don t organizations just run more scans? The answer, of course, is that active scanning produces several bottlenecks in the vulnerability management process that are extremely difficult and costly to resolve. On a large scale, active scanning processes become unmanageable. POTENTIAL DISRUPTION A network vulnerability scanner, as the name implies, scans every host in the target network against thousands of scan signatures. A signature is typically a script that tests for the existence of one or a few vulnerabilities, by probing the host for information that would reveal whether this host is vulnerable to a certain attack. Sometimes the method of probing the host is essentially the same as an attack, testing the host directly to see if exploitation is truly possible. This can lead to serious disruption of critical business services. To minimize the potential disruption, dangerous attack signatures that could lead to disruption are avoided, often in the most critical parts of production networks where 100 percent uptime is of supreme importance. The organization becomes 4

5 blind to these attack vectors, or runs the more disruptive tests in very distinct test windows. Due to the changes in the IT infrastructure and the publication of many new vulnerabilities every WHITEPAPER day, the value of vulnerability knowledge decays quickly over time, making infrequent vulnerability testing ineffective. 100% Gaining vulnerability knowledge while scanning Decay of vulnerability knowledge post-scanning 50% Time Month 1 Month 2 Month 3 FIGURE 1: THE VALUE OF VULNERABILITY KNOWLEDGE DECAYS OVER TIME Skybox Security ACCESS ISSUES Sometimes, network access policies make it impossible to do a scan with access credentials. Non- authenticated network scanning (i.e., attempting to probe the host without access credentials) is much less accurate. Non-authenticated scans result in a lot of false positives and false negatives, as less information about the host and potentially vulnerable services is available from the outside. Firewalls themselves can also pose a challenge to active scanners. If an active scan must pass through a firewall, the stateful inspection of the firewall might interfere with the scan. This can lead to disruption of the firewall operation or partial scan results. NETWORK TRAFFIC IMPACT Now, let s consider the scale of the enterprise scanning job. For example, a single planned scan period targeting 1,000 hosts, to verify 1,000 vulnerability types may result in hundreds of thousands of individual tests. In a really large network with 100,000 hosts, testing against these 1,000 signatures would result in 100 million tests. More tests mean more active network sessions, adding to the traffic load. Therefore active scanning can t done too intensively, or it can bog down network performance to unacceptable levels. 5

6 WHITEPAPER HOSTS TESTING SCRIPTS VULNERABILITY SCANNER VULNERABILITY REPORT FIGURE 2: VULNERABILITY DISCOVERY WITH ACTIVE SCANNING ENGINE Skybox Security NON-SCANNABLE HOSTS Many hosts can t be scanned at all for the following reasons: > > Mission critical hosts can never be touched by an active scan > > Industrial controllers, smart grid controllers and other systems where standard scanning techniques are either not applicable, not available or not wanted because of those systems sensitivity > > Mobile devices (BYOD) changing IP address and topological location make them a moving target and difficult to scan > > Organizations may have limited rights to scan virtual machines hosted in a public cloud Business Costs and Management Time Last but not least, the active scanning infrastructure required to have complete coverage of the enterprise network may require a large footprint of scanners, which is costly to purchase, implement and manage. Even if the technology costs are addressed or absorbed by the organization, active scanners produce huge amounts of data with little context for accurate prioritization. Typical reports from an enterprise-level active scanning program may take a team of security analysts days or weeks to evaluate and determine appropriate response. Adding more people to evaluate more data from more active scans is not a scalable solution. 6

