$500M+
annual recurring revenue reached by Wiz in its first five years, representing the fastest revenue growth in enterprise security software history according to publicly available reporting, validating the agentless CNAPP market opportunity
10,000+
organizations using Microsoft Defender for Cloud globally as of 2025, driven largely by Azure subscription bundling that makes the foundational tier available without additional licensing cost for Azure customers
40%
of Wiz customers report reducing their cloud security tool count by consolidating on Wiz's CNAPP platform, according to Wiz-commissioned Forrester TEI studies, reflecting the platform consolidation value proposition in enterprise cloud security programs

Cloud security platform selection in 2026 consistently produces the same shortlist for most enterprise security teams: Wiz and Microsoft Defender for Cloud. These two platforms dominate evaluation processes for reasons that reflect their respective market positions rather than any single technical differentiator. Wiz established itself as the benchmark for cloud-native security through rapid customer acquisition and a platform that security teams find genuinely useful in practice. Microsoft Defender for Cloud is the default consideration for organizations already committed to the Microsoft ecosystem, where bundled licensing creates a cost baseline that independent vendors must justify exceeding.

The comparison between them is not a close technical race in most dimensions. It is a question of organizational fit: where you run your workloads, what your existing Microsoft licensing covers, how much your security team's operations depend on the Microsoft security stack, and whether the gaps in Defender for Cloud's multi-cloud coverage create material risk in your environment. Understanding these differences requires moving beyond feature comparison matrices to an architectural assessment of which platform serves your specific cloud footprint.

Why These Two Are the Most Common Evaluation Pair

Wiz has become the default CSPM and CNAPP evaluation benchmark for cloud-native organizations for a reason that is worth understanding explicitly: it is the platform that enterprise security buyers who are not committed to the Microsoft ecosystem converge on after evaluating the available alternatives. Orca Security, Plerion, Lacework, and others all compete in the same space, but Wiz's CNAPP breadth (covering CSPM, vulnerability management, CIEM, DSPM, KSPM, and CDR in a single platform), its attack path analysis depth, and its commercial success at enterprise scale have made it the default independent benchmark.

Microsoft Defender for Cloud is on every shortlist for a different reason: organizations that have already paid for Azure subscriptions and Microsoft 365 E3 or E5 licensing need to understand what cloud security capability that existing spend already covers before committing budget to an independent alternative. Defender for Cloud's foundational CSPM tier is included in Azure subscriptions at no marginal cost. Defender for Servers Plan 1 is included in Microsoft 365 E5 Security. For organizations already on these licenses, Defender for Cloud is partially or fully pre-purchased and needs to be evaluated seriously before justifying additional spend on Wiz.

The result is that these two platforms represent opposite ends of the evaluation decision: Wiz as the independent best-of-breed choice requiring dedicated budget, and Defender for Cloud as the Microsoft-integrated choice that leverages existing licensing. Every enterprise security team with cloud workloads should understand how both compare against their specific requirements.

Wiz: The Security Graph and CNAPP Breadth

Wiz was founded in 2020 and built its differentiation on three core capabilities: agentless scanning via cloud provider APIs and storage snapshot access, a Security Graph that models relationships between all cloud resources to enable attack path analysis, and CNAPP platform breadth that unified capabilities previously requiring separate tools.

Wiz's agentless scanning connects to cloud accounts through read-only IAM roles and reads cloud resource configurations, workload disk snapshots, container image registries, and cloud provider APIs to build a comprehensive inventory without deploying agents on any workload. This approach provides equivalent depth for vulnerability discovery, misconfiguration detection, and sensitive data identification regardless of cloud provider or workload type, because it reads the workload state directly from cloud storage rather than requiring network access to the running instance.

The Security Graph is Wiz's primary analytical capability. It ingests cloud resource configurations, IAM policies and role assignments, network topology (security groups, network ACLs, VPC routing), vulnerability findings from workload scanning, and sensitive data locations from its DSPM capability into a property graph database. Graph traversal algorithms identify attack paths: chains of specific misconfigurations, exposed vulnerabilities, and over-permissive IAM assignments that an attacker could combine to move from an entry point to a sensitive target. The 'toxic combination' concept, a core part of Wiz's positioning, describes specific combinations of findings that individually might be low severity but together create a critical attack path.

