The vulnerability management solutions become more popular in the area of information security.
Let us discuss on the various tools/vendors who took this as their business and their technical documentation
Hope you’ll spend good time to gain more knowledge on this subject
QualysGuard® Vulnerability Management (VM) automates the lifecycle of network auditing and vulnerability management across the enterprise, including network discovery and mapping, asset prioritization, vulnerability assessment reporting and remediation tracking according to business risk. Driven by the most comprehensive vulnerability KnowledgeBase in the industry, QualysGuard delivers continuous protection against the latest worms and security threats without the substantial cost, resource and deployment issues associated with traditional software. As an on demand Software-as-a-Service (SaaS) solution, there is no infrastructure to deploy or manage.
QualysGuard Vulnerability Management Video Series
HP WebInspect gives security professionals and security novices alike the power and knowledge to quickly identify and validate critical, high-risk security vulnerabilities in applications running in development, QA, or production. HP WebInspect gives you the power to:
Increase modern Web technology coverage
Accelerate security through more actionable information
Elevate security knowledge across the business
Comply with legal, regulatory, and architectural requirements
Leverage automation to do more with less
Build an enterprise-wide application security program
HP SmartUpdate enables WebInspect to download updates as they become available and enhance its capabilities through software connected online services.
Nmap (“Network Mapper”) is an open source tool for network exploration and security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. While Nmap is commonly used for security audits, many systems and network administrators find it useful for routine tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.
Nmap Reference Guide
The Tenable Nessus® vulnerability scanner performs deep, high-speed vulnerability identification on the assets you scan. You can distribute Nessus scanners throughout the enterprise. Test an unlimited range of IP addresses, or if IP addresses are dynamic, use DNS or MAC addresses. Nessus also scans IPv6 addresses on all platforms.
Nessus Vulnerability Scanner
Nexpose Enterprise Edition is an award winning vulnerability scanner designed for organizations with large networks. This free 7-day trial unlocks all features of our Nexpose vulnerability scanner including discovery, detection, verification, risk classification, impact analysis, reporting and mitigation features.
Nexpose Product Features
hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping(8) unix command, but hping isn’t only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features
AutoScan-Network is a network scanner (discovering and managing application). No configuration is required to scan your network. The main goal is to print the list of connected equipments in your network.