One of the most critical tactical activities and operations you will want to focus on in your posture and approach to security is Network Visualization and Vulnerability Detection in your network and systems environments. There are a vast number of tools available on the market to help you achieve this task and deliver to management and shareholders a comprehensive "view" of the threat landscape as it happens in real time. In this day and age security firms and product development teams are developing tools that incorporate machine learning, artificial intelligence and heuristics technologies that help to ferret out threats. Similarly there are now robust IDS and IPS appliances and tools that will help your system administrators review and monitor the landscape for new threats, odd behaviors and information ex-filtration. All of your strategic preparations, will be useless and ineffective if you cut corners in the tactical implementation areas. Network visualization and vulnerability are the "blocking and tackling" elements of your perimeter defenses.
The following submission for your review is a compilation of two trade studies that build comparative analysis of a variety of Network Visualization and Vulnerability tools and show their application and use. Trade studies are simplified and narrowed RFP type outputs that can help you compare two or more tools and benchmark them against certain criteria.
The following submission for your review is a compilation of two trade studies that build comparative analysis of a variety of Network Visualization and Vulnerability tools and show their application and use. Trade studies are simplified and narrowed RFP type outputs that can help you compare two or more tools and benchmark them against certain criteria.
network_visualization___trade_study_assessments.pdf | |
File Size: | 793 kb |
File Type: |