Protecting today's dynamic networks against ever-changing security threats requires vigilance as well as action. A vulnerability assessment scanner, frequently updated to reflect the latest attacks, can be an essential weapon in your information security arsenal. The recent Blaster worm was just the latest reminder that corporations need to move swiftly to prevent attack. It won't be the last. . . .
How secure is your enterprise network? Today that's a harder question to answer than ever, especially as enterprise networks continue to grow in size and complexity.

Just consider: the number of security incidents is mushrooming each year, "critical" software patches are issued every month, and attacks move with such speed that companies scarcely have time to respond to them. This summer's Blaster worm, for example, arrived just 26 days after Microsoft disclosed an RPC DCOM Windows flaw and released a patch. That's why knowing the ins and outs of your network infrastructure has never been more mission-critical than it is now.

For many enterprises, providing a "deep look" into the network is the job of a vulnerability assessment scanner. This tool can root out possible weak points in a network before attackers do. For example, a scanner can probe networks for known vulnerabilities in operating systems, applications, and passwords, to name just a few areas. A scanner can also use sophisticated path analysis to illustrate the exact sequence of steps an intruder might take to discover and exploit a vulnerability in the network.

Let's look at the key features of a vulnerability assessment scanner and how to get the most out of this essential tool.

The link for this article located at net-security.org is no longer available.