Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Automatically Fix Your Network Vulnerabilities: Page 12 of 12

VA solutions have evolved so that specialized security skills are no longer required to install or operate. There are still false positives, and scans still have an impact on target hosts. In addition, VA products are only now fully utilizing the data stored within the scans themselves to do risk management and threat assessment.

Installing and deploying a VA solution is the easy part. Doing something with the data is the difficult part. Lots of work is involved with VA program management. There can be a lot of internal resistance to scans.

A well deployed and used VA solution can be extremely helpful in securing the network and validating that other security measures, such as endpoint security and patch deployment, are working.

VA solutions can be a critical part of the security infrastructure, but there are plenty of obstacles that must be overcome.