7 WHITEPAPER 2015 Enterprise Vulnerability Management Trends Report The Skybox Vulnerability Management Trends Report polled nearly 1000 IT decision makers including C-level executives, security managers and network and systems engineers involved in vulnerability management processes. The companies surveyed ranged in size from less than 100 to more than 100,000 employees. The survey revealed: > > The two highest ranking potential vulnerability program improvements organizations seek are responding quickly to new threats and prioritizing risks more accurately based on network context > > Less than half of all CISOs reported that they were satisfied with their current vulnerability management program > > Most organizations currently scan monthly or less often, but ideally would like to scan weekly or even daily > > 36 percent of SMB respondents (1 99 employees) scan quarterly or less often. By contrast, 17 percent of enterprises with 5,000 and more employees scan quarterly or less frequently. The New Approach to Vulnerability Discovery Finding Vulnerabilities Without an Active Scan Most of the vulnerabilities in operating systems, middleware and commercial applications covered by active scanners, can be deduced very accurately if there is detailed knowledge available of the systems and applications in use. For example, critical remote code execution vulnerability CVE has been found to occur on all Windows hosts with Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier. It s easy to determine if this vulnerability exists if you know the detailed information about installed software. No need to actively probe with test signatures. In a recent analysis of corporate network vulnerability data, Skybox found that in organizations that are heavily reliant on Microsoft and Linux infrastructure for server and endpoints, substantially all of the vulnerability instances in the assessed networks were concentrated on few hundred software products/platforms. Furthermore, more than 90 percent of the vulnerabilities were ones that could be accurately derived from granular knowledge of the operating system (including edition, patches, hardware, etc.) and details about all software products installed (including product version, patch level, special editions, etc.). In other words, if we have detailed knowledge of all products installed on the hosts in the network, then more than 90 percent of the vulnerabilities can be accurately discovered without an active scan. This realization is nothing new. There have been previous attempts at scanless vulnerability discovery based on one-to-one mapping of product information to vulnerabilities. Oneto-one mapping is too simplistic and fails as an approach because: > > Vulnerability deduction requires very detailed product information that includes edition, major and minor versions and patch level 7

8 > > In many cases, vulnerability deduction requires consideration of more than one product to conclude the existence of a single vulnerability instance. In the example above using CVE , deducing whether this WHITEPAPER vulnerability exists requires consideration of both the operating system and the product installed Vulnerability Discovery with Rule-Driven Profiling (RDP) Both flaws of the old techniques can be overcome by utilizing a rule-driven profiling approach, which is the core of the Skybox Vulnerability Detector feature included in Skybox Vulnerability Control. Rule-driven profiling is a two-step process that converts the product configuration and description information stored in system and security management repositories into a detailed and accurate product catalog, and then accurately deduces a list of vulnerabilities present in the network environment. HOSTS EXTRACTION RULES LIBRARY VULNERABILITY DETECTION RULES LIBRARY SYSTEM, ASSET OR PATCH MANAGEMENT SYSTEM PRODUCT PROFILING PRODUCT CATALOG VULNERABILITY PROFILING VULNERABILITY LIST FIGURE 2: VULNERABILITY DISCOVERY WITH RULE-DRIVEN PROFILING The first phase is called product profiling, which involves collecting, merging, and normalizing product configuration information into a comprehensive list of the systems and products installed in the network environment. The raw data is collected automatically from multiple data sources such as Microsoft SCCM, WSUS, RedHat Satellite, results from previous authorized scans and patch management systems. Thousands of information extraction rules are then applied to translate strings such as Microsoft Windows 7 Enterprise with MDOP 2011 R2 into a normalized Common Platform Enumeration (CPE), which Skybox Security represents installed products, version information, patch level and more. The second phase is called vulnerability profiling, which converts this CPE into accurate vulnerability data. We utilize a proprietary library of tens of thousands of logical rules contained in the Skybox Vulnerability Database (updated daily) to test the product catalog to determine if a set of pre-conditions for the existence of a vulnerability are met. The rules take multiple factors into account to deduce if a vulnerability truly exists in the environment. For example, a particular vulnerability 8

9 may exist on a certain product, version and patch level of Adobe Reader, but only when running in a particular operating system environment and in the presence or absence of other products or factors. This results in a comprehensive and highly accurate product catalog and list of found vulnerabilities compatible with MITRE s CPE and CVE standards that can be updated automatically and continuously without requiring an active scan. WHITEPAPER The accuracy of the RDP technique depends on the granularity of the product profiling and the vulnerability deduction rules. The Skybox Vulnerability Lab team has developed an extensive library containing tens of thousands of vulnerability profiling rules, and continuous updates to this content library ensure a very accurate vulnerability discovery process. Data Sources for Product Profiling Skybox leverages existing, authoritative network and host configuration data repositories to extract vulnerability information in a non-disruptive and highly accurate manner. The data is retrieved from operational products that are already deployed and used by IT and security organizations such as: > > Microsoft Active Directory > > Microsoft System Center Configuration Manager (SCCM) > > Microsoft Windows Server Update Service (WSUS) > > Configuration management databases (CMDB) > > Red Hat Satellite > > Previous authorized scan information > > Network devices > > Anti-virus software See a full list of products supported by Skybox Vulnerability Detector. These management tools, already deployed in most enterprises, synchronize information about the network hosts and installed software products frequently, and therefore own an up-todate picture of much of the typical network environment. That picture includes information on the operating system, the installed products and their versions, installed patches and missing patches. Skybox merges the information from multiple sources into a consolidated product catalog representing that organization s unique environments. Benefits of Scanless Vulnerability Assessment The use of scanless assessment to identify vulnerabilities has many benefits. This scanless vulnerability discovery technique minimizes network disruptions; can provide up-to-date vulnerability information quickly to respond to new threats; and can meet the levels of vulnerability identification frequency and coverage needed to understand the attack surface. When combined with other automated analytical capabilities in Skybox Vulnerability Control, organizations can effectively minimize the window of exposure and effectively mitigate the most critical vulnerabilities before they can be exploited. 9

