Skip navigation

SecOps Response Service

5 Posts authored by: Dave Wicinas Employee
Share:|

Two new videos demonstrate how to use BMC SecOps Response to remediate vulnerabilities detected in your server environment. The videos are attached to corresponding walkthrough topics. See:

 

Let us know if you find these topics helpful by rating or commenting on this blog post.

Share:|

To use BMC SecOps Response, you must set up on-premise connectors for related products. Here's a new walkthrough and an accompanying video that demonstrates how to onboard a connector for BSA: Walkthrough: Onboarding a connector for BSA - BMC SecOps Response Service

Let us know if you find this topic helpful by rating or commenting on this blog post.

 

Share:|

When vulnerability scans fail to detect a server, that's a blind spot. And blind spots are potential security risks.

A new walkthrough and its accompanying video describe how to use BMC Discovery and BMC SecOps Response to identify blind spots across your computing environment.

See Walkthrough: Using BMC Discovery to detect blind spots and filter for applications.

Let us know if you find this topic helpful by rating or commenting on this blog post.

Share:|

Are you wondering if BMC SecOps Response can help you manage vulnerabilities in a network environment?

We've published some some topics that walk you through the process of using BMC SecOps Response to remediate vulnerabilities detected in a network environment.

One topic describes how to map assets and vulnerabilities in a vulnerability scan to network devices and rules you manage with BNA. The other topic takes you through the process of creating a remediation job to correct vulnerabilities.

 

 

Let us know if you find these topics helpful by rating or commenting on this blog post.

Share:|

Are you just getting familiar with BMC SecOps Response and wondering how the process works?

 

We published some topics that walk you through the process. One topic describes how to map assets and vulnerabilities detected in a vulnerability scan to the servers and remediation content you manage with BSA or SCCM. The other topics take you through the process of creating remediation jobs to correct vulnerabilities.

 

Take a look at these topics:

 

 

Let us know if you find this topic helpful by rating or commenting on this blog post.