Wiz's platform scope covers CSPM, cloud workload protection (CWPP) including vulnerability scanning, cloud identity entitlement management (CIEM), data security posture management (DSPM), Kubernetes security posture management (KSPM), infrastructure-as-code scanning for pre-deployment misconfiguration detection, and cloud detection and response (CDR) based on cloud provider log analysis. This breadth allows organizations to reduce their cloud security tool count by consolidating on Wiz rather than maintaining separate tools for each capability.

Wiz's coverage spans AWS, Azure, GCP, OCI, Alibaba Cloud, and Kubernetes across all providers. Coverage depth is comparable across all three major cloud providers because Wiz was designed as a cloud-agnostic platform rather than extending from a single cloud origin.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

Microsoft Defender for Cloud: Azure-Native Integration and Microsoft Ecosystem Depth

Microsoft Defender for Cloud evolved from Azure Security Center, which was Microsoft's foundational cloud security posture tool for Azure workloads. The platform has expanded significantly to cover multi-cloud environments and additional security capabilities, but its architectural roots as an Azure-native service are visible in the depth of its Azure integration compared to its coverage of other clouds.

For Azure workloads, Defender for Cloud's integration is native and requires no additional agents for foundational capabilities: Azure resources are automatically ingested into Defender for Cloud through Azure Resource Manager APIs, and Defender for Cloud Plans extend protection to specific Azure service types (servers, containers, databases, storage) through Azure-native instrumentation rather than external agents. The Microsoft Defender for Endpoint agent is deployed for Defender for Servers plans, but this agent is the same one used for endpoint security across the Microsoft security stack, not a cloud-security-specific agent.

For AWS and GCP workloads, Defender for Cloud uses a connector-based approach. AWS connector integration pulls data from AWS Security Hub, AWS Config, and GuardDuty findings into Defender for Cloud's unified interface, and Azure Arc agents can be deployed on AWS EC2 instances to bring them under Defender for Servers management. This connector architecture is functional but architecturally different from Wiz's native multi-cloud approach, creating some latency in finding availability and dependency on AWS native security services being correctly configured.

Defender for Cloud's Microsoft ecosystem integration is its genuine differentiator over Wiz. Microsoft Sentinel, Microsoft's cloud-native SIEM, ingests Defender for Cloud alerts natively and correlates them with Defender XDR signals (endpoint, identity, email, and cloud app threats), creating a unified incident investigation experience across the full Microsoft security estate. For organizations that have invested in Microsoft Sentinel as their primary SIEM, Defender for Cloud findings flowing directly into Sentinel without custom connectors is operationally valuable.

Microsoft's Security Exposure Management capability, which models the attack surface across the full Microsoft security estate, integrates Defender for Cloud findings with Defender for Endpoint device risk, Entra ID identity risk, and Defender for Office 365 email threat data into a unified attack path model. This cross-signal attack path modeling is the Microsoft answer to Wiz's Security Graph, and it provides broader context for organizations running the full Microsoft security stack.

Head-to-Head Comparison

The following comparison covers the dimensions that most commonly drive evaluation decisions between these two platforms.

Multi-cloud coverage depth

Wiz provides native coverage across AWS, Azure, GCP, OCI, and Kubernetes with equivalent depth across all three major cloud providers because its architecture reads directly from each provider's APIs and storage snapshots. Microsoft Defender for Cloud provides deep native coverage for Azure, connector-based coverage for AWS that relies on AWS Security Hub and Config, and limited GCP coverage. For AWS-primary or multi-cloud environments with significant non-Azure workloads, Wiz's coverage depth advantage is substantial.

Agentless scanning approach

Both platforms support agentless scanning but through different mechanisms. Wiz reads cloud resource configurations through cloud provider APIs and workload data through storage snapshot access, requiring no agents on any workload. Defender for Cloud uses Azure-native APIs for Azure workloads (agentless for posture) and the Microsoft Defender for Endpoint agent for server-level threat detection. For AWS workloads, Defender for Servers requires the Arc agent for full coverage. Wiz is more consistently agentless across all cloud providers.

