1. Reducing the Risk of Successful Attack
Lionel Medina
Medina Networks
866-865-5307 x 3
2. Agenda
Why Vulnerability Assessment?
What is included in a Vulnerability Assessment?
Key Features
Benefits
Q&A
3. Why Vulnerability Assessment?
Small business fraud totalled $8 billion in 2010
Week of June 13, 2011:
23 critical security issues found in Adobe Shockwave Player
12 critical security issues found in Java
11 critical security issues found in Adobe Acrobat
9 critical security issues found in Internet Explorer
8 critical security issues found in Microsoft Excel
While data breaches hitting major banks and corporations tend to dominate
headlines, small businesses are increasingly becoming targets. Hackers like to
prey on small businesses because computers and mobile phones tend to be
used for both work and personal use, and many small businesses don’t have an
IT staff monitoring and protecting operations.
4. What’s included in Vulnerability Assessment?
A one time detailed scan and report on your business security
exposure.
Leverages industry-leading Security/Vulnerability Assessment
software
Non-intrusive, passive scanning does not impact network or
device operations
Provides detailed scanning & vulnerability reporting on a range
of IP devices
Includes prescriptive advice to remediate found issues
5. Benefits
One-time, non-intrusive scan can save your business
Prescriptive remediation accelerates time to repair found
issues
High/Medium/Low rankings let you address the most
critical issues first
Goes beyond application security to address hardware
and operating system level vulnerabilities