So, are the days of Network port scanners behind us? or do organizations still use these tools as part of a proactive/preventative service? I can certainly see when you could use a network port scanner to validate that a machine that is behaving suspiciously is listening on ports that is shouldn't, but wouldn't proper log monitoring, SIM/SIEM, and end point/HIDS systems catch that before it would ever be detected via a network based scan?
From a compliance perspective I can see the need to assess the configuration of key systems, but again there are probably better ways to do this (again using endpoint protection, integrity/configuration management tools, and compliance type tools) than what you can accomplish with a network based scanner.
Thoughts?
From a compliance perspective I can see the need to assess the configuration of key systems, but again there are probably better ways to do this (again using endpoint protection, integrity/configuration management tools, and compliance type tools) than what you can accomplish with a network based scanner.
Thoughts?
Comments