Title: Effective Vulnerabilities Management in Simple Ten Steps
1Effective Vulnerability Management
In Simple 10 Steps
Asset Identification Management
39
of respondents say that lack visibility into
applications, underlying systems and
vulnerabilities.
PROMISEC
www.promisec.com
2Consistent Vulnerability Management
Vulnerability Identification
of the 15,435 vulnerabilities discovered in 2014,
11 were reated "Highly Critical" and just 0.3
as "Extremely Critical"
Less Than 40
of organizations their entire network with active
vulnerability scan more than once per quarter.
PROMISEC
www.promisec.com
3Risk Management
Change Management
of incidents can be attributed to errors by
system administrators and other internal staff.
60
Risk management are used to identity, estimate,
and prioritize risk to organizations.
PROMISEC
www.promisec.com
4Mobile Device Management
Patch Management
of respondents believe their mobile endpoints
have been the target of malware over the past 12
months.
of the exploited vulnerabilities had been
compromised more than a year the associated
CVE(Common Vulnerabilities and Exposure) was
published.
99.9
PROMISEC
www.promisec.com
5Mitigation Management
Secunia recorded 15,435 software vulnerabilities
in 3870 applications during 2014 a 55 increase
in the five trend an 18 increase from 2013.
PROMISEC
www.promisec.com
6Incident Response
Automation
of respondent organizations manually remediate
infected hosts- an approach which carries with an
increased "time of exposure" and, therefore,
increased potential for data theft and other
forms of damage.
1 out of 5 Security Operations Centres are not
minimally prepared to respond to, much less
detect, cyber threats affecting their
organization.
33
PROMISEC
www.promisec.com
7CONTACT US
Support_at_promisec.com
www.promisec.com
_at_Promisec_IT