Attack path analysis

Wiz's Security Graph is the market benchmark for cloud attack path analysis, modeling resource relationships across CSPM, vulnerability, CIEM, and DSPM findings to identify toxic combinations. Defender for Cloud's Defender CSPM premium plan includes attack path analysis that models Azure resource relationships, with narrower cross-cloud attack path scope for AWS and GCP workloads. For attack path analysis depth and cross-cloud accuracy, Wiz leads.

CIEM (cloud identity entitlements)

Wiz includes CIEM as part of its core platform, modeling IAM permissions, role assignments, and effective access across all connected cloud accounts to identify identity-based risks and overly permissive access paths. Microsoft's cloud identity entitlement management capability is Microsoft Entra Permissions Management, which is a separate product from Defender for Cloud with separate licensing. Organizations evaluating Defender for Cloud for CIEM must budget for Entra Permissions Management separately.

Container and Kubernetes security

Both platforms cover Kubernetes security posture management (KSPM), container image vulnerability scanning, and runtime container threat detection. Wiz's Kubernetes coverage is comprehensive across managed Kubernetes services from all three major cloud providers (EKS, AKS, GKE) and self-managed clusters. Defender for Cloud's Kubernetes coverage is deepest for Azure Kubernetes Service (AKS) with native integration, and extends to other providers through Defender for Containers with Azure Arc.

Cost and licensing

Wiz is priced per cloud resource across all connected accounts on an annual subscription basis, with all CNAPP capabilities included in the platform license. Defender for Cloud's foundational CSPM tier is included in Azure subscriptions at no additional cost. Advanced capabilities require individual Defender plans priced per resource type, and the Defender CSPM premium plan for attack path analysis is an additional add-on. For organizations with existing Microsoft E5 Security licensing, significant Defender for Cloud capability may already be included. For organizations without Microsoft licensing leverage, Wiz and full Defender for Cloud coverage converge in total cost at enterprise scale.

Microsoft ecosystem integration

Defender for Cloud integrates natively with Microsoft Sentinel for SIEM correlation, Defender XDR for cross-domain incident investigation, Microsoft Purview for data governance context, and Microsoft Security Exposure Management for unified attack surface modeling. Wiz integrates with Microsoft Sentinel, Splunk, and other SIEMs through API connectors, and with Jira, ServiceNow, and other remediation workflow tools. For organizations standardized on the Microsoft security stack, Defender for Cloud's native integration creates operational efficiency that Wiz cannot fully replicate through API connectors.

The Microsoft Lock-In Question

The most honest framing of the Wiz versus Defender for Cloud decision is whether Microsoft ecosystem integration creates enough operational value to justify accepting the coverage gaps that Defender for Cloud has in non-Azure environments.

Defender for Cloud is the obvious choice when Azure constitutes the majority of cloud workloads, Microsoft Sentinel is already deployed as the primary SIEM, the organization is paying for Microsoft 365 E5 or Azure Defender bundles that provide Defender for Cloud capabilities as included entitlements, and the security team also manages Azure infrastructure and benefits from unified Azure portal tooling.

Wiz is the justified choice despite higher marginal cost when AWS or GCP workloads are significant and need equivalent coverage depth, attack path analysis accuracy across all three major clouds is a priority, the security team wants vendor-independent posture data that is not filtered through Microsoft's perspective on Azure resources, or the organization is evaluating cloud security independently of Microsoft ecosystem considerations and wants the platform with the strongest security graph capability.

The lock-in consideration cuts both directions. Choosing Defender for Cloud reinforces Microsoft ecosystem dependency, which may be appropriate if the organization is already committed to the Microsoft security stack. Choosing Wiz maintains vendor independence but requires dedicated budget rather than leveraging existing Microsoft licensing.

Evaluation Checklist

Answer the following questions before making a platform selection decision.

What percentage of workloads are on Azure vs. AWS vs. GCP?

