teChnology 111
technology from the same vendor, then perhaps a unified console will
eliminate this problem.
Alternative approaches are to allocate the assessment resources by
organization or network. For example, it may be beneficial to use pas-
sive vulnerability scanners on a public DMZ in order to get 24-hour
coverage of the security posture of the hosts. is most current assess-
ment information can be automatically fed to a security event/incident
management system (SEIM). is provides a significant advantage,
for newly published vulnerabilities can be taken into account quickly
when new events occur to exploit them. Active vulnerability scanners
can obtain more in-depth analysis of the back-end systems and work-
stations where rapid response ...