Remove Penetration Testing Remove Policy Compliance Remove Wireless
article thumbnail

What is Vulnerability Scanning & How Does It Work?

eSecurity Planet

Despite their differences, both vulnerability scans and penetration tests are part of the wider vulnerability management framework or process. App-based scans These scans are used when companies need to understand the flaws of specific endpoints — for example, a web-facing server, IoT devices or wireless networks.