Enables us to identify vulnerability levels and to enforce security credentials
What is our primary use case?
My primary use case of this solution is to audit the security level of my customer's internet. We offer this as a service.
Pros and Cons
"The most valuable feature is that we are able to scan the services and put credentials like a user ID password. We can verify the vulnerability level."
"It should have better automatic reporting."
What other advice do I have?
I would advise someone considering this product is to find a solution that is easy to use. We use this solution because we need to. I would rate it an eight out of ten. Not a ten because the reporting needs improvement. It should have better automatic reporting.