10 MINIMIZES DISRUPTIONS Since Vulnerability Detector collects all of the information about hosts from existing system management solutions no target host is ever probed or touched. This non-invasive vulnerability discovery technique does not disrupt the network or any business services or negatively impact network performance. EASILY DEPLOYED In addition, gaining access to a few centralized data repositories already deployed is significantly easier than deploying active scanners throughout a network and gaining approvals to scan business-critical areas. These differences mean that deployment of the Skybox vulnerability discovery approach can take days, where deployment of active scanning can take weeks or months in a large organization with a complex network. CONTINUOUS MONITORING Scanless assessment is an analytic vulnerability discovery technique, and up-to-date source data can be collected and analyzed at any time in a matter of seconds or minutes. Skybox Vulnerability Control can be used to identify, analyze and manage vulnerabilities on a daily basis, compared to a cycle of weeks or months to perform full scanning of an entire large enterprise network. FAST THREAT RESPONSE Another advantage of the scanless assessment technique is the availability of comprehensive, up-to-date product catalogs and vulnerability data to correlate against emerging threat WHITEPAPER Next Generation Approach to Patch Tuesday On Microsoft s monthly patch Tuesday, many new vulnerability types are published for Microsoft platforms and products. Active scanning for the new and sometimes critical vulnerabilities could cause significant delay possibly weeks or months due to limited approved scan windows. Patching everything is usually not an option for enterprise-size networks, due to operating system standards, software dependencies and more. With scanless assessment, finding all instances of the vulnerability types announced on Microsoft s Patch Tuesday can be done on the same Tuesday, without running any disruptive scans. intelligence. Early warning systems are most effective in identifying real hazards to the organization when they can assess the relevance of a new threat alert against accurate and timely data sources, without waiting for a full scan. Mixing Scanless Assessment and Active Scanning Approaches While the scanless assessment technique within Skybox Vulnerability Control can identify vulnerabilities at the high-levels of frequency and coverage required for effective vulnerability management, continued use of network vulnerability scanners can extend coverage even further. Network vulnerability scanners may be used to probe hosts for specific attack patterns that cannot be detected by scanless assessment. Because of this capability, using Skybox Vulnerability Control daily and a network vulnerability scanner occasionally will achieve continuous vulnerability management objectives covering 90 percent of vulnerabilities and near-100 percent coverage of all vulnerability types through regular combination with active scan data. 10

11 Summary For vulnerability management programs to succeed in lowering risk levels or preventing potential attacks, security teams need to reexamine the effectiveness of their vulnerability discovery approach. Identifying vulnerabilities on a frequent basis and responding quickly to new threats is critical to success, as is covering enough of the infrastructure to make a difference. Traditional active scanners may produce accurate results when applied, but may face challenges that limit their use in the network environment, such as access issues or disruption of critical services. Scanless assessment is a two-step process that does not rely on active scanning technologies, and, therefore, is not subject to the same concerns about disruption and access as a traditional vulnerability scanner. Scanless assessment converts the product configuration and description information stored in system and security management repositories into a detailed and accurate product catalog, and then accurately deduces a list of vulnerabilities present in the network environment. With this information, more than 90 percent of the vulnerabilities in a typical enterprise network can be accurately discovered without an active scan. When the high frequency of scanless assessment is combined with active scanning, scanless assessment can fill in the vulnerability information between monthly or quarterly active scans, and extend vulnerability coverage to previously unscannable systems. Skybox recommends using Vulnerability Control daily, either independently or in conjunction with a network vulnerability scanner, to reduce overall risk and have the intelligence needed to respond to new threats at any time. About Skybox Security Skybox arms security teams with a powerful set of security management solutions that extract insight from traditionally siloed data to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures. info@skyboxsecurity.com Copyright 2016 Skybox Security, Inc. All rights reserved. Skybox is a trademark of Skybox Security, Inc. All other registered or unregistered trademarks are the sole property of their respective owners.

