A pentester spends 2-4 weeks inside your application testing for injection flaws, broken authentication, and logic bugs. When they’re done, you get a 90-page PDF. It’s useful. It’s also incomplete.
Here’s what that pentest didn’t check: your DNS records, your TLS configuration across every subdomain, your exposed admin panels, your certificate transparency logs, your security headers, your DMARC policy, your JavaScript library versions on production. These are the things an attacker checks in the first 30 seconds — before they ever try to log in.
External security scanning tests what the internet sees. And for SaaS companies selling to enterprise buyers, that external surface is where deals are won or lost.
What External Scanning Actually Tests
An external security scan evaluates your public-facing infrastructure without authentication. No credentials, no VPN, no inside access. The scan sees exactly what a potential attacker — or an enterprise procurement team — sees when they look at your domain.
SaaSFort runs 60 checks across 21 categories. Here’s what those categories cover and why each matters:
| Category | What It Checks | Why It Matters |
|---|---|---|
| SSL/TLS | Protocol versions, cipher suites, certificate chain, HSTS | 12% of SaaS domains still accept TLS 1.0 — automatic disqualification in vendor reviews |
| DNS Security | DNSSEC, CAA records, SPF, DKIM, DMARC | Email spoofing and DNS hijacking are the #1 and #3 attack vectors against SaaS companies |
| HTTP Security Headers | CSP, X-Frame-Options, HSTS, X-Content-Type | Six headers that prevent entire classes of attacks — and enterprise buyers check all six |
| OWASP Top 10 | Injection, XSS, misconfigurations, exposed data | The universal baseline for web application security |
| Exposed Sensitive Files | .env, .git, backup files, admin panels | One exposed .env file leaks your database credentials, API keys, and secrets |
| JavaScript Libraries | Outdated frameworks with known CVEs | A single vulnerable jQuery version flags your domain in automated vendor scans |
| Certificate Transparency | CT log presence, issuance history, CA diversity | Detects unauthorized certificate issuance — a sign of domain compromise |
A pentest covers OWASP. It doesn’t cover the other six categories. That’s the gap.
The Blind Spot: What Pentests Miss
Penetration tests are scoped. A typical engagement covers your main application — login flows, API endpoints, business logic. The tester works with a defined scope document, test credentials, and a time budget.
Here’s what falls outside that scope:
DNS and email infrastructure. No pentest checks whether your DMARC policy is set to p=reject or p=none. A p=none DMARC means anyone can spoof emails from your domain — a supply chain attack vector that enterprise buyers specifically verify.
Subdomains. Your main app might be solid, but what about staging.yourapp.com or admin.yourapp.com? Forgotten subdomains with dangling DNS records are prime targets for subdomain takeover attacks. External scanning discovers and tests every public subdomain.
Configuration drift. A developer disables HSTS for debugging and forgets to re-enable it. A new deployment changes the CSP header. Pentests only catch the state at a single point in time — configuration regressions between annual tests go undetected.
Ask any CISO what triggers their vendor risk alerts: TLS misconfigurations, missing security headers, and DNS issues — not SQL injection. Basic misconfigurations cause breaches. Sophisticated exploits get headlines.
Enterprise Buyers Already Run External Scans on You
Here’s what most SaaS vendors don’t realize: enterprise procurement teams scan your domain before they ever send you a questionnaire. Tools like SecurityScorecard, BitSight, and SaaSFort generate security ratings that procurement teams use as a first filter.
If your score is below their threshold (typically 70/100 or Grade C), your sales team never gets the meeting. The rejection happens silently.
Three data points:
- 67% of B2B deals now require a security assessment before contract signing (Vanta 2024 Trust Report)
- Enterprise TPRM teams maintain automated vendor monitoring — your score updates in their dashboard every time your external posture changes
- NIS2 Article 21(2)(d) requires regulated entities to assess supply chain security — meaning every EU enterprise customer must verify your security posture by October 2026
Your external security posture is already visible. The question is whether you see it before they do. Run a free scan to check.
NIS2 Makes External Scanning Mandatory
NIS2 Article 21(2) lists 10 security measures that covered entities must implement. Three of them directly require external scanning capabilities:
- Art. 21(2)(e) — Network security: Requires vulnerability handling and disclosure. External scanning is the primary method for continuous vulnerability detection on public systems.
