<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic security audit softw in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/security-audit-softw/m-p/1863687#M937567</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So something along the lines of Nessus (Tenable)?&amp;nbsp; It's probably one of the most well-reknown vulnerability scanners out there.&amp;nbsp; You can even combine something like that with something like RedSeal to evaluate potential exposure and more.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following book may also prove valuable in terms of methodology and suggestions.&amp;nbsp; Chapter 4 in particular is centered around auditing tools and techniques:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.ciscopress.com/bookstore/product.asp?isbn=1587053527"&gt;http://www.ciscopress.com/bookstore/product.asp?isbn=1587053527&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 06 Dec 2011 02:00:28 GMT</pubDate>
    <dc:creator>Christopher.Hayre</dc:creator>
    <dc:date>2011-12-06T02:00:28Z</dc:date>
    <item>
      <title>security audit softw</title>
      <link>https://community.cisco.com/t5/network-security/security-audit-softw/m-p/1863684#M937563</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;Can somebody tell me wish are the 3 best security network audit software available in the market?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;attn&lt;/P&gt;&lt;P&gt;Carlos&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 12:30:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-audit-softw/m-p/1863684#M937563</guid>
      <dc:creator>juancarlosmartinez</dc:creator>
      <dc:date>2020-02-21T12:30:56Z</dc:date>
    </item>
    <item>
      <title>security audit softw</title>
      <link>https://community.cisco.com/t5/network-security/security-audit-softw/m-p/1863685#M937565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What are you trying to accomplish?&amp;nbsp; RedSeal is pretty fantastic...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best,&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Dec 2011 04:28:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-audit-softw/m-p/1863685#M937565</guid>
      <dc:creator>Christopher.Hayre</dc:creator>
      <dc:date>2011-12-02T04:28:43Z</dc:date>
    </item>
    <item>
      <title>security audit softw</title>
      <link>https://community.cisco.com/t5/network-security/security-audit-softw/m-p/1863686#M937566</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Christopher&lt;/P&gt;&lt;P&gt;im looking a soft for security holes on the servers and on the network itself...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cheers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Dec 2011 16:19:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-audit-softw/m-p/1863686#M937566</guid>
      <dc:creator>juancarlosmartinez</dc:creator>
      <dc:date>2011-12-02T16:19:21Z</dc:date>
    </item>
    <item>
      <title>security audit softw</title>
      <link>https://community.cisco.com/t5/network-security/security-audit-softw/m-p/1863687#M937567</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So something along the lines of Nessus (Tenable)?&amp;nbsp; It's probably one of the most well-reknown vulnerability scanners out there.&amp;nbsp; You can even combine something like that with something like RedSeal to evaluate potential exposure and more.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following book may also prove valuable in terms of methodology and suggestions.&amp;nbsp; Chapter 4 in particular is centered around auditing tools and techniques:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.ciscopress.com/bookstore/product.asp?isbn=1587053527"&gt;http://www.ciscopress.com/bookstore/product.asp?isbn=1587053527&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Dec 2011 02:00:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-audit-softw/m-p/1863687#M937567</guid>
      <dc:creator>Christopher.Hayre</dc:creator>
      <dc:date>2011-12-06T02:00:28Z</dc:date>
    </item>
  </channel>
</rss>

