Vulnerability Scanning: What Every IT Pro Needs To Know

Logo
Presented by

Mark Winter, VP Products and Michael Courtney, Product specialist

About this talk

If you are responsible for IT Security within your own organization, regular network vulnerability scanning is a BASIC procedure recommended by virtually every IT security practice framework. Yet many IT professionals don’t do it for all the wrong reasons. And those who do are and often overwhelmed by the scan alerts. In this brief but technical presentation, we demonstrate some best practices and helpful tips that will guide you in the use of vulnerability scanning products, and get the most out of the scan results. Here’s what you’ll learn: • Why network vulnerability scanning is so important, and issues it can detect • How to deploy and set up a virtual vulnerability scanner in less than 10 minutes • How to determine the scheduled frequency of scans based on specific criteria • When it makes sense to deploy multiple scanners across a network • Common exclusion rules to set up to reduce the amount of “noise’ from the system • Recommended filters to use when reviewing scan results
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (11)
Subscribers (799)
If you are responsible for your organization’s IT security, you need to perform regular vulnerability scans to reduce the risk of a successful cyberattack your network. Most IT professionals understand this, but many are prevented from doing so because of resource constraints. They either face budgetary limitations imposed by finance, or they simply lack the staff to perform all the work that comes along with the scanning process. Tune in and hear from GM for VulScan Max Pruger and find out how you can solve this issue and the strategies to protect your networks every day.