This resource is no longer available

Lumension Vulnerability Management - Automating the Vulnerability Management Lifecycle


Any computer that is exposed to the internet, unsanctioned applications, or unprotected storage devices can be infected with viruses, Trojans, worms, keyloggers, spyware, rootkits, and other malware. By preying upon vulnerabilities in operating systems and applications – from ubiquitous internet browsers to email and office productivity suites – these infections can quickly lead to stolen data, disrupted operations, and threats to the privacy of customers and employees. In 2007 alone, well over 6,000 new vulnerabilities were reported, an average of 124 per week. Nearly 90% of those vulnerabilities could be exploited remotely. In addition, poorly installed or misconfigured devices can create vulnerabilities that allow data corruption, eavesdropping, and theft.


Because vulnerabilities can be found literally everywhere – from gateways and routers to DNS servers, web servers, desktops, and laptops – many IT departments run a "catch as catch can" defense. But using swarms of IT personnel to constantly hunt down vulnerabilities, figure out and then apply the appropriate patches, and hope for the best is a waste of resources. Automating the vulnerability management lifecycle – discovery, assessment, prioritization, remediation, and reporting – lets you keep your information resources safe from external threats around the clock, freeing IT personnel to work on business-focused projects.


This whitepaper will examine how Lumension Vulnerability Management Solution enables organizations to mitigate their critical risk by integrating the five phases of vulnerability management:

    Discovering assetsAssessing vulnerabilities and misconfigurations and prioritizing risksMitigating non-patchable risksRemediating vulnerabilitiesReporting and monitoring
12 Aug 2009
01 Nov 2008
17 Page(s)
White Paper

This resource is no longer available.