{"id":778,"date":"2021-04-16T13:13:48","date_gmt":"2021-04-16T13:13:48","guid":{"rendered":"http:\/\/172.105.17.27\/?p=778"},"modified":"2023-10-05T13:29:48","modified_gmt":"2023-10-05T13:29:48","slug":"network-monitoring-tools-to-prevent-software-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.blesk.ca\/fr\/2021\/04\/16\/network-monitoring-tools-to-prevent-software-vulnerabilities\/","title":{"rendered":"Network monitoring tools to prevent software vulnerabilities"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1310.4px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1 fusion-text-no-margin\" style=\"--awb-font-size:19px;--awb-line-height:1.8em;--awb-margin-bottom:50px;\"><p>As businesses move further into the world of agile development, they are increasingly creating their own applications. These applications can present a host of vulnerabilities that, if not addressed, could bring down the company. Commercial applications including ERP or CRM systems, databases, office productivity suites, or billing software can act as a host of vulnerabilities. While it\u2019s comforting to think that these proven vendors are laser-focused on preventing software vulnerabilities, vulnerabilities occur nonetheless. In many cases, customers can pay the price.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:30px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;\">What Are Software Vulnerabilities?<\/h2><\/div><div class=\"fusion-text fusion-text-2 fusion-text-no-margin\" style=\"--awb-font-size:19px;--awb-line-height:1.8em;--awb-margin-bottom:50px;\"><p>At a high level, a software vulnerability is a flaw or weakness that can be exploited by bad actors. Those bad actors can use the vulnerability to gain access to an organization\u2019s sensitive data or perform unauthorized actions. No software is immune to vulnerabilities; the key is to find and remediate them as quickly as possible.<\/p>\n<p>The NVD database holds 8,051 vulnerabilities published in Q1 of 2022. This is about a 25 percent increase from the same period the year prior. If these numbers hold, this would mark a slight year-on-year increase since there were around 22,000 published in 2021.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:30px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;\">How Do Software Vulnerabilities Happen?<\/h2><\/div><div class=\"fusion-text fusion-text-3 fusion-text-no-margin\" style=\"--awb-font-size:19px;--awb-line-height:1.8em;--awb-margin-bottom:50px;\"><p>Precautionary security measures can help businesses prevent the intrusion of hackers into their systems that can leverage the existing security flaws of the applications.<\/p>\n<p>Some of these measures include:<\/p>\n<ul>\n<li>Assess existing and emerging vulnerabilities<\/li>\n<li>Run routing software vulnerability tests<\/li>\n<li>Implementation of a well configured firewall<\/li>\n<li>Establish a well functioning security monitoring system<\/li>\n<li>Monitor the performance of the network<\/li>\n<li>Closely analyze network traffic in the real time<\/li>\n<\/ul>\n<p>There are many applications in the market one can use to improve the security posture and prevent vulnerabilities in a network. However, the security monitoring process is cost and resource intensive and often unaffordable.<\/p>\n<p>bl\u00ebsk is a cost-effective and complete all in one network monitoring package that will help your organization monitor and prevent software vulnerabilities, which in turn help will help you prevent unauthorized intrusion into your network.<\/p>\n<p>bl\u00ebsk\u2019s Network Security Monitor (NSM) provides a way to continually identify potential vulnerabilities in systems and produces a detailed plan on how to remediate and remove those vulnerabilities from your critical business systems.<\/p>\n<p>The NSM function allows to automatic scan of a subnet of a network based on a custom schedule and it automatically reports the results to the administrator by email in different formats. The NSM module allows to define targets for vulnerability scans, which may be a single IP or range of IP addresses to execute NVT script towards the targeted system(s) to test for vulnerabilities and it allows to schedule of the frequency of running the test.<\/p>\n<\/div><div class=\"fusion-image-element awb-imageframe-style awb-imageframe-style-below awb-imageframe-style-1\" style=\"--awb-aspect-ratio:2 \/ 1;--awb-object-position:0% 45%;--awb-margin-bottom:70px;--awb-caption-title-font-family:var(--body_typography-font-family);--awb-caption-title-font-weight:var(--body_typography-font-weight);--awb-caption-title-font-style:var(--body_typography-font-style);--awb-caption-title-size:15px;--awb-caption-title-transform:var(--body_typography-text-transform);--awb-caption-title-line-height:var(--body_typography-line-height);--awb-caption-title-letter-spacing:var(--body_typography-letter-spacing);\"><span class=\"fusion-imageframe imageframe-none imageframe-1 hover-type-none has-aspect-ratio\"><img decoding=\"async\" width=\"1913\" height=\"628\" title=\"Screenshot-2021-12-15-122016\" src=\"https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2021-12-15-122016.png\" data-orig-src=\"https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2021-12-15-122016.png\" class=\"lazyload img-responsive wp-image-2518 img-with-aspect-ratio\" data-parent-fit=\"cover\" data-parent-container=\".fusion-image-element\" alt srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271913%27%20height%3D%27628%27%20viewBox%3D%270%200%201913%20628%27%3E%3Crect%20width%3D%271913%27%20height%3D%27628%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2021-12-15-122016-200x66.png 200w, https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2021-12-15-122016-400x131.png 400w, https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2021-12-15-122016-600x197.png 600w, https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2021-12-15-122016-800x263.png 800w, https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2021-12-15-122016-1200x394.png 1200w, https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2021-12-15-122016.png 1913w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 640px) 100vw, 1913px\" \/><\/span><div class=\"awb-imageframe-caption-container\"><div class=\"awb-imageframe-caption\"><div class=\"awb-imageframe-caption-title\">Figure 1: Vulnerability scanning<\/div><\/div><\/div><\/div><div class=\"fusion-text fusion-text-4 fusion-text-no-margin\" style=\"--awb-font-size:19px;--awb-line-height:1.8em;--awb-margin-bottom:50px;\"><p>The Network Security Monitor allows to create infinite custom dashboards for groups of devices for the ease of monitoring devices by device type.<\/p>\n<\/div><div class=\"fusion-image-element awb-imageframe-style awb-imageframe-style-below awb-imageframe-style-2\" style=\"--awb-aspect-ratio:2 \/ 1;--awb-object-position:100% 77%;--awb-margin-bottom:70px;--awb-caption-title-font-family:var(--body_typography-font-family);--awb-caption-title-font-weight:var(--body_typography-font-weight);--awb-caption-title-font-style:var(--body_typography-font-style);--awb-caption-title-size:15px;--awb-caption-title-transform:var(--body_typography-text-transform);--awb-caption-title-line-height:var(--body_typography-line-height);--awb-caption-title-letter-spacing:var(--body_typography-letter-spacing);\"><span class=\"fusion-imageframe imageframe-none imageframe-2 hover-type-none has-aspect-ratio\"><img decoding=\"async\" width=\"1912\" height=\"593\" title=\"Screenshot-2021-12-15-122205\" src=\"https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2021-12-15-122205.png\" data-orig-src=\"https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2021-12-15-122205.png\" class=\"lazyload img-responsive wp-image-2536 img-with-aspect-ratio\" data-parent-fit=\"cover\" data-parent-container=\".fusion-image-element\" alt srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271912%27%20height%3D%27593%27%20viewBox%3D%270%200%201912%20593%27%3E%3Crect%20width%3D%271912%27%20height%3D%27593%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2021-12-15-122205-200x62.png 200w, https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2021-12-15-122205-400x124.png 400w, https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2021-12-15-122205-600x186.png 600w, https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2021-12-15-122205-800x248.png 800w, https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2021-12-15-122205-1200x372.png 1200w, https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2021-12-15-122205.png 1912w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 640px) 100vw, 1912px\" \/><\/span><div class=\"awb-imageframe-caption-container\"><div class=\"awb-imageframe-caption\"><div class=\"awb-imageframe-caption-title\">Figure 2: Vulnerability classification<\/div><\/div><\/div><\/div><div class=\"fusion-text fusion-text-5 fusion-text-no-margin\" style=\"--awb-font-size:19px;--awb-line-height:1.8em;--awb-margin-bottom:50px;\"><p>Network Security Monitor (NSM) runs vulnerability tests using the updated vulnerabilities found in the Common Vulnerabilities and Exposures (CVE) reference database as well as CPEs, OVAL, and CERT.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:30px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;\">A managed service can be an option for overcoming the challenge of resource limitations<\/h2><\/div><div class=\"fusion-text fusion-text-6 fusion-text-no-margin\" style=\"--awb-font-size:19px;--awb-line-height:1.8em;--awb-margin-bottom:50px;\"><p>We understand that some organizations may don\u2019t have the inhouse capacity to facilitate many essential tasks; therefore, bl\u00ebsk offers managed services to the low resourced organizations to monitor their network services.<\/p>\n<p>Download a free trial of bl\u00ebsk at <a href=\"https:\/\/www.blesk.ca\/fr\/free-trial\/\">https:\/\/www.blesk.ca\/free-trial\/<\/a><\/p>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>As businesses move further into the world of agile development, they are increasingly creating their own applications. <\/p>","protected":false},"author":2,"featured_media":2525,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-778","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blesk-tech-talk"],"_links":{"self":[{"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/posts\/778","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/comments?post=778"}],"version-history":[{"count":13,"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/posts\/778\/revisions"}],"predecessor-version":[{"id":2718,"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/posts\/778\/revisions\/2718"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/media\/2525"}],"wp:attachment":[{"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/media?parent=778"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/categories?post=778"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/tags?post=778"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}