Penetration Testing mailing list archives

Re: Vulnerability Assessment


From: Danux <danuxx () gmail com>
Date: Mon, 23 Jul 2007 15:13:01 -0500

Well, Qualys Guard, is one of the most used for Leader Corporate Enterprises.

When you see a new vulnerability going out to public   (through
Microsoft, BugTrack, so on,)Qualys Guard Team discover it one week
ago.

And let me tell you something,  Historically, mcAfee is "only-good"
for viruses, but for threats discovery they are not the best solution.

You should check which kind of companies have McAffe FoundStone and
which have Qualys Guard( i work on one of the Financial World Leader
Company who used Qualys in all the WORLD!!!!) i think its a good
reference.

Hope this help.

On 7/23/07, Colin Grady <colin.grady () gmail com> wrote:
Uzair,

Have you looked at Critical Watch (http://www.criticalwatch.com/)?

Colin


On 6/4/07, Uzair Hashmi <uzair () kse com pk> wrote:
Hello list,

I have been evaluating an automated vulnerability assessment software, have found two of them better for the 
organizational needs. I need your help to select only one out of the two.

1- QualysGuard (http://www.qualys.com)
2- Foundstone Enterprise 
(http://www.mcafee.com/us/enterprise/products/vulnerability_management/foundstone_enterprise.html)

Please advice.

Regards,
Uzair


------------------------------------------------------------------------
This List Sponsored by: Cenzic

Are you using SPI, Watchfire or WhiteHat?
Consider getting clear vision with Cenzic
See HOW Now with our 20/20 program!

http://www.cenzic.com/c/2020
------------------------------------------------------------------------





-- 
Danux, CISSP
Chief Information Security Officer
Macula Security Consulting Group
www.macula-group.com

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------


Current thread: