VulnWatcher is equipped with a database which recognizes thousands of vulnerabilities from various manufacturers and various tests which can be carried out to identify as yet unknown vulnerabilities. Optionally, an expanded database can be used to detect even very weak points of old systems. VulnWatcher combines these databases and techniques to provide you with a clean, correlated view of your vulnerabilities. All devices that have an IP address can be checked. Proactive monitoring of your IT infrastructure covers changes in the systems and thus not only weaknesses of manufacturers, but also misconfigured systems, which in turn can be a safety hazard. Take a moment to understand how VulnWatcher tackles the Vulnerability Management process.