Menu

Stories by Mandy Andress

Product Guide: Network scanning tools adjust to threats

A vulnerability rated as a low risk this morning could turn into your worst nightmare tonight. To meet the ever-increasing speed with which exploits are written and propagated, traditional network-based vulnerability scanners have morphed into more full-scale vulnerability management products.
In our latest Clear Choice Test of eight products -- assessing their accuracy in pinpointing holes in the network and their usefulness in addressing those vulnerabilities -- we found vulnerability identification success rates are still low across the board and the scans can wreak havoc on wireless access points. They also can do damage to some printers, and can suck up network bandwidth and CPU utilization on target machines.

Written by Mandy Andress06 Nov. 04 22:00