- Art. 21(2)(f) — Risk analysis effectiveness: Requires assessing whether security measures work. External scans provide objective, third-party evidence that auditors accept.
- Art. 21(2)(h) — Cryptography: Requires appropriate cryptographic controls. External scanning verifies TLS configuration, cipher strength, and certificate validity.
For German SaaS companies, §38 BSIG adds personal liability for the Geschäftsführung. An automated external scan that produces a NIS2-mapped compliance PDF is the most cost-effective way to document oversight. See our SaaS-specific NIS2 guide for all 10 measures.
External Scanning vs Pentesting: Not a Replacement
External scanning doesn’t replace pentesting. They test different things. The right approach is both — but the roles are different.
| Dimension | External Scanning | Penetration Testing |
|---|---|---|
| Scope | Entire public attack surface | Defined application scope |
| Frequency | Continuous (daily/weekly/per-deploy) | Annual or semi-annual |
| Cost | €9-29/month | €5,000-25,000 per engagement |
| Time to results | Under 60 seconds | 2-4 weeks |
| What it catches | Misconfigurations, expired certs, weak TLS, missing headers, DNS issues, exposed files | Logic flaws, auth bypasses, business-layer bugs, chained exploits |
| Compliance value | Continuous evidence for NIS2, ISO 27001 | Point-in-time audit artifact |
| Enterprise buyer impact | First-filter score — determines if you get the meeting | Deep-dive evidence — confirms security maturity |
The pattern that works: run external scans continuously to maintain your baseline score and catch regressions immediately. Commission a pentest annually to find the logic flaws that automated tools can’t detect. Use both in your security evidence package.
For a detailed comparison of these two evidence types, see Security Grade vs Pentest Report: What Buyers Want.
How to Start: 3-Step External Scanning Program
Step 1: Establish your baseline (today). Run a free SaaSFort scan. You’ll get an A-F grade based on 60 checks across 21 categories. No account required. Takes under 60 seconds. This is what enterprise buyers already see.
Step 2: Fix the quick wins (this week). Most SaaS companies can improve their grade by 10-20 points in a single afternoon. The highest-impact fixes: enable HSTS and security headers, disable TLS 1.0/1.1, fix DMARC policy, remove exposed development files. These changes don’t require code changes — they’re server configuration.
Step 3: Automate continuous monitoring (this month). Integrate external scanning into your CI/CD pipeline so every deployment is verified. Set up weekly scheduled scans to catch certificate expirations and configuration drift. Export NIS2 compliance PDFs quarterly for your audit file.
Cost: €9/month for the Starter plan. Compare that to a single pentest engagement (€12,000+) or losing an enterprise deal because your security score was below threshold.
FAQ
Can external scanning replace a penetration test?
No. External scanning catches misconfigurations and known vulnerabilities. Pentests find logic flaws and business-layer bugs requiring human creativity. You need both — scanning runs continuously at €9/month, pentests are annual at €5,000-25,000. Start with scanning, then invest in pentests once your grade is stable.
What security grade do enterprise buyers expect?
Most TPRM teams set a minimum threshold of 70/100 (Grade C). Competitive SaaS vendors in regulated industries aim for 80+ (Grade B). A Grade A (90+) puts you ahead of 85% of SaaS vendors. See our security grade guide for details.
How often should I run external scans?
Weekly at minimum. On every deployment if CI/CD-integrated. Export a NIS2 PDF quarterly for compliance docs. The goal: catch regressions before buyers notice them.
We’re a 20-person startup. Is this relevant?
Yes — NIS2 supply chain requirements cascade to vendors of any size. Enterprise procurement scans every vendor regardless of headcount. A strong score is your competitive advantage.
How does SaaSFort compare to Detectify or Intruder?
SaaSFort starts at €9/month with NIS2 mapping. Detectify starts at €90/month without compliance reports. Intruder at $149/month focuses on infrastructure. Compare all options in our scanner comparison.
See your external attack surface the way buyers see it. Free scan — 60 checks, A-F grade, NIS2 mapping. Under 60 seconds. Export as compliance PDF for your audit file. Download our SaaS Security Playbook 2026 for the complete framework.
Von der Theorie zur Praxis
Scannen Sie Ihre Domain kostenlos. Erste Ergebnisse in unter 10 Sekunden — ohne Registrierung.