How To Manage A Network Security Risk

How To Manage A Network Security Risk Scanless Vulnerability Assessment: Skybox Security whitepaper July 2014 1 Overview Vulnerability scanning, or the process of identifying a list of known security gaps in the network environment, is the

More information

Next-Generation Vulnerability Management

Next-Generation Vulnerability Management White Paper Transform Checkbox Compliance into a Powerful Risk Mitigation Tool Skybox Security whitepaper, June 2014 Executive Summary Vulnerability management is the process of identifying, classifying,

More information

Best Practices for Vulnerability Management

Best Practices for Vulnerability Management 4 Steps to Reducing Risk with Vulnerability Management Best Practices Is Your Vulnerability Management Process Meaningful To Your Business? The vulnerability management process can be very useful and provide

More information

Risk Analytics for Cyber Security

Risk Analytics for Cyber Security Risk Analytics for Cyber Security Justin Coker, VP EMEA, Skybox Security IT Challenges 2015, Belgium 2nd October 2014 www.skyboxsecurity.com justin.coker@skyboxsecurity.com +44 (0) 7831 691498 Risk Analytics

More information

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION Table of Contents Executive Summary...3 Vulnerability Scanners Alone Are Not Enough...3 Real-Time Change Configuration Notification is the

More information

EXTENSIVE FEATURE DESCRIPTION SECUNIA CORPORATE SOFTWARE INSPECTOR. Non-intrusive, authenticated scanning for OT & IT environments. secunia.

EXTENSIVE FEATURE DESCRIPTION SECUNIA CORPORATE SOFTWARE INSPECTOR. Non-intrusive, authenticated scanning for OT & IT environments. secunia. Non-intrusive, authenticated scanning for OT & IT environments The situation: convenience vs. security Interconnectivity between organizations and corporate networks, the internet and the cloud and thus

More information

2015 Enterprise Vulnerability Management Trends Report

2015 Enterprise Vulnerability Management Trends Report 2015 Enterprise Vulnerability Management Trends Report A survey and analysis of 974 end-users current vulnerability management practices APRIL 29, 2015 Copyright 2016 Skybox Security, Inc. All rights reserved.

More information

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure

More information

Automated Firewall Change Management. Ensure continuous compliance and reduce risk with secure change management workflows

Automated Firewall Change Management. Ensure continuous compliance and reduce risk with secure change management workflows Automated Firewall Change Management Ensure continuous compliance and reduce risk with secure change management workflows JANUARY 2015 Executive Summary Firewall management has become a hot topic among

More information

How To Monitor Your Entire It Environment

How To Monitor Your Entire It Environment Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

2015 Enterprise Vulnerability Management Trends Report

2015 Enterprise Vulnerability Management Trends Report 2015 Enterprise Vulnerability Management Trends Report A survey and analysis of 974 end-users current vulnerability management practices April 29, 2015 Executive Summary Vulnerability management is an

More information

User s Guide. Skybox Risk Control 7.0.0. Revision: 11

User s Guide. Skybox Risk Control 7.0.0. Revision: 11 User s Guide Skybox Risk Control 7.0.0 Revision: 11 Copyright 2002-2014 Skybox Security, Inc. All rights reserved. This documentation contains proprietary information belonging to Skybox Security and is

More information

Extreme Networks Security Analytics G2 Vulnerability Manager

Extreme Networks Security Analytics G2 Vulnerability Manager DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering

More information

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security

More information

Technology Blueprint. Assess Your Vulnerabilities. Maintain a continuous understanding of assets and manage vulnerabilities in real time

Technology Blueprint. Assess Your Vulnerabilities. Maintain a continuous understanding of assets and manage vulnerabilities in real time Technology Blueprint Assess Your Vulnerabilities Maintain a continuous understanding of assets and manage vulnerabilities in real time LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1

