The Process of identifying vulnerabilities, evaluating the risk, remediation, and reporting is called vulnerability management. By running penetration test, organizations are able to more efficiently find and fix security vulnerabilities within their network.
These tests are typically performed using automated tools that look for specific weaknesses, technical flaws or vulnerabilities to exploit, with the results presented to the system owner with an assessment of thier risk to the networked environment and a remediation plan highlighting the steps needed to eliminate the exposures.