Picture
SEARCH
What are you looking for?
Need help finding what you are looking for? Contact Us
Compare

PUBLISHER: IDC | PRODUCT CODE: 1360541

Cover Image

PUBLISHER: IDC | PRODUCT CODE: 1360541

IDC PlanScape: Vulnerability Management

PUBLISHED:
PAGES: 12 Pages
DELIVERY TIME: 1-2 business days
SELECT AN OPTION
PDF (Single User License)
USD 7500

Add to Cart

This IDC PlanScape provides a step-by-step guide for building, enhancing, and running a vulnerability management capability. While setting up a vulnerability scanner and running scans on the most obvious company systems is relatively easy, doing so to ensure full coverage of the entire IT landscape - and following up to resolve identified vulnerabilities and their root causes - is more difficult, requiring extensive cooperation between business and IT. On top of the complexity of resolving and managing vulnerabilities, a vulnerability management capability needs leadership buy-in for business and IT to provide the right priority and resolve the vulnerabilities (along with other competing priorities)."The vulnerability management process is critical in identifying and resolving potential vulnerabilities," says Nick Kirtley, adjunct research advisor for IDC's IT Executive Programs (IEP). "The security team, business, and IT must work together to reduce vulnerabilities and manage vulnerability-related risk. This shuts the door to attackers trying to do harm to your business."

Product Code: US51249023

IDC PlanScape Figure

Executive Summary

Why Is Vulnerability Management Important?

  • Identification of Vulnerabilities
  • Remediating and Managing Vulnerabilities
  • Vulnerability Management Highlights the Overall Health of the IT Landscape

What Is Vulnerability Management?

  • Vulnerability Scanning
  • Other Methods and Tooling to Identify Vulnerabilities
  • Managing, Mitigating, and Remediating Vulnerabilities
  • Vulnerability Severity and Risk

Who Are the Key Stakeholders?

How Can My Organization Take Advantage of Vulnerability Management?

  • Begin with a Foundational Vulnerability Management Capability
  • Improve Your Understanding of the IT Landscape
  • Periodically Monitor Scanning Results
  • Speak the Language of IT Teams and Business Departments
  • Improve Cooperation with Other Security Teams and Capabilities
  • Improve Cooperation with Third-Party IT Service Providers Where Relevant
  • Reduce Vulnerabilities at Scale Where Possible
  • Improve Reporting
  • Improve Vulnerability Remediation Prioritization with Severity Data and Contextual Review
  • Define Vulnerability Remediation Service-Level Agreements
  • Improve Vulnerability Detection Methods and Tooling
  • Increase Scanning Frequency

Advice for Technology Buyers

  • Initial Activities for Technology and Security Leaders
  • Advanced Activities for Technology and Security Leaders

Related Research

Have a question?
Picture

Jeroen Van Heghe

Manager - EMEA

+32-2-535-7543

Picture

Christine Sirois

Manager - Americas

+1-860-674-8796

Questions? Please give us a call or visit the contact form.
Hi, how can we help?
Contact us!