市場調査レポート

脅威・脆弱性管理

Threat and Vulnerability Management

発行 ABI Research 商品コード 344982
出版日 ページ情報 英文 23 Pages
納期: 即日から翌営業日
価格
詳細については [お問い合わせ] ボタンよりお問い合わせ下さい。
Back to Top
脅威・脆弱性管理 Threat and Vulnerability Management
出版日: 2015年11月05日 ページ情報: 英文 23 Pages
概要

当レポートでは、脅威・脆弱性管理 (VM) ソリューションについて調査分析し、企業セキュリティにおける役割に焦点を当てて、導入を促進する動向、プログラムの特徴、主要企業に関する分析など、体系的な情報を提供しています。

第1章 驚くほど脆弱な状況

  • 脅威、脆弱性、リスク:関係性
  • 脆弱性は件数・深刻度において増加中
  • ゼロデイ脆弱性の急増
  • クラウドコンピューティングの脆弱性
  • 脆弱性の列挙
  • 脅威・脆弱性管理が重要な理由

第2章 積極的なリスク管理アプローチへ

  • 脆弱性管理の機能方法
  • 評価の段階
  • リスクに基づいて修復努力の優先順位を決める
  • 修復のタスク
  • 堅牢な脆弱性管理が総合的な情報セキュリティの利益に
  • SIEMソリューションと脆弱性管理を統合
  • 次世代の脆弱性管理ソリューションの主な機能

第3章 クラウドVMソリューションに対する需要

  • Tenable Network Security
  • Qualys
  • Core Security
  • IBM
  • Rapid7
  • AlienVault

図表

目次
Product Code: AN-1598

This analysis is primarily focused on threat and vulnerability management (VM) solutions and their role in overall enterprise security. This first section explores trends that are driving the adoption of threat and vulnerability management solutions. The second section analyzes key features of an effective vulnerability management program and how VM fits into other complementary services that form a part of the organization's information security program. The final chapter provides an analysis of different players in the market and includes a review of six companies: Tenable Network Security, Qualys, Core Security, IBM, Rapid7 and AlienVault.

Table of Contents

1. A STAGGERINGLY VULNERABLE LANDSCAPE

  • 1.1. Threat, Vulnerability, Risk: How are They related?
  • 1.2. Vulnerabilities are Increasing in Volume and Severity
  • 1.3. Proliferation of Zero-day Vulnerabilities
  • 1.4. Cloud Computing Vulnerabilities
  • 1.5. Vulnerability Enumeration
  • 1.6. Why is Threat and Vulnerability Management Important?

2. TOWARD A PROACTIVE RISK MANAGEMENT APPROACH

  • 2.1. How Does Vulnerability Management Work?
  • 2.2. The Assessments Phase
  • 2.3. Prioritize Remediation Efforts Based on Risk
  • 2.4. The Task of Remediation
  • 2.5. Robust Vulnerability Management Benefits Overall Information Security
  • 2.6. Integrating Vulnerability Management with SIEM Solutions
  • 2.7. Key Features of a Next Generation Vulnerability Management Solution

3. DEMAND FOR CLOUD VM SOLUTIONS SET TO SOAR

  • 3.1. Tenable Network Security
  • 3.2. Qualys
  • 3.3. Core Security
  • 3.4. IBM
  • 3.5. Rapid7
  • 3.6. AlienVault

Tables

  • 1. Total Number of Vulnerabilities World Market, Forecast: 2015 to 2020
  • 2. Threat and Vulnerability Market Revenue World Market, Forecast: 2015 to 2020
  • 3. Policy and Compliance Services Market Revenue World Market, Forecast: 2015 to 2020
  • 4. Total Vulnerability Assessment Market Revenue World Market, 2015 to 2020
  • 5. Threat Intelligence Services Market Revenue World Market, Forecast: 2015 to 2020
  • 6. SIEM Market Revenue World Market, Forecast: 2015 to 2020
  • 7. IBM IT Security Services Managed Security Services Professional Security Services

Charts

  • 1.Total Number of Vulnerabilities World Market, Forecast: 2015 to 2020
  • 2.Threat and Vulnerability Management Market Revenue World Market, Forecast: 2015 to 2020
  • 3.Policy and Compliance Services Market Revenue World Market, Forecast: 2015 to 2020
  • 4.Total Vulnerability Assessment Market Revenue World Market, Forecast: 2015 to 2020
  • 5.Threat Intelligence Services Market Revenue World Market, Forecast: 2015 to 2020
  • 6.SIEM Market Revenue World Market, Forecast: 2015 to 2020

Figures

  • 1.Interdependence Between Processes in a Security Program
Back to Top