{"id":516166,"date":"2024-06-05T17:37:57","date_gmt":"2024-06-05T21:37:57","guid":{"rendered":"https:\/\/www.commvault.com\/?post_type=cmv_glossary&p=516166"},"modified":"2024-08-08T12:15:54","modified_gmt":"2024-08-08T16:15:54","slug":"vulnerability-network-scanning","status":"publish","type":"cmv_glossary","link":"https:\/\/www.commvault.com\/glossary-library\/vulnerability-network-scanning","title":{"rendered":"Vulnerability Network Scanning"},"content":{"rendered":"\n
Vulnerability network scanning<\/strong> is an invaluable tool for keeping networks safe from malicious actors. It is a process that involves the scanning of a network for security weaknesses or vulnerabilities, and it can be done either manually or with automated software.<\/p>\n\n\n\n The main goal of vulnerability network scanning is to detect and address potential threats before they can be used against the system. This type of scan looks for known weaknesses like open ports and misconfigured services, which could leave a system vulnerable if left unaddressed.<\/p>\n\n\n\n Organizations often use vulnerability scans in combination with penetration testing and other types of security measures to ensure their networks remain secure. Vulnerability scanners can identify any potential risks that may put the system at risk of exploitation, allowing organizations to take proactive steps toward mitigating these issues. These scanners typically search for outdated software, unpatched systems, and other common vulnerabilities that malicious actors may exploit if they gain access to the system.<\/p>\n\n\n\n