How the Top 5 Organizations Are Using Vulnerability Scanning: A Case Study | Enterprise Storage Forum (2023)

Organizations use vulnerability scanning tools and third-party services to identify risky areas in their networks. Understanding your risk posture is a key element of an effective security solution.

These five case studies provide examples of organizations from various industries using third-party vulnerability scanning services.

Wanli Technology

Miles Technologies is a technology consulting firm specializing in IT, software, marketing and cybersecurity. One of the services they offer is vulnerability detection for clients related to cyber security.

The company was looking for a more streamlined alternative to scanning for vulnerabilities and generating progress reports for customers. The tools they use are unintuitive and time-consuming.

Acunetix Premium is a vulnerability management tool that improves the way Miles Technologies performs vulnerability scans on behalf of its customers. The company was able to reduce its time commitment on these projects from a maximum of 10 days to less than three business days.

Additional benefits include customer customization and reporting with a prioritized list of vulnerability issues. Ultimately, Miles Technologies was able to deliver better vulnerability reports through the Acunetix solution provider in less time than the previous distributed approach.

"Acunetix is ​​our vulnerability scanning tool of choice for situations where information security is a real concern and confidence in security is key," said JP Lessard, President, Software Services, Miles Technologies.

industry:technical consulting

Vulnerability Scanning Provider:Acunetix

(Video) Data Governance Explained in 5 Minutes

Example:Miles Technology joins Acunetix to improve the way it provides vulnerability scanning services to consulting clients.

readWanli Technology και Acunetixcase analysis.

learn more aboutVulnerability Scanning and Why It Matters.

Isaac

ISACA, formerly known as the Information Systems Audit and Control Association, is an international not-for-profit association focused on the development and adoption of leading best practices for IT governance, security and information systems. The organization is large, serving more than 140,000 ISACA members and professional certification holders in more than 180 countries. Membership primarily includes consultants, professionals and educators.

ISACA faced significant challenges in determining how best to test for vulnerabilities across its extensive network, which included web applications and components such as login forms, user registration, online payment functions, multi-user portals, and tens of thousands of websites. While the organization adheres to the best practice of testing all code using a test environment before releasing it to live environments, the security team faces an uphill battle maintaining the integrity of each site. ISACA, each requires routine maintenance. and update.

Previously, ISACA used open source tools and third-party queries, a relatively unreliable and rather expensive solution. To thoroughly examine each potential attack surface, ISACA needed a more automated approach to vulnerability scanning.

ISACA selected the Invicti web application security scanner to automate vulnerability assessments. ISACA chose Invicti because Security Scanner provided clear explanations of upcoming vulnerabilities, was able to assess vulnerabilities at different stages of development, offered customization and automation, and was easy to use.

"Invicti is better able to identify and explain specific issues," said a senior director on ISACA's security team. "He was also able to help with the proof of concept of vulnerability assessment during development. It was very easy to use and allowed everyone on our team to collaborate. Of course, being able to customize, scan and automate tasks was a huge plus. When migrating new code Invicti helped us identify areas that needed remediation before going to production."

industry:non-profit

(Video) Stay Ahead of Vulnerabilities with OCI Vulnerability Scanning

Vulnerability Scanning Provider:invincible

Example:ISACA partnered with Invicti to simplify and centralize the way web application vulnerabilities are assessed, improving on its disjointed and incomplete approach.

readISAAC and Invincibilitycase analysis.

Highmark Health Solutions

Highmark Health Solutions is a provider of healthcare management technology, creating solutions such as comprehensive end-to-end management platforms for health plan customers and their 10 million members.

As a large company, vulnerability management is an important job of Highmark's security operations team. Although the company has established practices related to vulnerability management, there are concerns that the true level of risk is unknown.

The company worked with CyLumena to conduct an assessment of its processes and overall vulnerabilities. CyLumena is able to identify process gaps and suggest areas for improvement through a cybersecurity and Lean Six Sigma lens. Ultimately, Highmark achieved a stronger security posture and implemented a continuous improvement approach to its vulnerability management process.

