Presentation Transcript: Vulnerability Scanning and Compliance

Presentation Transcript: Vulnerability Scanning and Compliance


With patches, threats and changes to your network taking place on a daily basis it is vital to understand if you are managing risk effectively and complying to key regulatory standards. Vulnerability scanning is often a useful method for establishing a vulnerability baseline across the network which is then tested on a regular basis to understand variance. 

In this presentation transcript, Lee Lawson, Head of Security Testing and Response at Dell SecureWorks, explores:

  • Vulnerability scanning drivers
  • Pros and cons for different vulnerability scanning solutions
  • Best fit solution for specific regulatory compliance standards
  • Key recommendations
  • And more
Dell SecureWorks
22 Aug 2011
22 Aug 2011
8 Page(s)
Presentation Transcript
Already a Bitpipe member? Login here

Download this Presentation Transcript!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor