What are vulnerability scanners and how do they work? – Digitalmunition

Featured scanning_for_vulnerabilities_by_wavebreakmedia_ltd_gettyimages-482251625_2400x1600-100836278-large.3x2.jpg

Published on April 10th, 2020 📆 | 2121 Views ⚑


What are vulnerability scanners and how do they work?

Vulnerability scanner definition

Vulnerability scanners are automated tools that allow organizations to check if their networks, systems and applications have security weaknesses that could expose them to attacks. Vulnerability scanning is a common practice across enterprise networks and is often mandated by industry standards and government regulations to improve the organization’s security posture.

There are many tools and products in the vulnerability scanning space that cover different types of assets and offer additional features that help companies implement a complete vulnerability management program — the combined processes related to identifying, classifying and mitigating vulnerabilities.

External and internal vulnerability scans

Vulnerability scans can be performed from outside or inside the network or the network segment that’s being evaluated. Organizations can run external scans from outside their network perimeter to determine the exposure to attacks of servers and applications that are accessible directly from the internet. Meanwhile, internal vulnerability scans aim to identify flaws that hackers could exploit to move laterally to different systems and servers if they gain access to the local network.

Source link

Tagged with:

Leave a Reply

Your email address will not be published. Required fields are marked *