Vulnerabilities in the wild are at an all-time high, meaning organizations need to do more than ever to keep their critical assets safe. For many, selecting a Vulnerability and Threat Management (VTM) solution is a great place to start. But how do you find the right technology supplier? These 8 Questions will help you identify how to select a VTM solution.
#1 Does the VTM solution provide a complete view of your attack surface?
Look for a solution that provides a dynamic security model, that draws on asset and security data vulnerability scans, as well as threat intelligence, and network and cloud infrastructure including firewall configuration and network access.
#2 Will the VTM solution assess and prioritize exposures based on what matters to you?
When looking at your network, vulnerability prioritization should be based on a combination of CVE severity, asset importance to the business, evidence of exploitability in the wild, and exposure of the asset to compromise across the network.
#3 Can the VTM solution show the exact attack path(s) that make an asset vulnerable to compromise?
To better understand your risk, you should be able to see a detailed attack path analysis (including access rules and routes), which reveals the exact sequence of moves across the network from threat source to destination and supports attack simulation exercises.
#4 How will the VTM solution help to protect “unscannable” networks?
Unscannable networks such as those used in Operational Technology (OT) or to process classified data are often segregated with an air gap. The chosen technology should apply the latest threat intelligence to highlight assets at risk of compromise and automatically suggest remediations when patching is either difficult or impossible.