Remove Authentication Remove Policy Compliance Remove Wireless
article thumbnail

What is Vulnerability Scanning & How Does It Work?

eSecurity Planet

App-based scans These scans are used when companies need to understand the flaws of specific endpoints — for example, a web-facing server, IoT devices or wireless networks. Authenticated and unauthenticated scans Vulnerability tools can run unauthenticated scans where only the open services available on the network are evaluated.