Kenna Security is now part of Cisco

|Learn more
Contact Us
Talk to an Expert
Request a demo

What is Vulnerability Management?

Jun 23, 2020
Jason Rolleston
Chief Product Officer

Share with Your Network

Vulnerability management is a process in cybersecurity of proactively identifying, tracking, prioritizing, and remediating security weaknesses and flaws in IT systems and software in order to prevent malware outbreaks, data theft, and other impacts of a cyber breach such as reputation or brand damage.

Why is vulnerability management so important?

At an enterprise IT level, vulnerability management is a complex practice with responsibility over thousands of laptops, servers, and internet-connected devices like printers and routers. 

A vulnerability management program is core to preventative security hygiene and is a central component of any cybersecurity strategy.

How the vulnerability management process works

Organizations identify vulnerabilities using commercially available scanners that examine applications and software for known flaws in code, as well as misconfigurations that cause security weaknesses. Most of the vulnerabilities are categorized through the National Vulnerability Database (NVD), and given unique identifiers through the Common Vulnerabilities & Exposures (CVE) list. Some scanners may also identify vulnerabilities not found in the NVD. 

Distribution of the total number of assets affected by CVEs.

Vulnerability scans at large organizations can cumulatively identify thousands of security risks on each machine, and millions of vulnerabilities across the entire organization. There are typically more vulnerabilities than an organization has capacity to fix, hence the prioritization of vulnerabilities is so important. Our research shows that, on average, companies can only remediate about one in 10 vulnerabilities on their systems. This capacity deficit puts enormous pressure on cybersecurity professionals to prioritize vulnerabilities based on which they perceive to pose the most danger to their organization. 

When remediating vulnerabilities, IT teams may have multiple patches from which to choose. IT teams must use their best judgment to select patches that do not result in new misconfigurations and or interoperability conflicts. 

Its success depends on you

While vulnerability management is a central component to any cybersecurity strategy, organizations vary widely in their success. For example, many organizations rely on outdated models to prioritize vulnerabilities. Outdated models might prioritize vulnerabilities that, if exploited, could result in significant damage to the organization, even when there is little actual risk that a threat actor would target that specific vulnerability for technical reasons. 

That’s why here at Kenna Security we recommend a risk-based approach to vulnerability management over other models, and the leading analyst firms agree.

Read the Latest Content

Threat Intelligence

18+ Threat Intel Feeds Power Modern Vulnerability Management

You need lots of feeds to cover all of the threat and vulnerability data categories and 4 or 5 feeds doesn't provide good coverage or breadth.
READ MORE
Data Science

Ask Us About Our Data Science

In vulnerability management, data deluge is a recurring problem, and this is where Kenna has taken a distinct approach from the get-go.
READ MORE
Risk-Based Vulnerability Management

What is Modern Vulnerability Management?

Modern vulnerability management is an orderly, systematic, and data-driven approach to enterprise vulnerability management.
READ MORE
Sign up to get the latest updates
FacebookLinkedInTwitterYouTube

© 2021 Kenna Security. All Rights Reserved. Privacy Policy.