top of page

Network Security Testing

A vulnerability scanner assesses computers, computer systems, networks or applications for weaknesses. Vulnerability scanners can help to automate security auditing by scanning the network for security risks and producing a prioritized list to address vulnerabilities.

A vulnerability scanner looks for the following types of vulnerabilities:

  • Use of default passwords or common passwords

  • Missing patches

  • Open ports

  • Misconfigurations in operating systems and software

  • Active IP addresses, including any unexpected devices connected

 

Vulnerability scanning is key to identifying vulnerabilities, misconfigurations and a lack of security controls for organizations with networks that include segments, routers, firewalls, servers and other devices.

Commonly used vulnerability scanners on the market include Nessus, Retina, Core Impact and GFI LanGuard.

Their functions include:

  • Performing compliance auditing

  • Providing patches and update

  • Identifying misconfiguration

  • Supporting mobile and wireless devices

  • Tracking malware

  • Identifying sensitive data

 

 

When evaluating a vulnerability scanner, look at how it is rated for accuracy, reliability, scalability and reporting. You can choose a software-based or cloud-based vulnerability scanner.

bottom of page