Utilization of a third party vendor to scan and validate potential vulnerability results provides checks and balances against our internally conducted scanning processes. Additionally, the third party scanning provides the view of our external network risk that can be potentially exploited to gain access to our environment.