More information

Closing the Vulnerability Gap of Third- Party Patching

Closing the Vulnerability Gap of Third- Party Patching SOLUTION BRIEF: THIRD-PARTY PATCH MANAGEMENT........................................ Closing the Vulnerability Gap of Third- Party Patching Who should read this paper IT Managers who are trying to manage

More information

Optimizing Network Vulnerability

Optimizing Network Vulnerability SOLUTION BRIEF Adding Real-World Exposure Awareness to Vulnerability and Risk Management Optimizing Network Vulnerability Management Using RedSeal november 2011 WHITE PAPER RedSeal Networks, Inc. 3965

More information

Complete Patch Management

Complete Patch Management Complete Patch Management Complete - Flexible Unique In- Depth Secunia CSI 7 Corporate Software Inspector Take control of the vulnerability threat and optimize your IT security investments. The Secunia

More information

IBM Security QRadar Vulnerability Manager

IBM Security QRadar Vulnerability Manager IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk

More information

What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options

What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options White paper What a Vulnerability Assessment Scanner Can t Tell You Leveraging Network Context to Prioritize Remediation Efforts and Identify Options november 2011 WHITE PAPER RedSeal Networks, Inc. 3965

More information

FIVE PRACTICAL STEPS

FIVE PRACTICAL STEPS WHITEPAPER FIVE PRACTICAL STEPS To Protecting Your Organization Against Breach How Security Intelligence & Reducing Information Risk Play Strategic Roles in Driving Your Business CEOs, CIOs, CTOs, AND

More information

Resolving the Top Three Patch Management Challenges

Resolving the Top Three Patch Management Challenges LANDesk Technical White Paper Resolving the Top Three Patch Management Challenges Technical White Paper Visit www.landesk.com for more information. To the maximum extent permitted under applicable law,

More information

PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region

PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

SECURITY RISK MANAGEMENT. FIRST 2007 Seville, Spain

SECURITY RISK MANAGEMENT. FIRST 2007 Seville, Spain SECURITY RISK MANAGEMENT FROM TECHNOLOGY VISION TO MARKET REALITY Avi Corfas, VP EMEA Skybox Security FIRST 2007 Seville, Spain Topics The Risk Assessment Challenge What Is IT Security Risk Management?

More information

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations

More information

Attack Your Attack Surface

Attack Your Attack Surface Attack Your Attack Surface How to reduce your exposure to cyberattacks with an attack surface visualization solution MARCH 2016 Prepared for Skybox Security by Jon Friedman, CyberEdge Copyright 2016 Skybox

More information

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions CORE Security +1 617.399-6980 info@coresecurity.com www.coresecurity.com blog.coresecurity.com Preempting

More information

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division

More information

IBM QRadar Security Intelligence April 2013

IBM QRadar Security Intelligence April 2013 IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence

More information

Integrated Threat & Security Management.

Integrated Threat & Security Management. Integrated Threat & Security Management. SOLUTION OVERVIEW Vulnerability Assessment for Web Applications Fully Automated Web Crawling and Reporting Minimal Website Training or Learning Required Most Accurate

More information

Software Vulnerability Assessment

Software Vulnerability Assessment Software Vulnerability Assessment Setup Guide Contents: About Software Vulnerability Assessment Setting Up and Running a Vulnerability Scan Manage Ongoing Vulnerability Scans Perform Regularly Scheduled

More information

White Paper The Dynamic Nature of Virtualization Security

White Paper The Dynamic Nature of Virtualization Security White Paper The Dynamic Nature of Virtualization Security The need for real-time vulnerability management and risk assessment Introduction Virtualization is radically shifting how enterprises deploy, deliver,

More information

2016 Firewall Management Trends Report

2016 Firewall Management Trends Report 2016 Firewall Management Trends Report A survey of trends in firewall use and satisfaction with firewall management JANUARY 2016 Copyright 2016 Skybox Security, Inc. All rights reserved. Skybox is a trademark

More information

Implement a unified approach to service quality management.

