Unlocking the Potential of the Cloud for IBM Power Systems
Â
Effective Vulnerabilities Management in Simple Ten Steps
1. Effective Vulnerability Management
In Simple 10 Steps
Asset Identification &
Management
39%of respondents say that lack
visibility into applications,
underlying systems and
vulnerabilities.
PROMISEC www.promisec.com
2. Vulnerability
Identification
of the 15,435 vulnerabilities
discovered in 2014, 11% were
reated "Highly Critical" and
just 0.3% as "Extremely
Critical"
Consistent
Vulnerability
Management
Less Than
40%
of organizations their entire
network with active
vulnerability scan more than
once per quarter.
PROMISEC www.promisec.com
3. Risk Management
Risk management are used
to identity, estimate, and
prioritize risk to
organizations.
Change
Management
60%
of incidents can be attributed
to errors by system
administrators and other
internal staff.
PROMISEC www.promisec.com
4. Patch
Management
99.9%
of the exploited
vulnerabilities had been
compromised more than a
year the associated
CVE(Common
Vulnerabilities and
Exposure) was published.
Mobile Device
Management
of respondents believe their
mobile endpoints have been
the target of malware over
the past 12 months.
PROMISEC www.promisec.com
6. Incident Response
1 out of 5 Security Operations
Centres are not minimally
prepared to respond to, much
less detect, cyber threats
affecting their organization.
Automation
33%
of respondent organizations
manually remediate infected
hosts- an approach which carries
with an increased "time of
exposure" and, therefore,
increased potential for data theft
and other forms of damage.
PROMISEC www.promisec.com