What methodology does VISTA use to assess the vulnerabilities in a system?
VISTA is a continuous process designed to identify, track, and eliminate vulnerabilities before they are exploited. This process has four basic steps: Step 1: Discover – Dynamic identification of all perimeter devices Step 2: Analyze – Powerful scanning engine and up-to-date vulnerability database Step 3: Report – Concise, actionable reporting with trend analysis Step 4: Remedy – Links to methods for correcting vulnerabilities Return to the top of the page.