Cover Image
市場調查報告書

威脅、漏洞管理

Threat and Vulnerability Management

出版商 ABI Research 商品編碼 344982
出版日期 內容資訊 英文 23 Pages
商品交期: 最快1-2個工作天內
價格
如有價格方面的疑問請按下「詢問」鍵來信查詢
Back to Top
威脅、漏洞管理 Threat and Vulnerability Management
出版日期: 2015年11月05日 內容資訊: 英文 23 Pages
簡介

本報告提供威脅、漏洞管理 (VM) 解決方案調查分析,以企業安全的作用為焦點,提供促進引進的趨勢、計劃的特徵、主要企業相關分析等系統性資訊。

第1章 驚人地脆弱的情形

  • 威脅、漏洞、風險:關係性
  • 漏洞在數量、嚴重性上逐漸增加中
  • 零日漏洞的劇增
  • 雲端運算的漏洞
  • 漏洞的列舉
  • 威脅、漏洞管理重要的理由

第2章 積極的風險管理方法

  • 漏洞管理的功能方法
  • 評估的階段
  • 按照風險決定修復工作的優先順序
  • 修復任務
  • 堅牢的漏洞管理是綜合性資訊安全的利益
  • 整合SIEM解決方案和漏洞管理
  • 下一代的漏洞管理解決方案的主要功能

第3章 雲端VM解決方案的需求

  • Tenable Network Security
  • Qualys
  • Core Security
  • IBM
  • Rapid7
  • AlienVault

圖表

目錄
Product Code: AN-1598

This analysis is primarily focused on threat and vulnerability management (VM) solutions and their role in overall enterprise security. This first section explores trends that are driving the adoption of threat and vulnerability management solutions. The second section analyzes key features of an effective vulnerability management program and how VM fits into other complementary services that form a part of the organization's information security program. The final chapter provides an analysis of different players in the market and includes a review of six companies: Tenable Network Security, Qualys, Core Security, IBM, Rapid7 and AlienVault.

Table of Contents

1. A STAGGERINGLY VULNERABLE LANDSCAPE

  • 1.1. Threat, Vulnerability, Risk: How are They related?
  • 1.2. Vulnerabilities are Increasing in Volume and Severity
  • 1.3. Proliferation of Zero-day Vulnerabilities
  • 1.4. Cloud Computing Vulnerabilities
  • 1.5. Vulnerability Enumeration
  • 1.6. Why is Threat and Vulnerability Management Important?

2. TOWARD A PROACTIVE RISK MANAGEMENT APPROACH

  • 2.1. How Does Vulnerability Management Work?
  • 2.2. The Assessments Phase
  • 2.3. Prioritize Remediation Efforts Based on Risk
  • 2.4. The Task of Remediation
  • 2.5. Robust Vulnerability Management Benefits Overall Information Security
  • 2.6. Integrating Vulnerability Management with SIEM Solutions
  • 2.7. Key Features of a Next Generation Vulnerability Management Solution

3. DEMAND FOR CLOUD VM SOLUTIONS SET TO SOAR

  • 3.1. Tenable Network Security
  • 3.2. Qualys
  • 3.3. Core Security
  • 3.4. IBM
  • 3.5. Rapid7
  • 3.6. AlienVault

Tables

  • 1. Total Number of Vulnerabilities World Market, Forecast: 2015 to 2020
  • 2. Threat and Vulnerability Market Revenue World Market, Forecast: 2015 to 2020
  • 3. Policy and Compliance Services Market Revenue World Market, Forecast: 2015 to 2020
  • 4. Total Vulnerability Assessment Market Revenue World Market, 2015 to 2020
  • 5. Threat Intelligence Services Market Revenue World Market, Forecast: 2015 to 2020
  • 6. SIEM Market Revenue World Market, Forecast: 2015 to 2020
  • 7. IBM IT Security Services Managed Security Services Professional Security Services

Charts

  • 1.Total Number of Vulnerabilities World Market, Forecast: 2015 to 2020
  • 2.Threat and Vulnerability Management Market Revenue World Market, Forecast: 2015 to 2020
  • 3.Policy and Compliance Services Market Revenue World Market, Forecast: 2015 to 2020
  • 4.Total Vulnerability Assessment Market Revenue World Market, Forecast: 2015 to 2020
  • 5.Threat Intelligence Services Market Revenue World Market, Forecast: 2015 to 2020
  • 6.SIEM Market Revenue World Market, Forecast: 2015 to 2020

Figures

  • 1.Interdependence Between Processes in a Security Program
Back to Top