Vulnerability management services (VMSs) have arisen from the pragmatic need to make existing security technologies work together to mitigate today’s network securicyty vulnerabilities while the security product vendors develop new technologies. Enterprise security teams are overwhelmed with the volume of information from intrusion detection systems (IDSs) and patch notifications from vendors. Security officers are befuddled: They must implement process improvements to raise the security profile of their network, but they also must manage a lean operating budget that precludes them from sending in security experts to rectify the problem. There are significant challenges in identifying vulnerabilities in their network infrastructure and in tuning network security products for optimal efficiency and protection.Security teams that once reacted to security incidents now are proactively addressing network security through the life cycle of vulnerability intelligence all the way to confirmation of a deployed correction. Managed security service providers are evolving service product lines from managing security technology, such as managed firewall and managed IDS services, to the higher value service of managing the process across technologies to secure the extended enterprise. Vulnerability management services are one of the few areas in the network security industry where best-of-breed marketing does not rule. Enterprises will consolidate managed services with a single preferred vendor to capture enterprise experience, simplify escalation procedures across multiple security products and streamline contract negotiations. Smaller VMS organizations will be forced to extend expert services to new areas of a security policy, such as identity management services, remote connectivity assessment services and wireless security services. The Yankee Group believes VMS vendors will consolidate throughout 2004, driven by the shortage of skilled security professionals. Companies with core technology strengths, such as Foundstone, Qualys, Securify and TruSecure, will be targeted by the likes of Cisco, ISS, Symantec and VeriSign. VMS vendors with state-of-the-art security operations centers will be forced to merge in an attempt to reach critical mass to sustain the business. Counterpane, Guardent, NetSec, Solutionary and Ubizen are likely candidates for mergers.Enterprise Recommendations The Yankee Group recommends VMSs for enterprises that would incur financial risk if their network or key business applications were to become unavailable due to a misconfiguration or cyber attack. VMSs are an excellent way to gain the security expertise of professionals that would be prohibitively expensive to hire as full-time staff.Use VMSs to track the performance of security policy and implementation teams. Continual applications of VMSs should show a decline in the number of vulnerabilities discovered. The VMS finds vulnerabilities, IT corrects the problem and the VMS can determine if the problem is fixed. Proper use of VMSs should show a decline in the rate of discovered vulnerabilities in the network. Distribute assessments reports to add visibility to corporate security efforts and heighten the awareness of security to organizations outside of IT.Know your VMS team. The most important element of the business relationship is the VMS people assigned to the enterprise account. These are the experts who will learn the enterprise applications, policies and procedures to keep the VMS tuned to customer needs. In some cases, the individuals that the enterprise meets from the VMS firm may not be the same individuals performing the work. The Yankee Group recommends that enterprises meet and approve the team members before committing to contract terms.Transfer knowledge from the VMS team to enterprise IT staff. The security and IT staff are responsible for securing network resources. The Yankee Group recommends the enterprise institute a program where the IT staff learns from the best practices of the VMS firm. Rotating assessments between VMS vendors also provides a diverse view of best practices and approach to security. Security products will someday improve enough for VMS functionality to be brought in-house. Related content news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says that alternative approaches should be used to mitigate risk to personal information By Michael Hill Sep 29, 2023 3 mins Government Government Government feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry news UK data regulator warns that data breaches put abuse victims’ lives at risk The UK Information Commissioner’s Office has reprimanded seven organizations in the past 14 months for data breaches affecting victims of domestic abuse. By Michael Hill Sep 28, 2023 3 mins Electronic Health Records Data Breach Government Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe