This section details how to scan your Windows, Mac and Linux devices for unprotected data, vulnerabilities and access permissions, using a range of scan types. You can then view scan results for individual devices and go on to use our powerful analysis and Reporting facilities on your accumulated scan results to visualize risks and trends throughout your organization - and help drive decisions for improved data security.