{"id":8039,"date":"2023-01-05T08:30:31","date_gmt":"2023-01-05T08:30:31","guid":{"rendered":"http:\/\/172.105.26.168\/?p=8039"},"modified":"2025-02-01T20:00:30","modified_gmt":"2025-02-01T20:00:30","slug":"network-monitoring-tools-to-prevent-software-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.prival.ca\/fr\/network-monitoring-tools-to-prevent-software-vulnerabilities\/","title":{"rendered":"Outils de surveillance du r\u00e9seau pour pr\u00e9venir les vuln\u00e9rabilit\u00e9s logicielles"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-margin-bottom-medium:40px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 1200px + 0px );margin-left: calc(-0px \/ 2 );margin-right: calc(-0px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>As businesses move further into the world of agile development, they are increasingly creating their own applications. These applications can present a host of vulnerabilities that, if not addressed, could bring down the company. Commercial applications including ERP or CRM systems, databases, office productivity suites, or billing software can act as a host of vulnerabilities. While it\u2019s comforting to think that these proven vendors are laser-focused on preventing software vulnerabilities, vulnerabilities occur nonetheless. In many cases, customers can pay the price.<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:1%;width:100%;\"><\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:2%;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:20px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:20;--minFontSize:20;line-height:1.5;\">What Are Software Vulnerabilities?<\/h2><\/div><div class=\"fusion-text fusion-text-2\"><p>At a high level, a software vulnerability is a flaw or weakness that can be exploited by bad actors. Those bad actors can use the vulnerability to gain access to an organization\u2019s sensitive data or perform unauthorized actions. No software is immune to vulnerabilities; the key is to find and remediate them as quickly as possible.<\/p>\n<p>The NVD database holds 8,051 vulnerabilities published in Q1 of 2022. This is about a 25 percent increase from the same period the year prior. If these numbers hold, this would mark a slight year-on-year increase since there were around 22,000 published in 2021.<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:1%;width:100%;\"><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:2%;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:20px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:20;--minFontSize:20;line-height:1.5;\">How Do Software Vulnerabilities Happen?<\/h2><\/div><div class=\"fusion-text fusion-text-3\"><p>There are many ways that vulnerabilities can get into software, some the fault of the software vendor and some the fault of the user.<\/p>\n<p>On the vendor side, introducing new features can lead to integration errors as well as general bugs and glitches, while upgrades can cause configuration errors along with permission and access vulnerabilities. Any of these errors can lead to security risks, from privilege escalation and security feature bypass to information disclosure, denial of service, spoofing, tampering, or remote code execution.<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:1%;width:100%;\"><\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:2%;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:20px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:20;--minFontSize:20;line-height:1.5;\">How Software Vulnerabilities can be prevented?<\/h2><\/div><div class=\"fusion-text fusion-text-4\"><p>Precautionary security measures can help businesses prevent the intrusion of hackers into their system that can leverage the existing security flaws of the applications.<\/p>\n<ul>\n<li>Some of these measures include:<\/li>\n<li>Assess existing and emerging vulnerabilities<\/li>\n<li>Run routing software vulnerability tests<\/li>\n<li>Implementation of a well configured firewall<\/li>\n<li>Establish a well functioning security monitoring system<\/li>\n<li>Monitor the performance of the network<\/li>\n<li>Closely analyze network traffic on the real time<\/li>\n<\/ul>\n<p>There are many applications in the market one can use to improve the security posture and prevent vulnerabilities in a network. However, the security monitoring process is cost and resource intensive and often unaffordable.<\/p>\n<p>bl\u00ebsk is a cost-effective and complete all in one network monitoring package that will help your organization monitor and prevent software vulnerabilities, which in turn help will help you prevent unauthorized intrusion to your network.<\/p>\n<p>bl\u00ebsk\u2019s Network Security Monitor (NSM) provides a way to continually identify potential vulnerabilities on systems and produces a detailed plan on how to remediate and remove those vulnerabilities from your critical business systems.<\/p>\n<p>The NSM function, allows to automatically scan a subnet of a network based on a custom schedule and it automatically reports the results to the administrator by email in different formats. The NSM module allows to define targets for vulnerability scans, which may be a single IP or range of IP addresses to execute NVT script towards targeted system(s) to test for vulnerabilities and it allows to schedule the frequency of running the test.