Implement a unified approach to service quality management. Service quality management solutions To support your business objectives Implement a unified approach to service quality management. Highlights Deliver high-quality software applications that meet functional

More information

1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 5 4 Copyright... 5

1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 5 4 Copyright... 5 KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski May 2015 is a business-critical application security solution for SAP environments. It provides a context-aware, secure and cloud-ready platform

More information

Endpoint Security Management

Endpoint Security Management Endpoint Security Management LANDESK SOLUTION BRIEF Protect against security threats, malicious attacks and configuration vulnerabilities through strong endpoint security control and maintenance. Protect

More information

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target

More information

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst ESG Lab Review RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab review documents

More information

Fusing Vulnerability Data and Actionable User Intelligence

Fusing Vulnerability Data and Actionable User Intelligence Fusing Vulnerability Data and Actionable User Intelligence Table of Contents A New Threat Paradigm... 3 Vulnerabilities Outside, Privileges Inside... 3 BeyondTrust: Fusing Asset and User Intelligence...

More information

Vulnerability management lifecycle: defining vulnerability management

Vulnerability management lifecycle: defining vulnerability management Framework for building a vulnerability management lifecycle program http://searchsecurity.techtarget.com/magazinecontent/framework-for-building-avulnerability-management-lifecycle-program August 2011 By

More information

CDM Vulnerability Management (VUL) Capability

CDM Vulnerability Management (VUL) Capability CDM Vulnerability Management (VUL) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Vulnerability Management Continuous Diagnostics and Mitigation

More information

Why Free Patch Management Tools Could Cost You More

Why Free Patch Management Tools Could Cost You More Why Free Patch Management Tools Could Cost You More Selecting the right solution can save your organization time and money By KACE & Lumension Table of Contents 1.0 Introduction... 3 2.0 Point Patching

More information

PCI DSS Reporting WHITEPAPER

PCI DSS Reporting WHITEPAPER WHITEPAPER PCI DSS Reporting CONTENTS Executive Summary 2 Latest Patches not Installed 3 Vulnerability Dashboard 4 Web Application Protection 5 Users Logging into Sensitive Servers 6 Failed Login Attempts

More information

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015 NEXPOSE ENTERPRISE METASPLOIT PRO Effective Vulnerability Management and validation March 2015 KEY SECURITY CHALLENGES Common Challenges Organizations Experience Key Security Challenges Visibility gaps

More information

2015 Vulnerability Statistics Report

2015 Vulnerability Statistics Report 2015 Vulnerability Statistics Report Introduction or bugs in software may enable cyber criminals to exploit both Internet facing and internal systems. Fraud, theft (financial, identity or data) and denial-of-service

More information

IBM Tivoli Endpoint Manager for Security and Compliance

IBM Tivoli Endpoint Manager for Security and Compliance IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console

More information

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management Prevent cyber attacks. SEE what you are missing. See Your Network MAP. Prevent Cyber Attacks. Driven by the need to support evolving business objectives, enterprise IT infrastructures have grown increasingly

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols

THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE

More information

WHITEPAPER Map, Monitor, and Manage Distributed Applications in System Center 2012

WHITEPAPER Map, Monitor, and Manage Distributed Applications in System Center 2012 WHITEPAPER Map, Monitor, and Manage Distributed Applications in System Center 2012 The Challenge: Managing Distributed Applications in System Center 2012 System Center 2012 gives IT Operations managers

More information

Total Protection for Compliance: Unified IT Policy Auditing

Total Protection for Compliance: Unified IT Policy Auditing Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.

More information

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management Prevent cyber attacks. SEE what you are missing. See Your Network MAPS. Prevent cyber attacks. [RedSeal] is meeting our expectations and is playing an integral role as it feeds right into our overall risk

More information

Lumension Endpoint Management and Security Suite

Lumension Endpoint Management and Security Suite Lumension Endpoint Management and Security Suite Patch and Remediation Module Evaluation Guide July 2012 Version 1.1 Copyright 2009, Lumension L.E.M.S.S:LPR - Table of Contents Introduction... 3 Module

More information

IBM Managed Security Services Vulnerability Scanning:

IBM Managed Security Services Vulnerability Scanning: IBM Managed Security Services August 2005 IBM Managed Security Services Vulnerability Scanning: Understanding the methodology and risks Jerry Neely Network Security Analyst, IBM Global Services Page 2

More information

The Benefits of an Integrated Approach to Security in the Cloud

The Benefits of an Integrated Approach to Security in the Cloud The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The

More information

IBM Advanced Threat Protection Solution

IBM Advanced Threat Protection Solution IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain

