Frequently Asked Questions

The importance of vulnerability management in information security

Q1. My company already using firewall, why do we need vulnerability management to reinforce security?

Q2. How important is vulnerability management in information security?

Q3. How to evaluate network vulnerability scanners?

DVM Positioning on the market

Q1. What is DVM's difference from IDS?

Q2. Is DVM able to scan internet hosts across different domains?

Q3. Does DVM support wireless network scans?

Q4. Does DVM work together with other security products?

Q5. What is so unique about DVM?

Q6. What operating systems support DVM? What operating systems and networking equipments does DVM scan?


Q1. How many versions are there in DVM? Are there any restriction in use?

Q2. How is DVM deployed in company network?

Q3. How does DVM operate and how does the scan flow?

Q4. What do I do to complete the assessment after the vulnerability scan is finished?

Q5. What do the icons in front of scan target mean when the scan is taking place?

Q6. Are there built-in account list and password list in DVM?

Q7. Can I deploy several sets of DVM on various domain segments in company network?

Q8. What if I want to change the default Oracle port 1521 to port 1538 under vulnerability scanning?

Q9. During DVM scan, the McAfee anti-virus detects trojan in RPCExpolit.dll, what happened?

Q10. Do you have detail explanation on running password stress test on localhost? How much information can be obtained for localhost and NetBIOS password test? What are the restrictions for HTTP and FTP types?