ABSTRACT

Vulnerability management (VM) product acquisition can be a complicated process. Since reliability has increased among vendors and the time between new vulnerability discovery and check distribution has shrunk, other factors must be considered. The first and most important step in product selection is to understand the requirements. At first, one may not think many requirements exist other than picking the user interface you prefer but that is not the case. So, this chapter will clarify the most significant requirements as well as some of the issues concerning the future of the industry as a whole.