Vulnerability Management
Vulnerability Management
Vulnerability Management
Vulnerability management:
Key questions you
should be asking
Is vulnerability management critical for a business? Aren’t
traditional security tools sufficient to protect and secure the
network? Yes, to the first question and a resounding no, to the
second! Every system can be made more secure and vulnerability
management solutions will not only show where to secure, but
how to do it and deliver the patches and updates to achieve it.
This whitepaper explains why.
Contents
Introduction 3
What is vulnerability management? 3
Key questions to ask 4
Summary 5
About GFI LanGuard® 6
About GFI® 6
Summary
It is important to remember that security is not just a nice-to-have option, and not even a necessary evil
in today’s economic, competitive and Internet-centric society. For organizations of any size, security is an
essential component of an overall approach to IT that not only protects the organization as a whole, but also
users within it and the customers and suppliers that interact with it. Added to that is the legal and regulatory
requirement to demonstrate all reasonable care with regard to data protection. Although data theft and loss
can never be 100 percent avoided, when it does happen organizations need to show that they have taken all
reasonable steps to minimize the chances. Vulnerability management is a substantial part of that process.
Many organizations understand that their systems, storage, network connectivity and endpoints need to be
inherently secure, mandating the need for regular monitoring and maintenance. IT managers and front-line
staff need to ask important questions of their equipment, software and users to ensure that these tasks are
being performed effectively and efficiently.
Challenging how security, patch management and configuration is managed and performed is critical to
building a longer term policy-based approach to vulnerability management. Keeping applications patched
and getting those patches in place quickly is paramount, but also important is taking a holistic view of how
the IT environment works, to ensure that changes made at one stage in the environment don’t create a
vulnerability elsewhere, or as a by-product (for example, opening up a port to support one application, could
expose another to critical vulnerability).
Perhaps the most important question that can be asked by any IT manager or support operative is – can
this system, service or application be any more secure than it already is? Invariably, the answer is yes, and
vulnerability management solutions will not only show where to secure, but how to do it and deliver the
patches and updates to achieve it.
About GFI®
GFI Software provides web and mail security, archiving and fax, networking and security software and hosted
IT solutions for small to medium-sized businesses (SMB) via an extensive global partner community. GFI
products are available either as on-premise solutions, in the cloud or as a hybrid of both delivery models. With
award-winning technology, a competitive pricing strategy, and a strong focus on the unique requirements
of SMBs, GFI satisfies the IT needs of organizations on a global scale. The company has offices in the United
States, UK, Austria, Australia, Malta, Hong Kong, Philippines and Romania, which together support hundreds
of thousands of installations worldwide. GFI is a channel-focused company with thousands of partners
throughout the world and is also a Microsoft Gold ISV Partner.
More information about GFI can be found at http://www.gfi.com.
1. Critical Capabilities for Security Information and Event Management, Gartner, 21 May 2012
2. Worldwide Security and Vulnerability Management Forecast 2011-2015, IDC, November 2011
3. Key Elements of a Threat and vulnerability management Program, ISACA
For a full list of GFI offices/contact details worldwide, please visit http://www.gfi.com/contactus
Disclaimer
© 2012. GFI Software. All rights reserved. All product and company names herein may be trademarks of their respective owners.
The information and content in this document is provided for informational purposes only and is provided “as is” with no warranty of any kind, either express or implied, including but
not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. GFI Software is not liable for any damages, including any consequential
damages, of any kind that may result from the use of this document. The information is obtained from publicly available sources. Though reasonable effort has been made to ensure the
accuracy of the data provided, GFI makes no claim, promise or guarantee about the completeness, accuracy, recency or adequacy of information and is not responsible for misprints, out-
of-date information, or errors. GFI makes no warranty, express or implied, and assumes no legal liability or responsibility for the accuracy or completeness of any information contained in
this document.
If you believe there are any factual errors in this document, please contact us and we will review your concerns as soon as practical.