Skip to Main Content
Vulnerability Management
book

Vulnerability Management

by Park Foreman
August 2009
Intermediate to advanced content levelIntermediate to advanced
347 pages
9h 16m
English
Auerbach Publications
Content preview from Vulnerability Management
143
5
Se l e c t I n g te c h n o l o g y
5.1 Introduction
Vulnerability management (VM) product acquisition can be a com-
plicated process. Since reliability has increased among vendors and the
time between new vulnerability discovery and check distribution has
shrunk, other factors must be considered. e first and most impor-
tant step in product selection is to understand the requirements. At
first, one may not think many requirements exist other than picking
the user interface you prefer but that is not the case. So, this chapter
will clarify the most significant requirements as well as some of the
issues concerning the future of the industry as a whole.
5.2 General Requirements
When conducting a technology acquisition, it is important to fir
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Vulnerability Management, 2nd Edition

Vulnerability Management, 2nd Edition

Park Foreman

Publisher Resources

ISBN: 9781439801512