| Type of Scanner /Capabilities | Agents | Unauthenticated Network Scanner | Authenticated Scanner | Cloud Security Posture Manager | AccuKnox |
| Risk to Scanned Assets | Medium | High | Medium | Yes | None |
| Security Visibility Depth | High | Low | High | Low | High |
| Security Visibility Breadth | Low | Medium | Low | High | High |
| Vulnerability Detection | Yes | Medium | Yes | No | Yes |
| Malware Detection | High | No | No | No | Yes |
| INFRA, OS, Apps, & Data Inventory | Yes | No | No | No | Yes |
| Cloud Level Misconfiguration Detection | No | No | No | Yes | Yes |
| Scan Stopped Machines | No | No | No | N/A | Yes |
| Characteristic | DoD | AccuKnox | ||
| 🔑Identity/Access | Least privilege for all | Granular workload access | ||
| 📘Policy as Code | Mandates codified policies | Supports PaC | ||
| 🔅Network Segmentation | Emphasizes micro-segmentation | Application firewalling | ||
| 🔬Behavior Analytics | Detect anomalous activity | Runtime monitoring | ||
| 🔒Secure Secrets | Prioritizing secure handling | Indirectly aids via process control | ||
| 📦Harden Containers | Mandates STIG/NIST 800-190 | Image scanning and runtime protection | ||
| 🛡️API Security | Focuses on securing APIs | API inventory and OWASP Top 10 detection | ||
| 📝Continuous ATO | Seeks continuous compliance | Assists via GRC and monitoring |

