What is Risk-Based Vulnerability Management?

 

How does RBVM differ from vulnerability prioritization? The introduction of business context for easier remediation.

  • Prioritize issues that should be addressed first in order to make the best use of limited resources..
  • Address lingering exposures that could impact critical business services, applications, and data stores.
  • Bridge the visibility gap and discrepancies that exist between vulnerability assessment and patch management.
  • Track reduction in risk over time and validate the most important issues are being addressed first.
  • Deliver a complete view of their environment – all assets, vulnerabilities and exposures.
  • Eliminate manual processes and unnecessary spreadsheet work.
NorthStar RBVM