Can anyone make a claim regarding the effectiveness of IS 7.0 against a third-party vendor's scanning effort? How well does the Internet Scanner work at discovering the same, more, or less vulnerabilties that a third-party's scans? Would it be a valuable tool to deploy and use if attempting to "catch" vulnerabilities alternatively to if the scan is out-sourced?
Thanks Chris Ostermann Network Engineering [EMAIL PROTECTED] Fiserv EFT _______________________________________________ ISSForum mailing list [email protected] TO UNSUBSCRIBE OR CHANGE YOUR SUBSCRIPTION, go to https://atla-mm1.iss.net/mailman/listinfo/issforum To contact the ISSForum Moderator, send email to [EMAIL PROTECTED] The ISSForum mailing list is hosted and managed by Internet Security Systems, 6303 Barfield Road, Atlanta, Georgia, USA 30328.
