Role Availability | Read-Only | Investigator | Analyst | Manager |
USM Anywhere delivers vulnerability assessment Vulnerability assessment uses active network vulnerability scanning and continuous vulnerability monitoring to provide one of the five essential capabilities. as part of a complete package of security monitoring Process of collecting all device status and event information and processing normalized events for evidence of vulnerabilities, possible attacks, and other malicious activity. and management capabilities for efficient threat detection. USM Anywhere does this to improve security in your network, you first need to know what is vulnerable.
This topic discusses these subtopics: