Active scanners look for unpatched insecure software, open ports, poorly configured software and known security problems. AnchorPoint’s Integrated Threat Response (ITR) service includes vulnerability scanning and assessment.
Vulnerability assessment software must be up-to-date, since exploits often opportunistically follow the discovery and public announcement of vulnerabilities by the security community. AnchorPoint’s ITR vulnerability database is constantly updated.
Once vulnerabilities have been identified, remediation is required. Since thousands of vulnerabilities are discovered each year, and seemingly never-ending security updates and patches required, remediation needs to be prioritized. Vulnerability management is never “done”, as increasing attack vectors and software complexity require continuous monitoring and methods to prioritize remediation. Since newly-found vulnerabilities are constantly surfacing, and the organization’s IT infrastructure is typically changing over time, consistent diligence is required for effective vulnerability management.
Careful risk management is required, since many organizations find “they can’t fix everything”.
Keeping up with the patching required by Microsoft and other third party software is difficult. Often, patching, applying updates and reconfiguring systems is required to remediate vulnerabilities found in scans, and the impact to operations can be prohibitive.
A big part of effective vulnerability management is assuring that you are scanning all aspects of your IT infrastructure that may introduce vulnerabilities for exploit. This encompasses core components, including network devices, virtualized assets, and assets that IT is not aware of, “Rogue” assets can be introduced by a line of business, or an individual, maliciously or benignly. These may be in violation of your organization’s Acceptable Use policy. ITR provides powerful built-in asset discovery capabilities.
The integrated vulnerability scanning you get with AnchorPoint’s ITR service lets you know which of your assets are actually vulnerable to the exploits being attempted. Having this information “at your fingertips” gives you the actionable information you need to do your job.
Management may choose to acknowledge some vulnerabilities but not remediate them immediately. Businesses are often willing to accept the risk rather than taking on the financial investment to address vulnerabilities. This decision to wait on remediation includes several factors, such as the value of the asset, the impact to the business to perform remediation and the accessibility to to the asset beyond the organization’s internal network – on the internet.
As part of an overall vulnerability management process, ITR’s vulnerability assessment lets you schedule scans very flexibly, selecting which network segments are to be scanned, and at what frequency. Findings of the scans will be used to create alarms our SOC Analysts will respond to and correlate with other events occurring on your network.
By being embedded within the open source community, AnchorPoint can deliver collaborative defense with actionable, community-powered threat data. Our aggregated threat data gives you visibility into the latest malicious behavior of known malicious hosts. Our access to community-powered threat data helps you prioritize your remediation efforts, which is highly useful when you have high-risk vulnerabilities and the clock is ticking.