Security-smart organizations have gone well beyond thinking just in terms of assessing and addressing vulnerability. Now vulnerability management is a cornerstone of their corporate security, risk and compliance programs. The scope of products available has also expanded as regulatory compliance requirements increase. Vulnerability management tools scan the network for hosts, enumerate network services and use a variety of techniques to determine possible vulnerabilities. The process of selecting of a vulnerability management product is far more complicated than answering the question, “Who makes the best vulnerability assessment scanner?””]
Source: https://www.csoonline.com/article/2126969/vulnerability-management-keeps-getting-sexier.html