\u00a0<img decoding=\"async\" class=\"lazyload alignnone size-full wp-image-8041\" src=\"https:\/\/www.prival.ca\/wp-content\/uploads\/2023\/01\/Screenshot-2021-12-15-122016.png\" data-orig-src=\"https:\/\/www.prival.ca\/wp-content\/uploads\/2023\/01\/Screenshot-2021-12-15-122016.png\" alt=\"\" width=\"1913\" height=\"628\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271913%27%20height%3D%27628%27%20viewBox%3D%270%200%201913%20628%27%3E%3Crect%20width%3D%271913%27%20height%3D%27628%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.prival.ca\/wp-content\/uploads\/2023\/01\/Screenshot-2021-12-15-122016-18x6.png 18w, https:\/\/www.prival.ca\/wp-content\/uploads\/2023\/01\/Screenshot-2021-12-15-122016-200x66.png 200w, https:\/\/www.prival.ca\/wp-content\/uploads\/2023\/01\/Screenshot-2021-12-15-122016-300x98.png 300w, https:\/\/www.prival.ca\/wp-content\/uploads\/2023\/01\/Screenshot-2021-12-15-122016-400x131.png 400w, https:\/\/www.prival.ca\/wp-content\/uploads\/2023\/01\/Screenshot-2021-12-15-122016-600x197.png 600w, https:\/\/www.prival.ca\/wp-content\/uploads\/2023\/01\/Screenshot-2021-12-15-122016-768x252.png 768w, https:\/\/www.prival.ca\/wp-content\/uploads\/2023\/01\/Screenshot-2021-12-15-122016-800x263.png 800w, https:\/\/www.prival.ca\/wp-content\/uploads\/2023\/01\/Screenshot-2021-12-15-122016-1024x336.png 1024w, https:\/\/www.prival.ca\/wp-content\/uploads\/2023\/01\/Screenshot-2021-12-15-122016-1200x394.png 1200w, https:\/\/www.prival.ca\/wp-content\/uploads\/2023\/01\/Screenshot-2021-12-15-122016-1536x504.png 1536w, https:\/\/www.prival.ca\/wp-content\/uploads\/2023\/01\/Screenshot-2021-12-15-122016.png 1913w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1913px) 100vw, 1913px\" \/><br \/>\n<em>Figure 1: Vulnerability scanning<\/em><\/p>\n<p>The Network Security Monitor allows to create infinite custom dashboards for groups of devices for the ease of monitoring devices by device type.<\/p>\n<p><img decoding=\"async\" class=\"lazyload alignnone size-full wp-image-8040\" src=\"https:\/\/www.prival.ca\/wp-content\/uploads\/2023\/01\/Screenshot-2021-12-15-122205.png\" data-orig-src=\"https:\/\/www.prival.ca\/wp-content\/uploads\/2023\/01\/Screenshot-2021-12-15-122205.png\" alt=\"\" width=\"1912\" height=\"593\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271912%27%20height%3D%27593%27%20viewBox%3D%270%200%201912%20593%27%3E%3Crect%20width%3D%271912%27%20height%3D%27593%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.prival.ca\/wp-content\/uploads\/2023\/01\/Screenshot-2021-12-15-122205-18x6.png 18w, https:\/\/www.prival.ca\/wp-content\/uploads\/2023\/01\/Screenshot-2021-12-15-122205-200x62.png 200w, https:\/\/www.prival.ca\/wp-content\/uploads\/2023\/01\/Screenshot-2021-12-15-122205-300x93.png 300w, https:\/\/www.prival.ca\/wp-content\/uploads\/2023\/01\/Screenshot-2021-12-15-122205-400x124.png 400w, https:\/\/www.prival.ca\/wp-content\/uploads\/2023\/01\/Screenshot-2021-12-15-122205-600x186.png 600w, https:\/\/www.prival.ca\/wp-content\/uploads\/2023\/01\/Screenshot-2021-12-15-122205-768x238.png 768w, https:\/\/www.prival.ca\/wp-content\/uploads\/2023\/01\/Screenshot-2021-12-15-122205-800x248.png 800w, https:\/\/www.prival.ca\/wp-content\/uploads\/2023\/01\/Screenshot-2021-12-15-122205-1024x318.png 1024w, https:\/\/www.prival.ca\/wp-content\/uploads\/2023\/01\/Screenshot-2021-12-15-122205-1200x372.png 1200w, https:\/\/www.prival.ca\/wp-content\/uploads\/2023\/01\/Screenshot-2021-12-15-122205-1536x476.png 1536w, https:\/\/www.prival.ca\/wp-content\/uploads\/2023\/01\/Screenshot-2021-12-15-122205.png 1912w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1912px) 100vw, 1912px\" \/><br \/>\n<em>Figure 2: Vulnerability classification<\/em><\/p>\n<p>Network Security Monitor (NSM) runs vulnerability tests using the updated vulnerabilities found in the Common Vulnerabilities and Exposures (CVE) reference database as well as CPEs, OVAL, and CERT.<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:1%;width:100%;\"><\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:2%;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:20px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:20;--minFontSize:20;line-height:1.5;\">A managed service can be an option for to overcome the challenge of resource limitations<\/h2><\/div><div class=\"fusion-text fusion-text-5\"><p>We understand that some organization may don\u2019t have inhouse capacity to facilitate many essential tasks; therefore, bl\u00ebsk offers <span style=\"color: #000000;\"><a style=\"color: #000000; text-decoration: underline;\" href=\"https:\/\/www.prival.ca\/fr\/managed-services\/\">managed services<\/a><\/span> to the low resourced organizations to monitor their network services.<\/p>\n<p>Download a free trial of bl\u00ebsk on <a href=\"https:\/\/www.blesk.ca\/essai-gratuit\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.blesk.ca\/essai-gratuit\/<\/a><\/p>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Precautionary security measures can help businesses prevent the intrusion of hackers into their system that can leverage the existing security flaws of the applications.<\/p>","protected":false},"author":2,"featured_media":7403,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[57],"tags":[],"class_list":["post-8039","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-updates"],"_links":{"self":[{"href":"https:\/\/www.prival.ca\/fr\/wp-json\/wp\/v2\/posts\/8039","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.prival.ca\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.prival.ca\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.prival.ca\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.prival.ca\/fr\/wp-json\/wp\/v2\/comments?post=8039"}],"version-history":[{"count":2,"href":"https:\/\/www.prival.ca\/fr\/wp-json\/wp\/v2\/posts\/8039\/revisions"}],"predecessor-version":[{"id":9973,"href":"https:\/\/www.prival.ca\/fr\/wp-json\/wp\/v2\/posts\/8039\/revisions\/9973"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.prival.ca\/fr\/wp-json\/wp\/v2\/media\/7403"}],"wp:attachment":[{"href":"https:\/\/www.prival.ca\/fr\/wp-json\/wp\/v2\/media?parent=8039"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.prival.ca\/fr\/wp-json\/wp\/v2\/categories?post=8039"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.prival.ca\/fr\/wp-json\/wp\/v2\/tags?post=8039"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}