Information Security Research Library

Powered by


This webcast will provide smart shopper advice for any organization looking for a vulnerability management service. Burton Group senior analyst Diana Kelley walks attendees through the 10 steps that should be part of any outsourcing plan. She reviews best practices for ensuring accountability, effective liaison management and understanding how these providers operate.

Attendees will learn:

  • How to effectively work with a VM service provider
  • How to decide when and what to automate, such as who controls the management console and how responses are initiated
  • Effective techniques for maintaining transparency into collected data
  • How to react to problems like overly invasive scans or production server outages
  • Essentials to include in every service level agreement


Browse Related: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.