Vulnerability Assessment 2.0: Improving Accuracy and Reducing Costs with Behavior Analysis

  • LANGUAGE: English DATE: Tuesday, September 01, 2015 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars

Vulnerability scanners and management tools have been an important part of every information security specialist’s arsenal for decades. Nowadays, with the continued erosion of corporate perimeters and overwhelming increase in advanced targeted attacks exploiting known and unknown vulnerabilities, they are more important than ever before. Learn more about the emerging new generation of vulnerability assessment tools, which focus on clear and concise actionable reports instead of raw detection logs, providing considerable time and cost savings for your security team.

Continued deperimeterization of corporate networks in modern “hyperconnected” enterprises and rapidly growing number of complex targeted attacks for purposes of hacking, industrial espionage or government surveillance have led to a sharp increase of the number of data breaches. New, much tighter breach disclosure regulations combined with strong backlash from public make these breaches particularly costly: financial, litigation and reputation losses have increased dramatically.

Even armed with the best traditional security tools, IT experts can no longer keep up with responding to the rapidly growing number of alerts; many organizations simply cannot afford employing a large enough information security team. Demand for better, more intelligent and highly automated tools is therefore growing – and security vendors are coming up with innovative solutions.

The ongoing trend within the information security industry is to migrate away from complex tools aimed at security experts, which tend to generate thousands of unnecessary, often false positive alerts, towards the new generation of solutions aimed at business personnel. These solutions must be able to deliver a small number of clear actionable items ranked by risk score, all accessible via a single centralized management console. Within the vulnerability assessment tools market, one of the key underlying technology enablers for this migration is behavior analysis. Although it requires a great deal more effort for a vendor to implement, it can provide dramatic reduction of false positive alerts and enrich vulnerability reports with valuable actionable context information.

In this webinar you will learn about:

  • New challenges IT security experts must face to support their businesses;
  • The emerging new generation of vulnerability assessment tools;
  • How behavior analysis improves accuracy and reduces the costs for your security team.

In the first part of the webinar, Alexei Balaganski, Senior Analyst at KuppingerCole, will provide an overview of the new challenges IT security experts must face to support their agile connected businesses. He will talk about the role of proactive defense mechanisms like vulnerability assessment in the organization’s information security strategy.

In the second part of the webinar, Aviram Jenik, CEO at Beyond Security, will dive deeper into the details of the new vulnerability scanning technology based on behavior analysis. He will also talk about customer use cases that demonstrate the benefits of this new approach in real-world scenarios.

Platinum Sponsors


Alexei is an analyst with specific focus on cybersecurity. His deep technical understanding allows him to support customers even with complex architectural and security challenges. Previously he has served as KuppingerCole's CTO. After graduating with an MSc degree in Mathematics and...

Aviram Jenik is the co-founder and CEO of Beyond Security, a leading developer of automated security testing tools for networks and applications. He is also the co-founder of, one of the largest security portals and vulnerability databases. Mr. Jenik holds a computer science...

Platinum Sponsor

Beyond Security has established a worldwide reputation as a leading force in the field of security vulnerability testing. Beyond Security's solutions are essential components in the risk management program of many organizations.

Beyond Security's headquarters is located in Cupertino, California. Beyond Security's distributors and resellers can be found in North and South America, Europe, Asia, Africa, the Middle East and Australia

Among our customers are financial institutions, retail, hi-tech, ISPs, information security firms, cellular, telecom and e-commerce companies.

Watch now


Presentation, KuppingerCole

Presentation, Beyond Security

Webcast download

Popular Webcasts

Next Webinar


Solving Problems in Privileged Access Management with Automation

While businesses race ahead with digital transformation, security and identity management are often being left behind. The complexity of modern organizations of all sizes has undermined the traditional concepts of privileged access management (PAM) and privileged account usage. Help desks and IT security teams are often too busy and understaffed to be able to give PAM the attention it deserves.

Next Conference


European Identity & Cloud Conference 2020

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Next Seminar


KC Master Class - PAM for the 2020s

Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password management and automatic rotation, enforcement of the least privilege principle, vulnerability identification, risk management, central analysis, session management and monitoring, and efficient, comprehensive auditing. In four chapters, you will receive a multi-channel training including interactive online sessions, up-to-date research documents and an all-day workshop with final exam at the European Identity & Cloud Conference 2020 in Munich, Germany. Step-by-step KuppingerCole Analysts will turn you into a PAM Master that meets and exceeds privileged access management challenges of the 2020s!

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00