testing malware removal Types of Vulnerability Assessment we Offer Network Based Scans These types of scans are mostly used to identify potential risks on network security. Host Based Scans These types of scans are used to identify vulnerabilities in workstations, servers, or other local hosts. It is similar to network based scans but provides a deeper insight into configuration settings. Wireless Network Scans These are usually carried out on wireless network infrastructure of an organization by checking for areas susceptible to potential attacks. It also helps to ensure whether a company’s wireless configuration is secure. Application Scans These are used to check software vulnerabilities and configuration errors on web or network application. Database Scans These are used to identify weak points in database and prevent the system from malicious attacks such as SQL injection attacks etc.