{"id":179,"date":"2020-02-07T06:07:25","date_gmt":"2020-02-07T06:07:25","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=179"},"modified":"2020-02-07T06:10:38","modified_gmt":"2020-02-07T06:10:38","slug":"pentesting-vs-vulnerability-scanning-whats-the-difference","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/pentesting-vs-vulnerability-scanning-whats-the-difference\/","title":{"rendered":"Pentesting vs Vulnerability Scanning: What&#8217;s the Difference?"},"content":{"rendered":"\n<p>What is a vulnerability scan?<\/p>\n\n\n\n<p>Also known as vulnerability  assessments, vulnerability scans assess computers, systems, and networks  for security weaknesses, also known as vulnerabilities. These scans are  typically automated and give a beginning look at what could possibly be  exploited.<\/p>\n\n\n\n<p>What is a penetration test?<\/p>\n\n\n\n<p>A penetration test simulates a hacker attempting to get into a business system through  hands-on research and the exploitation of vulnerabilities. Actual  analysts, often called ethical hackers, search for vulnerabilities and  then try to prove that they can be exploited.<\/p>\n\n\n\n<p>Which is better? A vulnerability scan or penetration test?<\/p>\n\n\n\n<p>Both  tests work together to encourage optimal network and application  security. Vulnerability scans are great weekly, monthly, or quarterly  insight into your network security, while penetration  tests are a very thorough way to deeply examine your network security.<\/p>\n\n\n\n<p>Do You Need a Penetration Test or Vulnerability Assessment?<\/p>\n\n\n\n<p>iTM covers all aspects of cybersecurity from Home cyber security managed   solutions to automated, manage threat intelligence, forensic   investigations and cyber security training. Our objective is to support   organisations and consumers at every step of their cyber maturity   journey.<a href=\"https:\/\/www.itminister.co.uk\/contact.html\"> Contact Us<\/a> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is a vulnerability scan? Also known as vulnerability assessments, vulnerability scans assess computers, systems, and networks for security weaknesses, also known as vulnerabilities. These scans are typically automated and give a beginning look at what could possibly be exploited. What is a penetration test? A penetration test simulates a hacker attempting to get into &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/pentesting-vs-vulnerability-scanning-whats-the-difference\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Pentesting vs Vulnerability Scanning: What&#8217;s the Difference?&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[20],"tags":[],"class_list":["post-179","post","type-post","status-publish","format-standard","hentry","category-security-testing"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=179"}],"version-history":[{"count":2,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/179\/revisions"}],"predecessor-version":[{"id":181,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/179\/revisions\/181"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}