Vulnerability Management
Authenticated vs. Unauthenticated Scanning
-
Authenticated Scanning
Using TraceInsight, authenticated scanning is a bit more complicated to set up, but greatly reduces false positives and gives pass and fail results of all scanned vulnerabilities. You also have the ability to run internal scans on your own!
-
Unauthenticated Scanning
Using TraceCSO, unauthenticated scanning is a breeze to set up. You have the ability to run internal and external scans on your own, showing progress as you remediate vulnerabilities.