Threat and Vulnerability Management

SANS: What are their Vulnerabilities? A Survey on Continuous Monitoring

Provided by HPE Software

Category Threat and Vulnerability Management

Type Analyst Report

Length 24

Publish Date October 28 2015

Date posted June 14 2016

Overview

Continuous monitoring is among the latest approaches to keep your company safe from hackers. And according to this SANS survey, most organizations claim to have a program for monitoring systems and activities for unauthorized changes, vulnerabilities, abnormal operation, and needed patches. But how effective are they?

Read the complete SANS survey report to learn what most companies are monitoring, how often, and what they are finding. Most important, understand why the author claims most continuous monitoring programs—even those viewed as mature by their operators—fall well short of what it takes to keep hackers out.

 

HPE is the sponsor of this material. By submitting your information you agree to be contacted by HPE on topics of interest. Before deciding please review HPE’s privacy statement. Additionally, HPE's privacy statement can be view in; SpanishPortuguese, French, German, and Italian.

Blogs

jon-collins

Thinking Different

Today’s tech can’t beat my stupid email response

Jon Collins’ in-depth look at tech and society

phil-muncaster

China Rising

The South China Sea: A new hacking hotspot

Phil Muncaster reports on China and beyond

mark-chillingworth

CIO Watch

Losing CIOs to startups could be costly

Mark Chillingworth on IT leadership

Most Recent Comments

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk

Poll

Crowdfunding: Viable alternative to VC funding or glorified marketing?