Remove Digital transformation Remove Policy Compliance Remove Wireless
article thumbnail

What is Vulnerability Scanning & How Does It Work?

eSecurity Planet

App-based scans These scans are used when companies need to understand the flaws of specific endpoints — for example, a web-facing server, IoT devices or wireless networks. Some SCM tools can scan devices and networks for vulnerabilities, track remediation actions, and generate reports on security policy compliance.