2015-10-25T12:50:02Z

When evaluating Vulnerability Management, what aspect do you think is the most important to look for?

Ariel Lindenfeld - PeerSpot reviewer
  • 6
  • 40
PeerSpot user
5

5 Answers

2020-01-09T01:38:03Z
Jan 9, 2020

Ensure compatibility of the vulnerability software to the organization's needs.

Search for a product comparison in Vulnerability Management
FN
Real User
2019-10-10T21:08:10Z
Oct 10, 2019

- Great dashboard
- Reporting
- Supports multiple formats (PDF, CSV, XML)
- Ease of management

Jairo Willian Pereira - PeerSpot reviewer
Real User
Top 5
2021-02-04T12:47:16Z
Feb 4, 2021

0. Your company maturity (to receive a excellent tool or if it can be a less commercial one) VERSUS speed to correct problems encountered;
2. TCO and user-friendly (of operation, installation, training and maintenance);
3. Ability to integrate/export to other platforms (ETL, OpenAPIs, formats & standards - i hate consoles!);
4. Type of licensing and pricing (per year, per asset, per module...)
5. Supplier reputation

Zero is the most important. There is no advantage/gain in having an excellent tool (with a high annual cost) if you are not prepared to handle its output. Start small and grow (and maturity is the trigger for change your tools for one better).


Today, with a wide variety of presentation plataforms (xLAP tools like a PowerBI, QlikView, OBIEE, Tableau, Pentaho etc) the quality of dashboards is secondary. 

VJ
Reseller
Top 5Leaderboard
2020-07-13T19:27:43Z
Jul 13, 2020

Agent-based system but able to correlate agent discoverer hosts with network scanning (avoiding duplicates)


Comprehensive and documented APIs so you can download data and orchestrate the platform as needed. 


Reporting portal with capabilities similar to PowerBI, Splunk, or Elastic Stack. 


A great product team that does not a tunnel vision (i.e. we know what is right) and is willing to listen and learn from experts, customers and partners


CP
User
2019-12-09T01:09:48Z
Dec 9, 2019

It should support any or all platform, depends on where you will need to use it.
- OS (Linux, Windows)
- DB (Oracle, MS SQL, DB2, etc.)
- Cloud (Azure, AWS, Google)

Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management. Updated: February 2024.
763,955 professionals have used our research since 2012.
Vulnerability Management
What is vulnerability management? Vulnerability management is the meticulous, exhaustive, systematic process implemented to discover any potential threats or vulnerabilities, stop those threats, and repair those vulnerabilities before any serious problems develop with your important operating systems. Vulnerability management also involves fixes and patches to repair those threats and vulnerabilities. It is generally accomplished in combination with additional risk assessment and...
Download Vulnerability Management ReportRead more

Related Q&As

Vulnerability Management experts

Adrian Cambronero - PeerSpot reviewer
Diana Alvarado - PeerSpot reviewer
Jonathan Ramos G. - PeerSpot reviewer
Nagendra Nekkala. - PeerSpot reviewer
Olajide Olusegun - PeerSpot reviewer
Nagendra Nekkala - PeerSpot reviewer
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Edwin Solano Salmeron - PeerSpot reviewer