"Based on my interactions with CyLumena, I have found their team to be experienced and professional, their findings to be insightful, and their recommendations actionable," said Jason Martin, Director of Vulnerability Governance at Highmark Health. "The thoroughness of our assessment and reporting process provided us with the basis for implementing application security program improvements. I can say with certainty that the results have been successful."

industry:health technology

Vulnerability Scanning Provider:CyLumena

(Video) Global Agriculture Innovation Forum: Managing Post Harvest Losses: PICS Case Study - July 27, 2021

Example:To improve its approach to vulnerability management, Highmark Health Solutions engaged CyLumena to review its processes, demonstrating a stronger security posture and better vulnerability management.

readHighmark Health Solutions 和 CyLumenacase analysis.

ING Wholesale Bank of Ukraine

Headquartered in Amsterdam, the Netherlands, ING Bank is part of the ING Group, a global financial company with a long history. ING Bank manages more than 63,000 employees and provides retail and business banking services to 32 million retail, corporate and institutional customers in more than 40 countries. ING Wholesale Banking Ukraine is a subsidiary of ING Group.

ING Bank Ukraine needed to protect its online services from cyberattacks and wanted to identify its security weaknesses, especially those related to its web application. The company partnered with security consultancy Infopulse for the assessment.

Infopulse provides a comprehensive plan to address the ING Bank Ukraine security breach. The solution includes analysis of information from public sources, scanning of target web servers and applications for vulnerabilities, black-box and white-box penetration testing, and expert-controlled compromise of target systems. Information Security to confirm identified vulnerabilities and disclose any undetected risks.

ING Bank Ukraine is pleased with the results. Alexander Matsera, Central Office of the Ministry of Information and Operational Risk Management, said: "Today, most of the processes in the banking industry are computerized, and the level of security of information systems is an important indicator of the reliability of financial institutions. ING Bank Ukraine pays special attention to Protect the confidential information of our customers and partners, conduct regular security checks and carefully select contractors. Infopulse provides a security risk assessment and makes detailed recommendations to improve the security level of our information systems.”

industry:banking

Vulnerability Scanning Provider:information pulse

Example:Hagedorn securely migrated to Azure using Barracuda FWaaS, simplifying and centralizing security protocols across all sites.

(Video) Nozomi Networks Guardian: Solution & Use Cases

readING Bank and Infopulsecase analysis.

Keesal, Young 和 Logan

Keesal, Young & Logan is a small, full-service international business law firm headquartered in Long Beach, California.

Companies must comply with information security regulations, including HIPAA, HITECH, and evolving ABAB standards. You also undertake to protect sensitive data from access by third parties. In short, for IT staff, the company was looking for an outsourced security solution to handle vulnerability scanning.

Digital Defense was selected as the outsourcer for the security solution. The company provides vulnerability scans and reports a prioritized list of potential vulnerabilities. The digital defense solution, called Vulnerability Lifecycle Management-Professional (VLM-Pro), is used to perform host detection and vulnerability scanning of internal and external IP-based systems and networks. Scanning proactively looks at known vulnerabilities as well as industry best practice security configurations.

"We are committed to vulnerability scanning and securing our network and take the time to evaluate our internal scanning tools and managed solutions," said CIO Justin Hectus. DD's scanning technology identified vulnerabilities in our network that other scanning methods did not detect DD’s managed solution not only identifies weaknesses, but helps us prioritize them so we can manage risk more effectively.”

industry:legal

Vulnerability Scanning Provider:digital defense

Example:Keesal, Young & Logan selected Digital Defense as their outsourcing partner to manage their vulnerability scanning approach.

readKeesal, Young & Logan και Digital Defensecase analysis.

(Video) Internet of Things (IoT) | What is IoT | How it Works | IoT Explained | Edureka

learn more aboutThe Best Vulnerability Scanning Tools and Software.

FAQs

What kind of organization will you apply a vulnerability scanner? ›

Vulnerability scanning, also commonly known as 'vuln scan,' is an automated process of proactively identifying network, application, and security vulnerabilities. Vulnerability scanning is typically performed by the IT department of an organization or a third-party security service provider.

Which of the following is an example of a well known vulnerability scanner? ›

Nmap. Nmap is one of the well-known free and open-source network scanning tools among many security professionals. Nmap uses the probing technique to discover hosts in the network and for operating system discovery. This feature helps in detecting vulnerabilities in single or multiple networks.

What are the two most common types of vulnerability scans? ›

Credentialed and non-Credentialed scans (also respectively referred to as authenticated and non-authenticated scans) are the two main categories of vulnerability scanning. Non-credentialed scans, as the name suggests, do not require credentials and do not get trusted access to the systems they are scanning.

