Full-Stack Monitoring versus Infrastructure Monitoring in terms of Application Security.
Application Security mechanisms to identify vulnerabilities and to determine their priorities.
Analyze and improve the coverage of hosts on which vulnerability detection is enabled.