Vulnerability Scans

Internal and External Scans

The automated process of proactively identifying vulnerabilities of IT systems in a network to determine if and how a system can be exploited.

Vulnerability scanning employs software that seeks out operating system and application flaws based on a database of known issues, testing systems for these flaws and generating a report of the findings that an organization can use to improve security.

Internal Scan

Internal vulnerability scans occur within the network. The results are valuable as they represent an attacker’s view once they have breached external protection.

External Scan

External vulnerability scans simulate Internet attackers attempting to access a network. This can reveal a wide variety of potential flaws, such as cross-site scripting risks or unpatched servers. External scans see and report what an outsider can see.