The role of Vulnerability Scanners