Vulnerability assessment: key to protecting applications and infrastructure
Dynatrace
OCTOBER 13, 2021
Examples of such weaknesses are errors in application code, misconfigured network devices, and overly permissive access controls in a database. Host analysis focuses on operating systems, virtual machines, and containers to understand if there are software components with known vulnerabilities that can be patched. Analyze findings.
Let's personalize your content