Mercury uses the This vulnerability management method. This step will allow you to identify the vulnerabilities and manage them. A payment method is one example. To ensure the customers’ credit Card information is protected, the company can adopt the Payment card Industry Data Security Standard (PCI-DSS). The assets include computers, web servers and network devices. Establish an organisation-wide scanning frequency. This should be done on a quarterly basis. This conforms to ISO27001, which suggests that scanning be done on a quarterly basis. Configuring the tools required to exploit vulnerabilities in accordance with your needs is the third stage. Qualys Vulnerability Management and Skybox are some of Mercury USA’s favorite scanning tools. Next, run the scan. The final stage is to produce a report, which will aid in fixing vulnerabilities. You will need both manual and automated reports. You can make a manual report more visually appealing and understandable by formatting it. The format will make the report easier for executives to understand, and more accessible to CEOs. This is the final stage in the VM process. It ensures that any new vulnerabilities are addressed.