Which tool is used for vulnerability scanning in industry level? ›

Tools Listing
Name/LinkOwnerLicense
ThreatMapperDeepfenceOpen Source
Tinfoil SecuritySynopsysCommercial
Trustkeeper ScannerTrustwave SpiderLabsCommercial
VegaSubgraphOpen Source
92 more rows

Which is the most popular vulnerability scanner used in companies? ›

2. ____________ is the world's most popular vulnerability scanner used in companies for checking vulnerabilities in the network. Explanation: Nessus is a popular and proprietary network vulnerability scanning tool developed by Tenable Network Security.

What organization releases the top 10 vulnerabilities in application security? ›

The OWASP Top Ten list is an effort by the OWASP Foundation to address this issue and reduce web application security risks by drawing attention to these vulnerabilities and providing resources that help developers to identify, avoid, and remediate them.

Which type of vulnerability scan can usually identify the most vulnerabilities? ›

Network Scanning

This is one of the most vital among all the vulnerability scanning types. Network vulnerability scanning is the process of identifying the security vulnerabilities in an organization's network infrastructure.

What is a common vulnerability scanner used to detect unknown vulnerabilities and missing software patches? ›

Nessus. A widely used open-source vulnerability assessment tool, Nessus detects software flaws, missing patches, malware, and misconfiguration errors across several operating systems.

What are the 4 main types of security vulnerability? ›

The four main types of vulnerabilities in information security are network vulnerabilities, operating system vulnerabilities, process (or procedural) vulnerabilities, and human vulnerabilities.

What are the following four 4 types of vulnerability? ›

The different types of vulnerability

According to the different types of losses, the vulnerability can be defined as physical vulnerability, economic vulnerability, social vulnerability and environmental vulnerability.

What are the activities of vulnerability scanning? ›

Step 1: Perform Vulnerability Scan
  • Scan network-accessible systems by pinging them or sending them TCP/UDP packets.
  • Identify open ports and services running on scanned systems.
  • If possible, remotely log in to systems to gather detailed system information.
  • Correlate system information with known vulnerabilities.

What is the fastest running vulnerability scan? ›

According to our experts, Nmap is one of the fastest vulnerability scanners in the market today. It helps with network discovery as well as security scanning. Furthermore, it performs port scanning, vulnerability scanning, fingerprinting operating systems, and so on.

What is the best web vulnerability scanner? ›

Top Vulnerability Scanners
  • Invicti: Best Website and Application Vulnerability Scanning Tool.
  • Nmap: Best Open Source Specialty Port Scanner.
  • OpenVAS: Best Open Source IT Infrastructure Vulnerability Scanner.
  • RapidFire VulScan: Best MSP / MSSP Option.
  • StackHawk: Best SMB DevOps App Scanner.
Mar 8, 2023

Why is Nessus the best vulnerability scanner? ›

As an open-source network vulnerability scanner, Nessus uses the Common Vulnerabilities and Exposures architecture to make it easy for compliant security solutions to cross-link.

What is the biggest CVE database? ›

VulnDB – Vulnerability Intelligence

Based on the largest and most comprehensive vulnerability database, our VulnDB allows organizations to poll for the latest in software security vulnerability information.

How effective are vulnerability scanners? ›

Vulnerability Scanning is only effective at reducing the risk to an organisation when used as part of a larger Vulnerability Management Program (VMP).

What is the biggest vulnerability in organizations? ›

The biggest security vulnerability in any organization is its own employees. Whether it's the result of intentional malfeasance or an accident, most data breaches can be traced back to a person within the organization that was breached.

What is the biggest security vulnerabilities in an organization? ›

Top 8 Cyber Security Vulnerabilities
  • #1. Zero Day. ...
  • #2. Remote Code Execution (RCE) ...
  • #3. Poor Data Sanitization. ...
  • #4. Unpatched Software. ...
  • #5. Unauthorized Access. ...
  • #6. Misconfiguration. ...
  • #7. Credential Theft. ...
  • #8. Vulnerable APIs.

