Vulnerability Assessment 2.0: Improving Accuracy and Reducing Costs with Behavior Analysis

  • LANGUAGE: English DATE: Tuesday, September 01, 2015 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars

Vulnerability scanners and management tools have been an important part of every information security specialist’s arsenal for decades. Nowadays, with the continued erosion of corporate perimeters and overwhelming increase in advanced targeted attacks exploiting known and unknown vulnerabilities, they are more important than ever before. Learn more about the emerging new generation of vulnerability assessment tools, which focus on clear and concise actionable reports instead of raw detection logs, providing considerable time and cost savings for your security team.

Continued deperimeterization of corporate networks in modern “hyperconnected” enterprises and rapidly growing number of complex targeted attacks for purposes of hacking, industrial espionage or government surveillance have led to a sharp increase of the number of data breaches. New, much tighter breach disclosure regulations combined with strong backlash from public make these breaches particularly costly: financial, litigation and reputation losses have increased dramatically.

Even armed with the best traditional security tools, IT experts can no longer keep up with responding to the rapidly growing number of alerts; many organizations simply cannot afford employing a large enough information security team. Demand for better, more intelligent and highly automated tools is therefore growing – and security vendors are coming up with innovative solutions.

The ongoing trend within the information security industry is to migrate away from complex tools aimed at security experts, which tend to generate thousands of unnecessary, often false positive alerts, towards the new generation of solutions aimed at business personnel. These solutions must be able to deliver a small number of clear actionable items ranked by risk score, all accessible via a single centralized management console. Within the vulnerability assessment tools market, one of the key underlying technology enablers for this migration is behavior analysis. Although it requires a great deal more effort for a vendor to implement, it can provide dramatic reduction of false positive alerts and enrich vulnerability reports with valuable actionable context information.

In this webinar you will learn about:

  • New challenges IT security experts must face to support their businesses;
  • The emerging new generation of vulnerability assessment tools;
  • How behavior analysis improves accuracy and reduces the costs for your security team.

In the first part of the webinar, Alexei Balaganski, Senior Analyst at KuppingerCole, will provide an overview of the new challenges IT security experts must face to support their agile connected businesses. He will talk about the role of proactive defense mechanisms like vulnerability assessment in the organization’s information security strategy.

In the second part of the webinar, Aviram Jenik, CEO at Beyond Security, will dive deeper into the details of the new vulnerability scanning technology based on behavior analysis. He will also talk about customer use cases that demonstrate the benefits of this new approach in real-world scenarios.


Alexei is an analyst with specific focus on cybersecurity. His deep technical understanding allows him to support customers even with complex architectural and security challenges. Previously he has served as KuppingerCole's CTO. After graduating with an MSc degree in Mathematics and...

Aviram Jenik is the co-founder and CEO of Beyond Security, a leading developer of automated security testing tools for networks and applications. He is also the co-founder of, one of the largest security portals and vulnerability databases. Mr. Jenik holds a computer science...

Platinum Sponsor

Beyond Security has established a worldwide reputation as a leading force in the field of security vulnerability testing. Beyond Security's solutions are essential components in the risk management program of many organizations.

Beyond Security's headquarters is located in Cupertino, California. Beyond Security's distributors and resellers can be found in North and South America, Europe, Asia, Africa, the Middle East and Australia

Among our customers are financial institutions, retail, hi-tech, ISPs, information security firms, cellular, telecom and e-commerce companies.

Watch now


Trending Videos

Next Webinar


Managing Cyber Risk in a Hybrid Multi-Cloud IT Environment

Today’s IT environments blend applications and services from multiple public cloud networks, private clouds and on-prem networks, making it difficult to view and inventory assets deployed across complex hybrid networks, and keep track of the security risks. Organizations need to find a way to improve visibility, identify and prioritize risks, and maintain cyber resiliency.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00