All leading industry standards emphasize the importance of using various techniques and tools for vulnerability scanning to achieve sufficient coverage and depth. For example, CIS Control (v8) 7.5 states that organizations must perform both authenticated and unauthenticated vulnerability scans of internal enterprise assets on a quarterly – or more frequent – basis. Furthermore, they stress the importance of having a solution that can update its vulnerability database according to the latest publications.
|Unauthenticated Vulnerability Scan||Authenticated Vulnerability Scan|
|Endpoint systems||Tenable | Qualys | Rapid7 | Microsoft Defender for Endpoint | CrowdStrike||Tenable | Qualys | Rapid7 | McAfee Endpoint Security | CrowdStrike|
|Applications||Netsparker | Acunetix | Tenable | Qualys | Rapid7||Acunetix | Tenable | Qualys | Rapid7|
|Database systems||Tenable | Qualys | Rapid7||Qualys | Imperva | IBM Guardium | McAfee Database Security|
|Host systems||Tenable | Qualys | Rapid7||Tenable | Qualys | Rapid7|
|Storage systems||Tenable | Qualys | Rapid7||StorageGuard|
|Backup systems||Tenable | Qualys | Rapid7||StorageGuard|
"Storage is where our core data is stored. And so, vulnerability management, configuration management, and ensuring a strong policy around the governance of all storage devices are absolutely critical."
Get in touch to see how you can detect, prioritize, and fix all security risks in your storage & backup systems.