As the digitization footprint gains momentum, a robust IT is the centerpiece of successful business models. This, however, comes with a cost. Today’s world expects the Business IT to be highly interconnected with the outside world (employees, customer, suppliers, government entities). As such, Business IT will be at the same time much more susceptible to rogue attacks if its security provisions are not sufficiently resilient. While outside assaults gain more and more sophistication, Business IT becomes increasingly vulnerable to malevolent intrusions.


This is where Vulnerability Management (VM) comes into play.


VM pursues the goal of identifying, classifying, prioritizing, remediating and mitigating1 software vulnerabilities in an effective and efficient manner. Even more important is the time factor (ref. Zero-Day), where for instance a targeted party is first informed about a previously unknown vulnerability in its software. In order to close known software loopholes quickly, it needs to have a defined mitigation process in place that accelerates the development and application of countermeasures in order to prevent potential damage.



1 Refer to Vulnerability Management (Wikipedia).


updated on: 5/9/2019 updated by: Wolfgang Stoettner  v1.0.1