Beyond Security Automatic Vulnerability Detection System Scanner Overview
Vulnerability assessment is the evaluation of assets in the network to identify and prioritize potential security issues. JSA products that support Vulnerability Assessment can import vulnerability data from external scanner products to identify vulnerabilities profiles for assets.
Vulnerability assessment profiles use correlated event data, network activity, and behavioral changes to determine the threat level and vulnerabilities present on critical business assets in your network. As external scanners generate scan data, JSA can retrieve the vulnerability data with a scan schedule.
To configure a Beyond Security AVDS scanner, see Adding a Beyond Security AVDS Vulnerability Scanner.