• contato@mtrcybersec.com.br
  • +55 (62) 99651-9273
  • Mon-Fri: 8:00 - 18:00

Home / Services

Vulnerability Scanning

Vulnerability Scanning

Vulnerability Scanning is an automated test where software known as vulnerability scanners are used to look for systems, networks, and applications security vulnerabilities. These scanners use a database with known vulnerabilities to compare with the target that is being audited. The three most common vulnerability scanners are the network vulnerability scanner, web application vulnerability scanner and open-source vulnerability scanners.

Vulnerability Scanning vs Penetration Testing

Vulnerability Scanning is often confused with Penetration Testing, however, there are some important differences between the two.

  • The Vulnerability Scan testing is automated and only detects potential security vulnerabilities, while a Penetration Test is a meticulous test performed mostly manually by a cyber security expert who audits the complexities of a network, system and application to exploit vulnerabilities.
  • Vulnerability Scan testing only identifies vulnerabilities, while a Penetration Testing identifies and exploit vulnerabilities that allows access to stored confidential systems or data. A Penetration Testing also looks for vulnerabilities that an automated vulnerability scanner cannot detect.

What are the advantages of this service?

There are a few reasons why your business should take advantage of vulnerability scanning:

It can be automated to run on a schedule, on-demand or in response to trigger events such as a new build of a software project or the deployment of a new server.

  • It can perform thousands of checks faster than with manual testing.
  • Can cost less manually testing.
  • Helps your business comply with information security standards.

One thing that should be kept in mind is that vulnerability scans cannot be compared to manual processes such as penetration testing when it comes to the breadth and depth of test coverage.

The vulnerability scanner testing should be viewed as a cost-effective way of finding and managing common security issues.