1 hour 23 minutes
in the last video, we talked about performing additional vulnerability scans to verify that patches to systems are working.
And this video we're going to talk about the best path to eliminate network vulnerabilities
for learning objectives. We're gonna talk about eliminating network vulnerabilities,
stipulate a pre assessment
vulnerability. Management is not an important port of protecting and organizations asset
is that true or foes?
This is folks. Vulnerability Management is actually a critical component of protecting and organizations assets.
I left the opportunity eliminating network of on network going abilities.
So we're gonna cover choice
and lastly scalability.
So look at choice was first,
The choice you make for eliminating network vulnerabilities can have an impact on your compliance.
You want the two solutions that provide accurate reporting
and that meet the criteria of regulatory bodies.
Depending on your industry, you may have several regulations or stand that your organization has to follow,
like Sarbanes actually act in the financial industry
Hippo in the healthcare industry or PC I, the SS
indie credit card in this room.
Look at automation.
We want to automate our vulnerability and management as much as possible.
The main reasons for doing this or to save us time
using our resource that could be better dedicated elsewhere.
And automation may allow us to have better compliance,
since we would need to dedicate. Resource is if we were doing manual vulnerability management
that would also lead to a higher costs for the company.
Automation also reduces the likelihood of human error.
Let's look into technology
well, considering the tools you were used for eliminating network vulnerabilities, it is important to remember that you don't want to skimp on the technology
Don't be cheap.
You want to make sure you're chosen technology solution will show you meaningful data and will help the organization maintain compliance.
Now, not every tool is the same, and you also want to make sure you're using tools that are deemed safe across the industry.
the tool is going to be scanning your network and looking that confidential data.
Do you really want to trust that random to you? Found any Google search?
Or would you rather use the same two as larger organizations across industry,
is better to be safe than sorry.
Now let's look at scalability.
Any vulnerability, magical solution
that you need
uses the scalability
or basically has the needs for scalability for your organization.
So things like being able to support the growth of users on IT network and any increased complexity in the network architect.
The Vulnerability Mansion solution needs to be cost effective at scale, and the pay structure should be teared based off the numbers of users.
Now let's look at our pools Assessment
without vulnerability. Mansion solution.
We should focus solely on calls and not worry about the tools
of our industry standards.
Is this true
or is this false?
This is folks. Remember, we talked about the importance of using vulnerability management tools that are safe
while Coast is important. It should be the sole factor in determining the best vulnerability and management solution to use
case. And now we reached our summer.
It's okay, and it's really you. We talked about eliminating network vulnerabilities
and the things that we need to consider and making better choices above one ability management.
In the next video, we'll talk about the use of consultants and vulnerability management
Fundamentals of Vulnerability Management
Most of the successful attacks through a business network could be prevented with vulnerability management. This course focuses on what you can do to automatically manage vulnerabilities and keep your network safe from attack.