Cover Image
市場調查報告書

漏洞管理:傳統型漏洞評估·修復的演進

Vulnerability Management - Evolving Beyond Traditional Vulnerability Assessment and Remediation

出版商 Frost & Sullivan 商品編碼 298605
出版日期 內容資訊 英文 18 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
漏洞管理:傳統型漏洞評估·修復的演進 Vulnerability Management - Evolving Beyond Traditional Vulnerability Assessment and Remediation
出版日期: 2014年03月27日 內容資訊: 英文 18 Pages
簡介

漏洞管理服務供應商想創造品牌差異化,有三個方法。最先的方法是漏洞評估·匯報技術。第二個方法是根據情境感知(靈活性)功能強化漏洞管理平台。最根本的就是只有網路上各裝置(至少在連接網路的時候)安全,且適當了解威脅環境時,網路安全才能發揮作用。最後許多漏洞管理服務供應商都在自家平台內建secondary technologies作為新產品差別化的手段。

本報告提供全球漏洞管理服務市場最新趨勢調查,並考察今後的服務演進方向性與市場機會,將結果概述為以下內容。

摘要整理

簡介

漏洞管理和基準服務

專用匯報功能

  • 配合產業的匯報功能
  • 配合工作崗位的匯報功能
  • 配合組織需求的匯報功能
  • 情境感知
  • 指紋
  • 強化型漏洞風險評估功能
  • 威脅的建模

補充性·secondary technologies的一體化

  • 登入管理
  • SIEM(安全資訊·活動管理)
  • 風險管理
  • 特權ID管理
  • SSL證明書
  • 安全的結構
  • Web應用的掃描
  • UTM(整合威脅管理)
  • 持續性監測

結論

圖表一覽

目錄
Product Code: D565-00-05-00-00

Frost & Sullivan has found three ways that VM service providers differentiate. The first point of differentiation is improved methods of vulnerability assessment and compliance reporting. Second, context awareness enhances vulnerability management platforms. On a fundamental level, network security can only happen if each device on the network is secure (at least in its linking to the network), and if the threat environment is properly understood. Last, many vulnerability management providers are integrating secondary technologies onto their platforms, which constitutes another means of product differentiation

Table of Contents

Executive Summary

Introduction

Vulnerability Management, Baseline Services

Specialized Reporting

  • Reporting by Market Vertical
  • Reporting by Department
  • Reporting by Organizational Needs
  • Context Awareness
  • Fingerprinting
  • Enhanced Vulnerability Risk Scoring
  • Threat Modeling

Integration with Complimentary Secondary Technologies

  • Log Management
  • SIEM
  • Risk Management
  • Privileged Identity Management
  • SSL Certificates
  • Secure Configurations
  • Web Application Scanning
  • Unified Threat Management
  • Continuous Monitoring

The Last Word

List of Figures

  • Figure 1: Attributes and Measures of CVSS v.2
  • Figure 2: Continuous Monitoring Architecture - Tenable Network Security
Back to Top