Boston, November 13, 2019 – Cybersecurity vulnerability management is the art of identifying, remediating, or mitigating risks posed by hardware and software across an enterprise. Effective vulnerability management includes measurement, process improvement, and timely reporting to allow an organization to regularly assess cyber risk as part of overall enterprise risk. Can chief information security officers and their teams enhance their vulnerability management efforts through asset prioritization, accountability, process improvement, and automation? Â
This report examines the essential components of an effective vulnerability management program, provides some suggestions on how programs can be enhanced, and examines some methods (and tricks) to address today’s challenges in the vulnerability management process. It is based on the author’s experience building and managing vulnerability management programs at Global 1000 companies as well as assessing and auditing programs at dozens of Fortune 500 and Global 100 companies.
This 20-page Impact Report contains one figure and one table. Clients of Aite Group’s Cybersecurity service can download this report, the corresponding charts, and the Executive Impact Deck.
This report mentions BMC Helix, CA Technologies (Broadcom), Denim Group, Equifax, IBM, iDefense (Accenture), Micro Focus, Qualys, Rapid7, ServiceNow, Symantec, and Tenable.
About the Author
Datos Insights
We are the advisor of choice to the banking, insurance, securities, and retail technology industries–both the financial institutions and the technology providers who serve them. The Datos Insights mission is to help our clients make better technology decisions so they can protect and grow their customers’ assets.