1 hour 23 minutes
now to address these new security threats
we have patching
and which patching is a remedy.
We have the ideas and I PS, which one basically detects,
did threat. That's on a network
another one actually stops through. So the
intrusion detection detects
intrusion. Protection stops
with the anti male were solution
which, as we just spoke about,
falls with McAfee and Symantec,
where detects and it also stops
and eliminates any sort of male wear viruses.
It's all in your system.
Then we have the trends as well, too. So
with the trends with the trends, addresses
basically takes a snapshot
of all vulnerabilities and all attacks
Tried or basically
that were given to your computer.
There's its signature. Dead identifies
in which the trends justice to howto tex or given or basically heart attacks are carried out.
So Mantan compliance.
So we have hipper.
Would you dress It? Is how care
we have sacks,
which is commercial sat
with G L. B.
We just commercial as well, too,
with PC I, which is really huge in the financial sector, so that deals with any sort of financial
financial pieces. For its credit cards, bank accounts
and we have a GDP are as well, too.
So GDP are also could be found
in the commercial sector
and at times, government sector.
Now the important pieces for us, well, compliance
just to make sure that all
security events are basically security controls
or carried out correctly.
So, for instance,
if it's security control calls for
patches to be applied every week,
this entity needs to follow
this particular piece of compliance. So, for instance, of hip hop
you need to patch every week
and it's part of that HIPPA
stand there. Basically, it is compliance.
You two patch over a week
and it also protects
against person information are basically P I,
which is personal. Identifiable information,
safeguards it against any attack.
So what are the challenges?
Okay, so the first challenge is a lack of resources.
We have more problems than people.
We have the move imports,
so the move imports are
of grades and a new technology.
It's constantly moving. I teach is not censored
and finally we have to stay hold to buy.
So we have stakeholders that's at the top, or basically the people who own the company
only these particular systems,
they have to buy it.
They have to know. Why am I? Why am I spending this money
on its software? You have to convince him. So in orderto get him to buy again, you have to go events on the body.
It's a solution.
The solution here is automation.
Automation takes care of the issue of having a lack of resource is.
So when you automate basically have your scanning system going
and it's scheduled time,
it actually helps. As far as with the workforce,
it pleased the port as a worker.
That's not really a WR.
Automation is key.
So, by inference, take key stakeholders.
These guys are the decision makers.
You need to get buying from these guys in order to be successful.
These are the guys will spend the money
to get the new tools. I will get the two that's needed to protect the environment.
Let's look at the post assessment
Companies should use automation toe better combat foreign abilities.
Is it a
or is it be false?
His answer is true.
Now in this video, we wrapped up on our discussion on why we need vulnerability management by talking about identifying and fixing folks
in the next video, we'll start our discussion on actually doing vulnerability management.
Fundamentals of Vulnerability Management
Most of the successful attacks through a business network could be prevented with vulnerability management. This course focuses on what you can do to automatically manage vulnerabilities and keep your network safe from attack.