More information

CDM Hardware Asset Management (HWAM) Capability

CDM Hardware Asset Management (HWAM) Capability CDM Hardware Asset Management (HWAM) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Table of Contents 1 PURPOSE AND SCOPE... 2 2 THREAT

More information

24/7 Visibility into Advanced Malware on Networks and Endpoints

24/7 Visibility into Advanced Malware on Networks and Endpoints WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction

More information

White Paper. Managing Risk to Sensitive Data with SecureSphere

White Paper. Managing Risk to Sensitive Data with SecureSphere Managing Risk to Sensitive Data with SecureSphere White Paper Sensitive information is typically scattered across heterogeneous systems throughout various physical locations around the globe. The rate

More information

A number of factors contribute to the diminished regard for security:

A number of factors contribute to the diminished regard for security: TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand

More information

Proactive Performance Management for Enterprise Databases

Proactive Performance Management for Enterprise Databases Proactive Performance Management for Enterprise Databases Abstract DBAs today need to do more than react to performance issues; they must be proactive in their database management activities. Proactive

More information

Lumension Guide to Patch Management Best Practices

Lumension Guide to Patch Management Best Practices Lumension Guide to Patch Management Best Practices With the sophistication and sheer volume of exploits targeting major applications and operating systems, the speed of assessment and deployment of security

More information

FY 2007 E GOVERNMENT ACT REPORT FINAL SEPTEMBER 2007

FY 2007 E GOVERNMENT ACT REPORT FINAL SEPTEMBER 2007 FY 2007 E GOVERNMENT ACT REPORT FINAL SEPTEMBER 2007 1. AGENCY SPECIFIC E GOVERNMENT INITIATIVE: USAID S VULNERABILITY MANAGEMENT PROGRAM CISO SECURITY OBJECTIVE AND VISION The U.S. Agency for International

More information

Using Risk Modeling & Attack Simulation for Proactive Cyber Security Predictive Solutions for Effective Security Risk Management

Using Risk Modeling & Attack Simulation for Proactive Cyber Security Predictive Solutions for Effective Security Risk Management whitepaper Using Risk Modeling & Attack Simulation for Proactive Cyber Security Predictive Solutions for Effective Security Risk Management Executive Summary For years, security concerns have been a major

More information

Vulnerability Audit: Why a Vulnerability Scan Isn t Enough. White Paper

Vulnerability Audit: Why a Vulnerability Scan Isn t Enough. White Paper Vulnerability Audit: Why a Vulnerability Scan Isn t Enough White Paper May 10, 2005 TABLE OF CONTENTS Introduction: How Secure Are My Systems?... 3 Vulnerability: The Modern Meaning Of A Muddled Word...

More information

I D C A N A L Y S T C O N N E C T I O N

I D C A N A L Y S T C O N N E C T I O N I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)

More information

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture

More information

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life Executive s Guide to Windows Server 2003 End of Life Facts About Windows Server 2003 Introduction On July 14, 2015 Microsoft will end support for Windows Sever 2003 and Windows Server 2003 R2. Like Windows

More information

IBM Security QRadar Risk Manager

IBM Security QRadar Risk Manager IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Collect network security device configuration data to

More information

Cyber Situational Awareness for Enterprise Security

Cyber Situational Awareness for Enterprise Security Cyber Situational Awareness for Enterprise Security Tzvi Kasten AVP, Business Development Biju Varghese Director, Engineering Sudhir Garg Technical Architect The security world is changing as the nature

More information

Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014

Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014 Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability 7 Jul 2014 1 Purpose This document is intended to provide insight on the types of tools and technologies that

More information

McAfee Database Security. Dan Sarel, VP Database Security Products

McAfee Database Security. Dan Sarel, VP Database Security Products McAfee Database Security Dan Sarel, VP Database Security Products Agenda Databases why are they so frail and why most customers Do very little about it? Databases more about the security problem Introducing

More information

Trend Micro. Advanced Security Built for the Cloud

Trend Micro. Advanced Security Built for the Cloud datasheet Trend Micro deep security as a service Advanced Security Built for the Cloud Organizations are embracing the economic and operational benefits of cloud computing, turning to leading cloud providers

More information

How To Create An Insight Analysis For Cyber Security

How To Create An Insight Analysis For Cyber Security IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics

