VULNERABILITY SCANNERS HELP FIND HOSTS AND OTHER SYSTEMS WHICH ARE VULNERABLE TO KNOWN ATTACKS.
Most scanners (commercial or otherwise) are designed to be run on a daily, weekly, or monthly basis. It is up to the user to run the scan by hand or to schedule it to run at a preset time and date. The notion of real-time vulnerability scanning has recently begun to get addressed by IDS vendors like Sourcefire. Sourcefire employs Real-time Network Awareness (RNA) as a form of real-time vulnerability analysis
Find out if VULNERABILITIES is a good fit for your business
- Identifying Lack of Security Controls
- Passively Testing Security Controls
- Direct connectivity to Data Centres
- Identifying Vulnerabilities and Misconfigurations
- Vulnerability Scan as a Management Control
- Protocol analyzer
A2TELECOM vulnerability scanner can identify vulnerabilities, misconfigured systems, and the lack of security controls such as up-to-date patches. Vulnerability scans are passive and have little impact on a system during a test. In contrast, a penetration test is intrusive and can potentially compromise a system.