A distributed vulnerability scanner operated by the ethical hacking team in order to best help the Client in vulnerability assessment and mitigation.
Virtual and physical sensors can be spread and fine-tuned for a more accurate vulnerability detection, using custom modules and time schedules.