sponsored by Lumension
Posted:  11 Mar 2009
Published:  11 Mar 2009
Format:  HTML
Type:  Assessment Tool
Language:  English
ABSTRACT:

The Lumension Security Vulnerability Scanner is a network-based scanning utility that provides IT departments with comprehensive visibility into their entire heterogeneous network environment through in-depth scans and the automated discovery of all assets, both managed and unmanaged. The vulnerability scanner is able to discover silent or hidden network nodes, even if they are not currently managed by agents. By leveraging Lumension's large pre-built vulnerability and configuration repositories as well as customized vulnerability policies, the network scanner assesses Operating System, Application, and Security Configuration1 vulnerabilities that exist within the network environment to proactively identify and prioritize known issues before they can be exploited. Utilizing an intuitive user interface, vulnerability assessment information can be prioritized by vulnerability severity as well as organizational impact, and grouped by vulnerability specifics or computing assets (machines).

 

The main benefits of the Lumension Security vulnerability scanner are:

    Complete identification and inventory of all devices on the networkAccurate scans of all devices for software and configuration-based vulnerabilitiesRisk-based prioritization of identified threatsContinuously updated vulnerability database for orderly remediationComprehensive reports of scan results





BROWSE RELATED RESOURCES
Network Management | Network Security | Penetration Testing | Risk Assessment | Secure Content Management Software | Vulnerability Assessments

View All Resources sponsored by Lumension

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement