Skip to main content

Vulnerability Management Architecture

  • Chapter
  • First Online:
Asset Attack Vectors

Abstract

Once a vendor has been selected for vulnerability management, the process of an actual implementation will vary greatly from one vendor to another. The simple question is why? Each of the leading vendors has taken a different technology approach to instrumenting vulnerability management at the console or management layer but is actually very similar at the scanning layer. This is why you hear security professionals state, “a network scanner is a network scanner” or that “vulnerability assessment is a commodity.” The truth is that scanners are definitely a commodity but how the data is aggregated, scans are performed, and the type of reports available are what differentiate each of the vendors. They all have false positives; they all have false negatives; some are faster at scanning one type of asset over another; and in the end, it’s the people and support that will make the difference with results and integration from the management console. Some security professionals will have a favorite solution but the deployment of each, from a management console perspective – not scanner, will vary due to on-premise technology, hosted solution, peer-to-peer databases, air gapped networks, appliances, agents, etc. All deployments need the traits discussed in this book, but the architectural topology from one vendor to another will be different. Some will connect to the cloud, some will use a spoke-and-wheel tiered hierarchy, and others peer to peer. Which architecture fits your network best is a decision only you can make. Consider the following:

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Morey J. Haber, Brad Hibbert

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Haber, M.J., Hibbert, B. (2018). Vulnerability Management Architecture. In: Asset Attack Vectors. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-3627-7_17

Download citation

Publish with us

Policies and ethics