Intro

While vulnerability assessment tools are widely believed to be very mature and approaching commodity status, they are only able to scan and analyze those assets they know about. In this white paper, we’ll highlight how automating both device discovery and making VA tools aware of new devices that should be scanned can enforce security policies, increase the ROI of vulnerability scanning investments, and strengthen an organization’s overall security posture.