Service Coordinator - Technology Security at a government with 10,001+ employees
Real User
Top 10
2023-07-12T15:46:59Z
Jul 12, 2023
It's an enterprise-level tool. If we’re not putting it in everything, it's very expensive to maintain in terms of people and time. We need to dedicate time and resources to keep it running. It was hard to configure. We made some technology changes, and there were some technologies that we couldn’t scan with the product. So, we decided to reduce our footprint internally.
Information Security Architect at Injazat Data Systems
MSP
Top 10
2019-11-21T07:12:00Z
Nov 21, 2019
I feel that the reporting should be improved - especially the way it organizes the findings. I would like to have a real-time dashboard. The previous program I used, could tell me which of my systems were vulnerable when a new definitions file was uploaded, so I knew about the new vulnerabilities before scanning the systems. An exposure index would be great in reporting. Another thing that needs to be fixed, is the reporting. The remediation solution for Microsoft vulnerabilities, for example, gives me the CV number and then I have to search in Microsoft to find and download the patch. Other programs give me directly the KB article with a link to download the patch related to my case. The technical support can also be better.
Pre-Sales Specialist at a tech services company with 51-200 employees
Reseller
2019-01-31T08:49:00Z
Jan 31, 2019
The reporting functions can use improvement. There is room for growth because reporting functions differ a lot depending on what you're going to output. It depends on whether it's for technical or senior management and how it's interpreted. There could be growth within the reporting functionality side.
What is vulnerability management? Vulnerability management is the meticulous, exhaustive, systematic process implemented to discover any potential threats or vulnerabilities, stop those threats, and repair those vulnerabilities before any serious problems develop with your important operating systems. Vulnerability management also involves fixes and patches to repair those threats and vulnerabilities. It is generally accomplished in combination with additional risk assessment and...
It's an enterprise-level tool. If we’re not putting it in everything, it's very expensive to maintain in terms of people and time. We need to dedicate time and resources to keep it running. It was hard to configure. We made some technology changes, and there were some technologies that we couldn’t scan with the product. So, we decided to reduce our footprint internally.
I feel that the reporting should be improved - especially the way it organizes the findings. I would like to have a real-time dashboard. The previous program I used, could tell me which of my systems were vulnerable when a new definitions file was uploaded, so I knew about the new vulnerabilities before scanning the systems. An exposure index would be great in reporting. Another thing that needs to be fixed, is the reporting. The remediation solution for Microsoft vulnerabilities, for example, gives me the CV number and then I have to search in Microsoft to find and download the patch. Other programs give me directly the KB article with a link to download the patch related to my case. The technical support can also be better.
We would like to have better reporting capabilities and for them to be more granular.
The reporting functions can use improvement. There is room for growth because reporting functions differ a lot depending on what you're going to output. It depends on whether it's for technical or senior management and how it's interpreted. There could be growth within the reporting functionality side.