Frequently Asked Questions
Last updated: Feb 2026
Getting Started
How long does the first scan take?
Most scans complete in under an hour. You'll get results immediately, no waiting days for a report.
Do I need technical knowledge to use this?
No. VulWall is built for teams without security expertise. Every finding comes with a plain-English explanation and step-by-step fix.
What do I need to get started?
Just your domain name. No agents to install, no code changes, no access credentials needed.
What exactly do you check?
We scan for the security issues that matter most: SSL/TLS configuration, exposed ports, security headers, subdomain vulnerabilities, known CVEs, and misconfigurations. Think of it as seeing your infrastructure the way an attacker would.
Pricing & Plans
What's included in the free plan?
One domain, monthly scans, and a summary report. Enough to see if VulWall is useful for you.
When should I upgrade to Pro?
When you need continuous monitoring, multiple domains, the Security Certificate for customers, or AI-powered remediation guidance. Most teams upgrade when a customer, investor, or a compliance audit asks about security.
Can I cancel anytime?
Yes. No contracts, no cancellation fees. Cancel from your dashboard whenever you want.
Security & Compliance
Is this enough for SOC 2 or ISO 27001?
VulWall supports the technical vulnerability monitoring part of a broader compliance program. It can help you identify and document issues in your public-facing infrastructure, but it is not a compliance certification and does not replace audits, policies, or internal control reviews. Many teams use VulWall alongside SOC 2, ISO 27001, or similar frameworks as supplementary technical evidence.
Does VulWall help with NIS2 compliance?
Yes, for the technical monitoring part. VulWall helps you continuously assess your public-facing infrastructure and document findings over time. It does not cover the full scope of NIS2, including governance, policies, incident processes, or supply chain obligations, so it should be treated as one part of a broader compliance effort.
Can I share the Certificate with customers?
Yes, that's exactly what it's for. Your Certificate is a shareable link that shows your security posture. Send it to procurement, include it in sales decks, or link it from your website.
How does the Certificate help close deals?
When a customer, auditor, or partner asks about your security posture, the Certificate gives you a current, shareable view of your public-facing technical security posture. It is useful supplementary evidence in procurement and due diligence conversations.
Do you store my scan results?
Yes, securely encrypted in the EU. You own your data and can delete it anytime. See our Privacy Policy for details.
Comparisons
How does VulWall compare to Qualys or Nessus?
Qualys and Nessus are powerful tools built for security teams with dedicated staff to configure, run, and interpret results. VulWall is built for teams without that expertise: minimal setup, plain-English findings, AI-powered remediation guidance, and a shareable Security Certificate. If you have a full-time security engineer, those tools may offer more depth and flexibility. If you don't, VulWall is designed to get you useful external visibility quickly.
How is VulWall different from Snyk?
Different layers of the stack. Snyk scans your source code, dependencies, and containers inside your CI pipeline. VulWall scans what's visible from the outside: your live infrastructure, exposed services, SSL configuration, security headers, and email security. Snyk catches vulnerable packages before you deploy. VulWall catches what's exposed after you deploy. Many teams use both.
How is this different from free tools like Nessus or OWASP ZAP?
Those tools require security expertise to configure, run, and interpret. VulWall is automated, continuous, and explains everything in plain English. You get actionable results, not raw vulnerability dumps.
Can this replace hiring a security person?
No. VulWall reduces the amount of security work your team has to do manually by handling continuous external monitoring and giving you clearer remediation guidance, but it does not replace security leadership, secure architecture work, business logic testing, or internal security operations. Think of it as a strong baseline layer, not a substitute for human expertise.
Why not just do annual pentests?
Annual pentests are valuable, especially for business logic and deeper application testing, but they are point-in-time assessments. VulWall gives you continuous visibility into your public-facing infrastructure between pentests. The two approaches work best together: VulWall for ongoing external monitoring, and periodic pentests for manual depth and application-specific testing.
Common Concerns
What if my score is bad?
That's actually good: you found issues before a customer or attacker did. We prioritize findings and show you exactly what to fix first. Most teams improve their score within a week.
Will this slow down my website?
Our scans generate minimal traffic comparable to normal web browsing. There is no meaningful performance impact on your servers or anything your users would notice.
What if I disagree with a finding?
You can mark findings as false positives or accepted risks. We know not every finding applies to every situation. Your Certificate reflects your actual security decisions, not just raw scan output.
What if I need help fixing something?
Pro users get AI-powered remediation guidance with step-by-step fixes. If you need hands-on help, someone to actually resolve issues for you, contact us for dedicated support options.