Vulnerability Management Solution (VMS)

UBC is committed to safeguarding its digital ecosystem and ensuring the utmost protection for its students, faculty, and staff. To achieve this goal, we are thrilled to introduce our comprehensive Vulnerability Management Solution (VMS) for servers. 

The primary goal of the service is to reduce the overall risk to UBC’s information technology infrastructure by addressing potential weaknesses that could be exploited by malicious actors. Vulnerabilities can include software bugs, misconfigurations, security holes, and other weaknesses that may be targeted by attackers.  The VMS helps to identify, evaluate, and prioritize actionable security vulnerabilities in UBC servers. Once identified, the VMS provides detailed guidance on how to fix security vulnerabilities. It also validates their work by providing feedback to IT Administrators confirming they have successfully fixed their vulnerabilities.  Various vulnerability workflows like reporting false positives and mitigations are also a major feature of the service. 
 

Features and Benefits

Feature 

Benefits 

Comprehensive Scanning 

Using state-of-the-art scanning tools and methodologies we proactively identify vulnerabilities in UBC servers.  We are always on the lookout for security gaps that might expose sensitive data to risk. 

Risk Prioritization 

Not all vulnerabilities are created equal. Our program utilizes a rigorous risk assessment process that factors in severity, threat intelligence, potential impact, and asset value to prioritize identified vulnerabilities. By focusing on the most critical vulnerabilities first, we maximize the effectiveness of our remediation efforts. 

Continuous Monitoring 

Cybersecurity is an ongoing battle. The VMS doesn't stop at initial scans and remediation. We understand that new vulnerabilities can emerge at any time. That's why we maintain continuous monitoring to detect and respond to emerging threats and evolving security challenges. 

Vulnerability Data Aggregation 

Aggregating different sources of vulnerability data into one.  

Vulnerability Management Workflows 

Supports multiple vulnerability management workflows like reporting false positives and mitigations.  

 

Requirements and Eligibility

Audience

IT Administrators (IT Technical Representatives) across the university.

Price

No cost

Learn More

Getting Started: 

Participating in our program is a click away. Submit a request to add your UBC business unit to our waitlist. 
Submit Request 

Further Information: 

FAQs

Page last updated on March 11, 2026


UBC Crest The official logo of the University of British Columbia. Urgent Message An exclamation mark in a speech bubble. Bluesky The logo for the Bluesky social media service. Bookmark A bookmark in a book. Browser A web browser window. Caret An arrowhead indicating direction. Arrow An arrow indicating direction. Arrow in Circle An arrow indicating direction. Arrow in Circle An arrow indicating direction. Time A clock. Chats Two speech clouds. E-commerce Cart A shopping cart. Facebook The logo for the Facebook social media service. Help A question mark in a circle. Home A house in silhouette. Information The letter 'i' in a circle. Instagram The logo for the Instagram social media service. Linkedin The logo for the LinkedIn social media service. Location Pin A map location pin. Mail An envelope. Menu Three horizontal lines indicating a menu. Minus A minus sign. Pencil A pencil indicating that this is editable. Telephone An antique telephone. Play A media play button. Plus A plus symbol indicating more or the ability to add. Search A magnifying glass. Settings A single gear. Arrow indicating share action A directional arrow. Speech Bubble A speech bubble. Star An outline of a star. Twitter / X The logo for the X (aka, Twitter) social media service. User A silhouette of a person. Vimeo The logo for the Vimeo video sharing service. Youtube The logo for the YouTube video sharing service.