More information

The Value of Vulnerability Management*

The Value of Vulnerability Management* The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda

More information

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud

More information

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4) Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware

More information

CA Vulnerability Manager r8.3

CA Vulnerability Manager r8.3 PRODUCT BRIEF: CA VULNERABILITY MANAGER CA Vulnerability Manager r8.3 CA VULNERABILITY MANAGER PROTECTS ENTERPRISE SYSTEMS AND BUSINESS OPERATIONS BY IDENTIFYING VULNERABILITIES, LINKING THEM TO CRITICAL

More information

REPORT. 2015 State of Vulnerability Risk Management

REPORT. 2015 State of Vulnerability Risk Management REPORT 2015 State of Vulnerability Risk Management Table of Contents Introduction: A Very Vulnerable Landscape... 3 Security Vulnerabilities by Industry... 4 Remediation Trends: A Cross-Industry Perspective...

More information

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Effective Threat Management. Building a complete lifecycle to manage enterprise threats. Effective Threat Management Building a complete lifecycle to manage enterprise threats. Threat Management Lifecycle Assimilation of Operational Security Disciplines into an Interdependent System of Proactive

More information

BeyondInsight Version 5.6 New and Updated Features

BeyondInsight Version 5.6 New and Updated Features BeyondInsight Version 5.6 New and Updated Features BeyondInsight 5.6 Expands Risk Visibility Across New Endpoint, Cloud and Firewall Environments; Adds Proactive Threat Alerts The BeyondInsight IT Risk

More information

How To Buy Nitro Security

How To Buy Nitro Security McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

More information

Active Network Defense: Real time Network Situational Awareness and a Single Source of Integrated, Comprehensive Network Knowledge

Active Network Defense: Real time Network Situational Awareness and a Single Source of Integrated, Comprehensive Network Knowledge Active Network Defense: Real time Network Situational Awareness and a Single Source of Integrated, Comprehensive Network Knowledge This paper will present a case study of Lumeta s participation in an open

More information

HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide

HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide Product overview... 3 Vulnerability scanning components... 3 Vulnerability fix and patch components... 3 Checklist... 4 Pre-installation

More information

Skybox Security Survey: Next-Generation Firewall Management

Skybox Security Survey: Next-Generation Firewall Management Skybox Security Survey: Next-Generation Firewall Management November 2012 Worldwide Results Notice: This document contains a summary of the responses to a November 2012 survey of medium- to largesize organizations

More information

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds. ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

Using Skybox Solutions to Achieve PCI Compliance

Using Skybox Solutions to Achieve PCI Compliance Using Skybox Solutions to Achieve PCI Compliance Achieve Efficient and Effective PCI Compliance by Automating Many Required Controls and Processes Skybox Security whitepaper August 2011 1 Executive Summary

More information

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.

More information

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

THREAT VISIBILITY & VULNERABILITY ASSESSMENT THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings

More information

ESET Security Solutions for Your Business

ESET Security Solutions for Your Business ESET Security Solutions for Your Business It Is Our Business Protecting Yours For over 20 years, companies large and small have relied on ESET to safeguard their mission-critical infrastructure and keep

More information

Streamlining Web and Email Security

Streamlining Web and Email Security How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor

More information

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

Getting Started with the iscan Online Data Breach Risk Intelligence Platform Getting Started with the iscan Online Data Breach Risk Intelligence Platform 2 Table of Contents Overview... 3 Data Breach Risk Intelligence... 3 Data Breach Prevention Lifecycle Defined... 3 Choosing

More information

Application Security in the Software Development Lifecycle

Application Security in the Software Development Lifecycle Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO

More information

Virtual Patching: a Proven Cost Savings Strategy

Virtual Patching: a Proven Cost Savings Strategy Virtual Patching: a Proven Cost Savings Strategy An Ogren Group Special Report December 2011 Executive Summary Security executives, pushing the limits of traditional labor-intensive IT patch processes

More information

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery

More information

Vistara Lifecycle Management

Vistara Lifecycle Management Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

Why you need an Automated Asset Management Solution

Why you need an Automated Asset Management Solution solution white paper Why you need an Automated Asset Management Solution By Nicolas Renard, Support and Professional Services Manager, BMC France Table of Contents 1 OVERVIEW Automated Asset Discovery

More information