Every Solution You Can Imagine – and More
What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need
Optiv works with more than 400 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv
Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner.
However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Observations on Smoke Tests – Part 2
In my last blog post, I talked about the value of performing application smoke testing and some of the shortcomings to be aware of. In this post, I want to offer a brief comparison between the two main types of smoke test scanners: cloud-based and desktop-based.
There are a variety of scanning tools in the market today, from commercial to open source. Some are intended only for identifying a particular vulnerability or class of vulnerabilities, such as weak encryption settings for SSL/TLS. Other scanners are designed for comprehensive, deep-dive web application assessments or for ongoing application vulnerability management. Most commercial application scanners can be divided into two categories according to the environment from which they execute: cloud-based and desktop-based. Both have pros and cons.
Figure 1: Dashboard of one cloud-based scanner
In this blog post I gave a brief overview of the pros and cons of performing web application scans from desktop vs. cloud environments, in addition to some of the factors to consider when choosing between these platforms. There are plenty of tools and features to select from, but in the end your choice should align with your overall desired results.
September 20, 2017
Learn how our experts formulate an actionable strategy with key stakeholders and help implement your cloud security program across the enterprise.
Let us know what you need, and we will have an Optiv professional contact you shortly.