Which organization focuses on the top 10 most common vulnerabilities for IoT? ›

OWASP's Top 10 IoT Vulnerabilities
  • Weak, Guessable, or Hardcoded Passwords. ...
  • Insecure Network Services. ...
  • Insecure Ecosystem Interfaces. ...
  • Lack of Secure Update Mechanism. ...
  • Insufficient Privacy Protection. ...
  • Insecure Data Transfer and Storage. ...
  • Lack of Device Management.
Jan 7, 2019

Which two are software vulnerability scanners? ›

Top 14 Vulnerability Scanners for Cybersecurity Professionals
  • Acunetix. Acunetix is a web vulnerability scanner that features advanced crawling technology to find vulnerabilities to search every type of web page—even those that are password protected.
  • beSECURE. ...
  • Burp Suite. ...
  • GFI Languard. ...
  • Nessus. ...
  • Nexpose. ...
  • Nmap. ...
  • OpenVAS.

What are the three most common types of scanners? ›

There are three types of scanners available: drum scanner, flatbed, and handheld scanners. The publishing industry primarily uses drum scanners to print high-quality images, while flatbed scanners are generally used in schools and offices. On the other hand, libraries and shopping malls make use of handheld scanners.

Which testing is best used with vulnerability assessments? ›

Penetration testing is a security method that allows organizations to identify, test, and prioritize vulnerabilities in computer systems and networks.

Which of these is a popular open source vulnerability scanner? ›

1. OpenVAS (http://www.openvas.org/) OpenVAS stands for Open Vulnerability Assessment Scanner. It is a full-featured open-source vulnerability scanner with extensive scan coverage.

What type of vulnerabilities will not be found by a vulnerability scanner? ›

Vulnerability scanners cannot detect vulnerabilities for which they do not have a test, plug-in, or signature. Signatures often include version numbers, service fingerprints, or configuration data.

In which testing vulnerabilities are detected? ›

Static application security testing analyzes program source code to identify security vulnerabilities.

What are the 5 types of vulnerability? ›

Types of vulnerability include social, cognitive, environmental, emotional or military. In relation to hazards and disasters, vulnerability is a concept that links the relationship that people have with their environment to social forces and institutions and the cultural values that sustain and contest them.

What are the 4 C's in security? ›

Securing the 4 Cs of Cloud-Native Systems: Cloud, Cluster, Container, and Code.

What are the three main vulnerabilities? ›

At the broadest level, network vulnerabilities fall into three categories: hardware-based, software-based, and human-based.

What are the five key concepts mentioned in the individual vulnerability? ›

6 ûve key concepts mentioned in the individual vulnerability are democracy, risk, visibility, precarity and inequality.

What is the main purpose of using vulnerability scanners? ›

Vulnerability scanning is the process of identifying security weaknesses and flaws in systems and software running on them. This is an integral component of a vulnerability management program, which has one overarching goal – to protect the organization from breaches and the exposure of sensitive data.

Does Microsoft do vulnerability scanning? ›

Microsoft's security agent is installed during asset deployment and enables fully automated vulnerability and configuration scanning. The security agent uses industry-standard tools to detect known vulnerabilities and security misconfigurations.

Which is better Qualys vs Nessus? ›

Comparison Results: Based on the parameters we compared, both products have an easy deployment, unique features, and reasonable service and support. However, users rated Tenable Nessus as a slightly better solution. To learn more, read our detailed Qualys VMDR vs. Tenable Nessus Report (Updated: March 2023).

How often should vulnerability scans be run NIST? ›

National Institute of Standards and Technology (NIST) - Quarterly to monthly depending on governing framework.

What is an example of a network vulnerability scanner? ›

InsightVM is also the only network vulnerability scanner that automatically prioritizes vulnerabilities based on a combination of CVSS score, exploitability, malware exposure, and vulnerability age.

What is the most vulnerable website? ›

Top 12 Vulnerable Websites for Penetration Testing and Ethical Hacking Training
  • Hack The Box.
  • CTFlearn.
  • bWAPP.
  • HackThisSite.
  • Google Gruyere.
  • Damn Vulnerable iOS App - DVIA.
  • Hellbound Hackers.
  • OWASP Mutillidae II.
May 18, 2021

Is Nessus the best scanner? ›

It is the most deployed scanner in the vulnerability management industry. Organizations that use this product have access to the largest continuously updated global library of vulnerability and configuration checks. They can stay ahead of threats that Tenable Nessus's competitors may be unable to spot.

Why should a business or organization conduct a vulnerability scan? ›

Vulnerability assessments are essential for identifying potential risk areas in a business's cybersecurity that could potentially be exploited during a digital attack or threat event, leading to severe consequences like the theft of confidential information and the loss of data or revenue.

What does a vulnerability program allow an organization to do? ›

By identifying, assessing, and addressing potential security weaknesses, organizations can help prevent attacks and minimize damage if one does occur. The goal of vulnerability management is to reduce the organization's overall risk exposure by mitigating as many vulnerabilities as possible.

Why you need to know the right vulnerability scanner for your organization? ›

Vulnerability scanners offer an excellent starting point though, allowing an organization to identify their most serious and most exposed technical weaknesses so they can react before an attacker takes advantage. In short, every business should understand where their cyber weaknesses are, and get them fixed.

What's the purpose of a vulnerability scanner? ›

Vulnerability scanning is the process of identifying security weaknesses and flaws in systems and software running on them. This is an integral component of a vulnerability management program, which has one overarching goal – to protect the organization from breaches and the exposure of sensitive data.

What are the factors that influence the organization to conduct vulnerability scan? ›

How Often Should You Perform Vulnerability Scanning? The frequency of vulnerability scanning depends on a few factors: organizational changes, compliance standards, and security program goals.

What does an organization do to identify areas of vulnerability? ›

What does an organization do to identify areas of vulnerability within their network and security systems? During a risk assessment, the organization determines that the risk of collecting personal data from its customers is not acceptable and stops.

Why is vulnerability scanning important to the risk management process and how does IT help? ›

A vulnerability scan is an important step in the vulnerability management process, which aims to identify and address potential security risks. By performing regular vulnerability scans, organizations can assess their security posture and proactively manage vulnerabilities before they can be exploited.

What do companies use to find and track vulnerabilities? ›

A vulnerability scanner enables organizations to monitor their networks, systems, and applications for security vulnerabilities. Most security teams utilize vulnerability scanners to bring to light security vulnerabilities in their computer systems, networks, applications and procedures.

How do you implement vulnerability scanning? ›

Vulnerability Scanning Best Practices
  1. Scan every device that touches your ecosystem.
  2. Scan frequently.
  3. Assign owners to critical assets.
  4. Prioritize the patching process.
  5. Document all scans and their results.
  6. Establish a remediation process.

How do you implement a vulnerability scanner? ›

  1. 7 TIPS TO MANAGE VULNERABILITIES. ...
  2. CONFIRM YOUR SCOPE. ...
  3. RUN EXTERNAL VULNERABILITY SCANS. ...
  4. RUN INTERNAL VULNERABILITY SCANS. ...
  5. INDEPENDENT AND QUALIFIED TESTING. ...
  6. REGULARLY RUN VULNERABILITY SCANS. ...
  7. RUN SCANS AFTER SIGNIFICANT NETWORK CHANGES. ...
  8. ESTABLISH A TOP-DOWN APPROACH.

What are the three types of vulnerability scanners? ›

The top types of vulnerability scanners are:

Web Application Vulnerability Scanner. Network Vulnerability Scanner. Host-based Vulnerability Scanner.

Videos

1. Safety is NOT a Priority - Safety Training Video - Preventing Workplace Accidents and Injuries
(Safety Memos)
2. Leadership Explained in 5 minutes by Simon Sinek
(Marc Yu)
3. Cybersecurity Expert Demonstrates How Hackers Easily Gain Access To Sensitive Information
(Dr. Phil)
4. Ransomware Best Practices for Business Leaders
(CISA)
5. Webinar: Gain Confidence in Compliance: Advanced Image Scanning with Harbor
(CNCF [Cloud Native Computing Foundation])
6. 5 Power Tips to Ensure Cloud Security in 2021 | SISA Webinar
(SISA Information Security)

References

Top Articles
Latest Posts
Article information

Author: Edwin Metz

Last Updated: 07/02/2023

Views: 6269

Rating: 4.8 / 5 (58 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Edwin Metz

Birthday: 1997-04-16

Address: 51593 Leanne Light, Kuphalmouth, DE 50012-5183

Phone: +639107620957

Job: Corporate Banking Technician

Hobby: Reading, scrapbook, role-playing games, Fishing, Fishing, Scuba diving, Beekeeping

Introduction: My name is Edwin Metz, I am a fair, energetic, helpful, brave, outstanding, nice, helpful person who loves writing and wants to share my knowledge and understanding with you.