Vulnerability scanners can provide a wide range of features, but here are a few of the most common found in the market.
Network mapping — Network mapping features provide a visual representation of network assets including endpoints, servers, and mobile devices to intuitively demonstrate an entire network’s components.
Web inspection — Web inspection features are used to assess the security of a web application in the context of its availability. This includes site navigation, taxonomies, scripts, and other web-based operations that may impact a hacker’s abilities.
Defect tracking — Defect and issue tracking functionality helps users discover and document vulnerabilities and track them to their source through the resolution process.
Interactive scanning — Interactive scanning or interactive application security testing features allow a user to be directly involved in the scanning process, watch tests in real time, and perform ad hoc tests.
Perimeter scanning — Perimeter scanning will analyze assets connected to a network or cloud environment for vulnerabilities.
Black box testing — Black box scanning refers to tests conducted from the hacker’s perspective. Black box scanning examines functional applications externally for vulnerabilities like SQL injection or XSS.
Continuous monitoring — Continuous monitoring allows users to set it and forget it. They enable scanners to run all the time as they alert users of new vulnerabilities.
Compliance monitoring — Compliance-related monitoring features are used to monitor data quality and send alerts based on violations or misuse.
Asset discovery — Asset discovery features unveil applications in use and trends associated with asset traffic, access, and usage.
Logging and reporting — Log documentation and reporting provides required reports to manage operations. It provides adequate logging to troubleshoot and support auditing.
Threat intelligence — Threat intelligence features integrate with or store information related to common threats and how to resolve them once incidents occur.
Risk analysis — Risk scoring and risk analysis features identify, score, and prioritize security risks, vulnerabilities, and compliance impacts of attacks and breaches.
Extensibility — Extensibility and integration features provide the ability to extend the platform or product to include additional features and functionalities.
Many vulnerability scanner tools will also offer the following features: