Once activated, it scans customer infrastructure on a regular basis (frequency depends on type of plan) to map the attack surface and identify potential vulnerabilities.Learn the 3 major challenges to securing application services Get the whitepaper ...