Abstract
Now that the vulnerability process and associated technologies have been thoroughly tested and validated in a lab and/or pilot deployment, it’s time to roll it out to the production environment where it will be run on an ongoing basis. It is recommended that enterprise deployment of a Vulnerability Management solution and supporting processes be implemented in a phased approach. This controlled approach enables the deployment team to uncover and address challenges using a controlled and manageable approach. Figure 15-1 highlights the tasks for a successful deployment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Morey J. Haber, Brad Hibbert
About this chapter
Cite this chapter
Haber, M.J., Hibbert, B. (2018). Vulnerability Management Deployment. In: Asset Attack Vectors. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-3627-7_15
Download citation
DOI: https://doi.org/10.1007/978-1-4842-3627-7_15
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-3626-0
Online ISBN: 978-1-4842-3627-7
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books