2021-02-02T18:29:00Z

Vulnerability Management and Risk Management Integration

Jairo Willian Pereira - PeerSpot reviewer
  • 3
  • 34
PeerSpot user
2

2 Answers

JD
User
2021-02-05T01:41:05Z
Feb 5, 2021

Yes, take a look at DeepSurface. It’s designed to automate the process. 

Jairo Willian Pereira - PeerSpot reviewer
Real User
Top 5
Feb 8, 2021

@James Dirksen thanks, i'll check it.

PeerSpot user
Product comparison that may be of interest to you
User
2021-11-06T13:24:15Z
Nov 6, 2021

Clear use with the NIST compliance framework, Archer IRM 6.9.sp3.p2, use of pre-processing out of Archer and now integration with agnostic tools. 


FOSS or premium brands - all depends on your supply chain risk. 


Support for qualitative nice to get a bow-tie on when quantitative data works for you. Add your methods, AWARE, FAIR, COBIT, ATT&CK; all visuals.

Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management. Updated: February 2024.
763,955 professionals have used our research since 2012.
IT Vendor Risk Management
What is vendor risk management? Vendor risk management (VRM) is the policy of ensuring that the relationship between service providers and IT organizations does not create an opportunity for interruptions in business productivity, profitability, and performance. The VRM process indicates that organizations should consistently monitor, manage, and assess their risk potential from outside vendors and any third-party suppliers that provide IT products, services, and solutions or that have...
Download IT Vendor Risk Management ReportRead more

Related Q&As