Intelligent CIO Europe Issue 56 | Page 23

Though this e-book is written in a sequential order , every section is self-contained . Feel free to dip in and out of this book as you prefer . Use the links in the table of contents to jump to a section that appeals to you or read it from cover to cover . detailed scan against an asset to inspect the file system , registry , and configurations . This brings up further issues with staying up to date with changing credentials and investing in secure storage options to prevent credential compromise .
Does agent-based vulnerability management give you an edge ? What about in remote work conditions ?
On the other hand , agents are lightweight , multipurpose tools that reside within the endpoints . p
Eliminating blind spots is the key to an efficient vulnerability management program , and endpoint agents do a great job of this . The scope of visibility , accuracy , and efficiency offered by agent-based scanning simply can ’ t be achieved with agentless scanning .
Agentless scanning is network intrusive and is likely to result in traffic congestion every time a networkbased scan is performed to discover and retrieve the vulnerability status of network assets . Additionally , it requires host credentials to access and run a
Download whitepapers free from www . intelligentcio . com / eu / whitepapers /
www . intelligentcio . com INTELLIGENTCIO EUROPE 23