uses cookies to make interactions with the Company’s Websites easy and meaningful. When you visit one of the Company’s Websites,’s servers send a cookie to your computer. Standing alone, cookies do not personally identify you; they merely recognize your Web browser. Unless you choose to identify yourself to, either by responding to a promotional offer, opening an account, or filling out a Web form (such as a “Contact Us” or a “Free Trial” Web form), you remain anonymous to the Company. Please go to our privacy statement for details.


SANS Critical Control 8 and 9: Data Recovery Capability & Security Skill Assessment

On this blog post of the SANS Critical Control series I comment on two critical controls that at the first glance might not seem to fit Unified VRM’s capabilities. But think again….

SANS Critical Control 8 refers to an organization’s data recovery capability, the availability component of security that might come into play after a security breach happened and the organization needs to restore its systems on their previous state.

Unified VRM deals with vulnerability management component of security and therefore it might at a first glance not be related to availability. However, Unified VRM might help with this task in two way:

  • Scan templates for the internal assessment module might be configured to find and report backup agents installed in the remote hosts. This is to make sure that the hosts containing key information are appropriately backed up when needed.
  • Scan templates for the internal assessment module might be configured to find and report critical and confidential information, including credit card numbers and social security numbers so that they are appropriately backed up periodically.

SANS Critical Control 9 refers to an organization’s on-going security training and security skill improvement. Security skill improvement is key in an organization that is serious at fighting the latest and greatest security threat as the attackers get more and more technically sophisticated.

Unified VRM helps this process by automating the most challenging part of vulnerability management: the vulnerability evaluating. Through its patent-pending artificial intelligence engine, Unified VRM augments the enterprise’s vulnerability management group skills automating an expert penetration tester evaluation criteria of discovered vulnerabilities. The automated expert engine analyzes each discovered vulnerability under four criteria:

  • Is the reported vulnerability a false positive?
  • Is the reported vulnerability really exploitable?
  • Is the vulnerability reported with the correct risk?
  • Is the vulnerability reported really a vulnerability or another piece of information posing no critical risk to the organization?

The expert engine evaluates vulnerabilities based on domains corresponding to each of Unified VRM modules: external, internal, wireless and web application so that the knowledge base can also be tailored to that domain specific risks.

The expert engine also compares the reported vulnerabilities with industry vertical averages to offer the organization a comparative analysis in terms of industry vulnerability management statistics.

Schedule a Product Demo Today!

See how NopSec's security insights and cyber threat exposure management platform can organize your security chaos.