Vulnerability Scanner Features
Everything you need for enterprise vulnerability management in one platform.
Unlimited Scanning Engine
Scan as many IPs as you need, as often as you need. No per-IP fees, no scan limits. Schedule recurring scans daily, weekly, or monthly with automated reporting.
CISA KEV + EPSS Threat Intelligence
CISA Known Exploited Vulnerabilities (KEV)
Automatically flag vulnerabilities listed in CISA's Known Exploited Vulnerabilities catalogue. Prioritise remediation of actively exploited threats.
EPSS Threat Scoring
Exploit Prediction Scoring System integration ranks vulnerabilities by real-world exploitability probability, not just CVSS severity.
Compliance Reporting
Built-in compliance mapping for PCI DSS, SOC 2, ISO 27001, HIPAA, Cyber Essentials, and NIST CSF. Generate one-click audit reports with vulnerability-to-control mapping.
API & Integrations
Full REST API for scan management and results retrieval. Native integrations with Jira, ServiceNow, Splunk, QRadar, and webhook support for custom workflows.
Scan Scheduling & Automation
Set up recurring scan schedules with automated email reports. Configure scan policies, target groups, and notification rules.
See pricing for all features → · Get started with our docs →