Software that analyzes a network to determine its exposure to unwanted intruders. Also called a "vulnerability scanner," such products check client PCs, servers, routers, firewalls, network appliances ...
Businesses today compete in an increasingly complicated IT environment. Nearly everyone from co-location providers, to traditional telco operators, international organizations and small and medium ...