Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Are You Vulnerable?: Page 11 of 13




Tripwire compares current config to previously generated databases

click to enlarge

One way to combat these less-visible threats to your security is to implement robust change-control procedures and audit the process using intelligent change-control monitoring software. Products such as Tripwire for Network Devices or Tripwire for Servers let organizations automate the process of "snap-shotting" system and device configurations and identifying configuration changes--changes that may include accidental or unauthorized modifications, even those made by malicious intruders (see screenshot).

  1. What type of automated vulnerability-assessment toold does your organization have?
  2. Does your organization have an automated vulnerability-assessment solution?
  3. Does your organization have an automated patch-management solution?