New security flaws, known as vulnerabilities, are discovered every day. Vulnerability scanning uses a variety of tools and techniques to examine your network for these security holes and misconfigurations. What you get: - One External Web Application Scan - SQL Injection - File Inclusion - Cross Site Scripting - Information Leakage - OWASP Top 10 Testing - Low False Positive - Summarized Report - Raw Scan Results