Services
Managed IT
Solutions
Security
Partners
About Us

Vulnerability scanner

A vulnerability scanner is a software or hardware product designed to search for threats in a company’s infrastructure. The scanner is used to detect breaches in network security, operating systems, databases, applications, etc. Its main task is to assess information security, identify vulnerabilities, and provide reports.

With the help of a scanner, an administrator can find “holes” that hackers use to gain unauthorized access (UA) to confidential data on the company’s network. A vulnerability scanner can monitor running processes and services and scan the ports in use.

[text_with_btn btn=”Learn more” link=”https://itglobal.com/ru-ru/services/info-security/security-audit/”]Information security audit[/text_with_btn]

Key features

The software product has the following functions:

How the scanner works

The scanner’s operation is based on indirect signs of vulnerabilities. If the software analyzes application-level protocols or APIs, it determines their parameters and compares them with acceptable indicators set by the administrator. If it detects a discrepancy in values, the administrator will receive a notification of a potential vulnerability. After that, you need to check the potential threats found with some other tools.

What actions does a vulnerability scanner perform?

Scanners can be “friendly” or “aggressive.” The first type simply collects information and does not simulate an attack. The second type exploits vulnerabilities to cause software malfunctions.