Vulnerability Scanner Features

Everything you need for enterprise vulnerability management in one platform.

Unlimited Scanning Engine

Scan as many IPs as you need, as often as you need. No per-IP fees, no scan limits. Schedule recurring scans daily, weekly, or monthly with automated reporting.

CISA KEV + EPSS Threat Intelligence

CISA Known Exploited Vulnerabilities (KEV)

Automatically flag vulnerabilities listed in CISA's Known Exploited Vulnerabilities catalogue. Prioritise remediation of actively exploited threats.

EPSS Threat Scoring

Exploit Prediction Scoring System integration ranks vulnerabilities by real-world exploitability probability, not just CVSS severity.

Compliance Reporting

Built-in compliance mapping for PCI DSS, SOC 2, ISO 27001, HIPAA, Cyber Essentials, and NIST CSF. Generate one-click audit reports with vulnerability-to-control mapping.

API & Integrations

Full REST API for scan management and results retrieval. Native integrations with Jira, ServiceNow, Splunk, QRadar, and webhook support for custom workflows.

Scan Scheduling & Automation

Set up recurring scan schedules with automated email reports. Configure scan policies, target groups, and notification rules.

See pricing for all features → · Get started with our docs →