If more than 70 percent of workloads are Azure-native, Defender for Cloud's native Azure coverage advantage is most significant and the multi-cloud coverage gap is least consequential. If AWS or GCP workloads are substantial, Wiz's native multi-cloud coverage depth justifies evaluation priority.

Is Microsoft Sentinel deployed as the primary SIEM?

Defender for Cloud's native Sentinel integration is a meaningful operational advantage for organizations using Sentinel. If Splunk, Google Security Operations, or another SIEM is the primary platform, Defender for Cloud's Sentinel integration advantage does not apply, and Wiz's API-based integrations provide equivalent coverage.

What Microsoft 365 or Azure licensing is already in place?

Evaluate which Defender for Cloud capabilities are included in existing Microsoft licensing before budgeting for an independent platform. Microsoft 365 E5 Security includes Defender for Servers Plan 1, which provides meaningful server threat detection at no additional cost for organizations already on E5.

Is attack path analysis across all three major clouds required?

If the primary security program objective is understanding cross-cloud attack paths and toxic combinations in a multi-cloud environment, Wiz's Security Graph provides more accurate cross-cloud attack path analysis than Defender for Cloud's connector-based multi-cloud model.

Is CIEM (cloud identity entitlements management) a requirement?

Wiz includes CIEM as part of its core platform. Microsoft Entra Permissions Management is a separate product with separate licensing. If CIEM is a requirement, factor the Entra Permissions Management cost into the Defender for Cloud total cost comparison.

What is the remediation workflow (automated vs. ticketed)?

Both platforms support ticketed remediation through Jira and ServiceNow integrations. Defender for Cloud's Azure Policy integration allows automatic remediation of specific misconfiguration types in Azure environments. Evaluate whether the organization's change management culture supports automated remediation or requires manual ticket-based workflows.

What compliance frameworks require coverage?

Both platforms provide compliance dashboards mapped to common frameworks (CIS, NIST, PCI DSS, SOC 2, ISO 27001). Defender for Cloud's regulatory compliance dashboard has deeper Azure-specific framework coverage. Verify that the specific compliance frameworks your program requires are covered by whichever platform you select.

What is the budget per workload per month?

Develop a realistic per-resource cost estimate for both platforms based on your actual resource count and the specific Defender for Cloud plans required for your workload types. Apply existing Microsoft licensing credits to the Defender for Cloud estimate. The cost comparison at your specific scale and licensing position will be more accurate than published list pricing comparisons.

The bottom line

Microsoft Defender for Cloud is the right choice for organizations that are Azure-primary, have meaningful Microsoft 365 E5 or Azure bundle licensing that makes Defender for Cloud capabilities partially included, are already running Microsoft Sentinel as their primary SIEM, and benefit from native Microsoft ecosystem integration across Defender XDR, Purview, and Security Exposure Management.

Wiz is the right choice for organizations that have significant AWS or GCP workloads requiring native coverage depth equivalent to Azure, want the market-leading attack path analysis capability in a vendor-independent platform, need CIEM included in the core platform rather than as a separate product purchase, or are evaluating cloud security as a standalone investment without Microsoft ecosystem constraints driving the decision.

For many enterprises, the decision is not binary: starting with Defender for Cloud's foundational tier (included with Azure at no additional cost) while evaluating Wiz against the specific gaps is a practical approach. The attack path analysis depth comparison in your actual cloud environment, with your actual IAM complexity and data distribution, will be more decisive than any feature comparison table.

Frequently asked questions

Is Microsoft Defender for Cloud free with Azure?

