Find vulnerabilities before incidents occur
A vulnerability scanner externally queries the IP addresses that you own that are accessible from the internet to query each of these computers to find out if any of the software they are running has known software vulnerabilities.
For example, if there is a computer on your network that is running an end-of-life version of Windows or an old version of Apache and someone can reach those computers from the internet, that's a very easy exploit. If you have multiple system owners within your university, and they're not all communicating well regarding security, our vulnerability scanning can help mitigate those risks.
Vulnerability scanning gives your security staff the ability to find those problems before you have an incident.