1. Market Research
  2. > IT Infrastructure
  3. > Security Systems Market Trends
  4. > Vulnerability Management - Evolving Beyond Traditional Vulnerability Assessment and Remediation

Frost & Sullivan has found three ways that VM service providers differentiate. The first point of differentiation is improved methods of vulnerability assessment and compliance reporting. Second, context awareness enhances vulnerability management platforms. On a fundamental level, network security can only happen if each device on the network is secure (at least in its linking to the network), and if the threat environment is properly understood. Last, many vulnerability management providers are integrating secondary technologies onto their platforms, which constitutes another means of product differentiation.


Executive Summary

Frost & Sullivan defines vulnerability management (VM) as a platform that offers vulnerability assessment; and the results of the assessment trigger a remediation response. The technology is not outdated, but the threat environment is rapidly changing. Hackers do not discriminate; they now attack small companies and large companies alike. Cloud- and Web-based storage and applications are being added by businesses to create new services and to enhance existing services. Similarly, pernicious actors are creating new exploits. In a hybrid network, assets accepted from Web-based services can lay dormant on the other side of a network firewall, and can activate within a network.

Changes in the threat environment, and new paradigms in networking, create a dilemma—but also reveal an opportunity for VM providers. Without innovation, a stand-alone VM platform provider has the danger of offering a commodity security product. By the same token, it is also true that VM service providers are finding ways to leverage their knowledge of aspects of networking and software-coding to integrate value-added services. This report describes how VM service providers are extending their platforms to include value-added services beyond vulnerability assessment and remediation.

Table Of Contents

Vulnerability Management - Evolving Beyond Traditional Vulnerability Assessment and Remediation
Table of Contents


Executive Summary . 4
Introduction 4
Vulnerability Management, Baseline Services 5
Specialized Reporting . 7
Reporting by Market Vertical 7
Reporting by Department 8
Reporting by Organizational Needs . 8
Context Awareness 8
Fingerprinting 9
Enhanced Vulnerability Risk Scoring 9
Threat Modeling 10
Integration with Complimentary Secondary Technologies . 11
Log Management . 12
SIEM 12
Risk Management . 12
Privileged Identity Management 13
SSL Certificates 13
Secure Configurations 13
Web Application Scanning 14
Unified Threat Management 14
Continuous Monitoring . 14
The Last Word 17

List of Figures

Figure 1: Attributes and Measures of CVSS v.2 . 6
Figure 2: Continuous Monitoring Architecture - Tenable Network Security 16

View This Report »

Get Industry Insights. Simply.

  • Latest reports & slideshows with insights from top research analysts
  • 24 Million searchable statistics with tables, figures & datasets
  • More than 10,000 trusted sources
24/7 Customer Support

Talk to Ahmad

+1 718 618 4302

Purchase Reports From Reputable Market Research Publishers
Digital Signature Market by Solution, Services, Deployment, Application and Region - Global Forecast to 2021

Digital Signature Market by Solution, Services, Deployment, Application and Region - Global Forecast to 2021

  • $ 7150
  • Industry report
  • January 2017
  • by MarketsandMarkets

“The growing demand for digital signature applications, strategic business processes, and the need for securing transactions are driving the digital signature market” The digital signature market ...

Physical Security Market by Type, & Service, Vertical, and Region - Global Forecast to 2021

Physical Security Market by Type, & Service, Vertical, and Region - Global Forecast to 2021

  • $ 7150
  • Industry report
  • March 2017
  • by MarketsandMarkets

“Need to protect business assets, employees, and customers against rising incidences of terror attacks is expected to drive the growth of the physical security market” The physical security market ...

Perimeter Intrusion Detection Systems Market by Solution, Services, Deployment Type, Vertical, and Region - Global Forecast to 2021

Perimeter Intrusion Detection Systems Market by Solution, Services, Deployment Type, Vertical, and Region - Global Forecast to 2021

  • $ 7150
  • Industry report
  • March 2017
  • by MarketsandMarkets

“The increasing risk of terrorism and infiltration is expected to drive the perimeter intrusion detection systems market” The perimeter intrusion detection systems market size is estimated to grow ...


ref:plp2014

Reportlinker.com © Copyright 2017. All rights reserved.

ReportLinker simplifies how Analysts and Decision Makers get industry data for their business.