Vulnerability scanning has its place but I’ve often found that it produces a mountain of data with little guidance for prioritizing updates other than a relative high/medium/low risk rating of the exploit itself and of the device’s value.
Many of the vulnerabilities reported are mitigated by other compensating controls that the scanner is not aware of. The most frequent compensating control is network restrictions.
In this real training for free event, I will explore how to correlate vulnerability scans with network access path data to discover your biggest risks while helping de-prioritize those vulnerabilities that present the least risk when taking into account the current state of your routed network.
My sponsor, FireMon, are the experts on analyzing firewall rules to optimize network traffic and security and Matt Dean, VP of Product, will join me to share what they’ve learned about correlating vulnerability scans with network path analysis and will briefly show you how FireMon can even visually lay vulnerability data on top of route intelligence to help you see the risks.