home_banner `

Content Icon

De-Duplication and Vulnerability Management: A Tools Overview

October 11, 2018 | Ask-An-Expert | Application Development and Testing | By Shannon Lietz, IANS Faculty

What tools can help security and development work together to better manage software vulnerabilities? In this Ask-an-Expert written response, IANS Faculty Shannon Lietz details tools that meet several criteria, including easing de-duplication. 
IANS

 SUBSCRIPTION REQUIRED


Already a client?

Log In to Continue

Not a client?

Request More Information

Related Research

Container Tools for AWS: An Overview

The market for container tools - and container monitoring tools -- is growing fast. In this Ask-an-Expert written response, IANS Faculty George Gerchow provides an overview of the space and recommends going with tools like Docker and Kubernetes.

Establish Governance Over APIs and Containers

If approached the right way, the move to APIs, containers and DevOps can actually result in better alignment between development and security. In this Ask-an-Expert written response, IANS Faculty Justin Leapline says the key is to focus on ensuring secure configuration and development, solid change management and reliable monitoring/response processes. 

Poll: Using Open Source Software for Security

What is the industry stance on using open source software to provide security capabilities? In this Viewpoints report, IANS Faculty Josh More, Davi Ottenheimer, Mark Clancy and Kevin Beaver offer their recommendations.