If I see too many vulnerabilities, won't I get lost in a pile of information to manage?
It's obvious that discovering issues that you previously had no visibility into can be scary. A good practice is to focus on the devices with the most critical risks and iterate..
Moreover your alerts and escalations can be set up and only sent to your IT manager (even external). Finally, know that you can also configure the recurrence of receiving audit reports so as not to overload your mailbox. But still take the time to read them and make the recommended corrections otherwise indeed our analysis will not be of much interest.
Other questions on the same theme :
- What are the issues that lead to a preventive solution?
- If I have a vulnerability on my network, is it up to you to fix it?
- If I am attacked tomorrow, what happens?
- Where are the cases made? Do you have a label?
- Why do I have to keep paying for a subscription if I have just had all the vulnerabilities in my network fixed?
- Your solution seems very interesting, why has no one proposed it so far?
- What does Sherlock do vs. other Nessus-type audit tools?