3.Vulnerability Scanning
3.Vulnerability Scanning
Validate security measures and controls—after putting new controls in place, teams
often run another scan. This scan confirms if the identified vulnerabilities are fixed. It
also confirms that the remediation efforts didn't introduce any new problems.
Between cloud and on-premises apps, mobile and IoT devices, laptops and
other traditional endpoints, modern enterprise networks contain too many
assets for manual vulnerability scans. Instead, security teams use
vulnerability scanners to conduct automated scans on a recurring basis.
•
6. Vulnerability scanning versus penetration testing
Vulnerability scanning and penetration testing are distinct but related
forms of network security testing. While they have different functions,
many security teams use them to complement one another.
Vulnerability scans are cheaper and Penetration tests require more resources but
easier to run, so security teams use can help security teams better understand
them to keep tabs on a system. their network flaws.