FAQs

1. What types of applications can be scanned?2025-11-07T13:21:09-05:00

We scan internally managed web applications, including WordPress websites, Pepper applications and commercial applications like REDCap. Third-party hosted applications are excluded.

2. How long does a scan take?2025-11-07T13:23:18-05:00

Scan duration varies depending on the application size and complexity. Most scans are scheduled and completed within a few days of the request.

  • Basic scans: minutes to complete
  • Comprehensive scans: hours

Reports are generally delivered within a few days of the request.

3. Can I request a scan for a third-party hosted application?2025-11-14T14:03:45-05:00

No, this service is only for internally managed applications. It is the responsibility of third-party application owners to request vulnerability assessment (VA) or penetration test (PT) results from other vendors as needed.

4. Is there a limit on the number of scans?2025-11-07T13:24:41-05:00

Yes. Our current license allows 50 scans per quarter. A scan request may consume multiple licenses depending on the number of hosts scanned. The number of scans a single stakeholder can request may be limited based on demand. Prioritization is based on application criticality.

5. Will this service detect all vulnerabilities?2025-11-14T14:04:35-05:00

No. This service identifies common vulnerabilities but does not replace comprehensive penetration testing or manual security reviews.

Last modified: November 14, 2025

Go to Top