A system and associated method/computer program product are provided
including an intrusion detection tool for determining whether network
communications violate at least one of a plurality of policies. Such
policies are defined to detect potential attacks in the network
communications. Further included is a vulnerability assessment scanning
tool coupled to the intrusion detection tool. The vulnerability
assessment scanning tool is adapted for performing a vulnerability
assessment scan for identifying vulnerabilities.