During this periodic scan, we monitor your application environment or the access point to your network with a vulnerability scanner. This gives you certainty about the correct design of the environment, you monitor its security and you fulfill the legal obligation to organize suitable security for the processing of personal data.