There are several vulnerability scanners available to assist organizations in scanning their networks and systems to detect potential risks and vulnerabilities. Review at least three of these tools and compare and contrast their features and functions. In your opinion, would you implement any of these scanners? Explain your rationale in choosing this particular tool. Here are a few resources to assist you with this assignment. 8 of the Best Network Vulnerability Scanners Tested (Comparitech) (Links to an external site.) 6 Free Network Vulnerability Scanners (Network World) (Links to an external site.) Best Vulnerability Scanner Software (G2 Crowd) Title: Management of Information Security ISBN: 978-1337405713 Paperback ISBN2: 978-137671545 eBook Authors: Michael E. Whitman, Herbert J. Mattord Publisher: Cengage Learning Publication Date: 2019 Edition: 6th Format: Textbook Chapter 11 discusses the need for ongoing maintenance of the information security program, defining a model for a full maintenance program. Key factors involved in monitoring the external and internal environments are explained. Read the following from your textbook: Chapter 11 – Security Maintenance