Microsoft Defender for Cloud has two service tiers. The foundational CSPM tier, previously called Azure Security Center, is available at no additional charge for all Azure subscriptions. This foundational tier provides basic security posture recommendations, regulatory compliance dashboards mapped to common frameworks, and secure score tracking across Azure resources. It does not include vulnerability assessment for virtual machines, advanced threat protection for specific Azure services, or attack path analysis. The paid Defender for Cloud plans, previously called Azure Defender, are priced per resource type per month. Each plan covers a specific Azure service category: Defender for Servers (for virtual machines and Arc-enabled servers), Defender for Containers (for Azure Kubernetes Service and container registries), Defender for Databases, Defender for Storage, Defender for App Service, and others. Defender for Servers Plan 2, which includes Microsoft Defender for Endpoint integration and vulnerability assessment, is priced at approximately 15 US dollars per server per month as of 2025. The Defender Cloud Security Posture Management (CSPM) premium plan, which adds attack path analysis, cloud security explorer, and agentless vulnerability scanning, is a separate add-on priced per billable resource. Organizations evaluating the true cost of Defender for Cloud should scope which specific Defender plans are needed for their workload types rather than assuming that Azure subscription access equals full Defender for Cloud capability.

Can Wiz and Microsoft Defender for Cloud be used together?

Wiz and Microsoft Defender for Cloud can operate simultaneously in the same cloud environment, and some organizations run both in complementary roles. The most common coexistence pattern is Defender for Cloud handling Microsoft-ecosystem native integration (threat detection for Azure services, Microsoft Sentinel correlation, Defender XDR integration) while Wiz provides independent cross-cloud visibility and attack path analysis that is not filtered through Microsoft's native perspective on Azure resources. Running both platforms creates duplication in CSPM findings that requires deduplication in the remediation workflow, and the cost of both platforms combined is significant. Organizations that run both typically do so because they are in a transition period, have specific compliance requirements that both platforms satisfy through their respective audit reporting, or have organizational boundaries where an Azure-focused security team uses Defender for Cloud while a cloud-native security engineering team uses Wiz. The more common long-term outcome after evaluating both is selecting one as the primary platform based on organizational fit and treating the other as a supplemental tool for specific use cases. A Defender for Cloud primary deployment might supplement with Wiz for attack path analysis depth. A Wiz primary deployment might retain Defender for Cloud foundational tier (which has no additional cost) for Microsoft Sentinel alert integration.

How does Wiz compare to Defender for Cloud on AWS-primary environments?

Wiz has a significant advantage over Defender for Cloud in AWS-primary environments because Wiz's architecture was designed from the start as a cloud-agnostic platform that reads directly from each cloud provider's APIs and storage snapshots without any intermediary layer. Wiz's coverage of AWS services, IAM policies, and resource relationships is native and equal in depth to its Azure coverage. Microsoft Defender for Cloud extends to AWS through Azure Arc connectors, which require deploying the Arc agent on AWS EC2 instances to bring them under Defender for Servers management, and through Defender for Cloud's multi-cloud connector that pulls AWS Security Hub findings and cloud configuration data into the Defender for Cloud interface. This connector-based approach is architecturally different from native coverage: it depends on AWS Config, AWS Security Hub, and GuardDuty as data sources rather than reading AWS resources directly, which creates dependency on AWS native security services being correctly configured and introduces latency in finding availability. For organizations where AWS is the primary cloud and Azure is secondary or absent, Defender for Cloud's value proposition is significantly weaker because the Microsoft ecosystem integration benefits (Sentinel, Defender XDR, Azure-native alerts) are less relevant, while the coverage depth gap on AWS is most pronounced. AWS-primary organizations consistently report Wiz as providing more comprehensive and actionable AWS findings than Defender for Cloud's connector-based AWS coverage.

What is the difference between Microsoft Defender for Cloud and Microsoft Defender XDR?

Microsoft Defender for Cloud and Microsoft Defender XDR (Extended Detection and Response) are related but distinct Microsoft security products that address different parts of the security operations problem. Microsoft Defender for Cloud is a cloud security posture management and workload protection platform. Its primary function is identifying misconfigurations, compliance violations, and vulnerabilities in cloud resources (Azure, AWS, and GCP), and detecting threats targeting cloud workloads including servers, containers, databases, and storage services. Defender for Cloud's output is primarily posture findings (misconfigurations to remediate) and cloud-specific threat alerts. Microsoft Defender XDR is an extended detection and response platform that correlates signals from across Microsoft's security portfolio into unified incidents: Defender for Endpoint (endpoint detection and response), Defender for Identity (Active Directory threat detection), Defender for Office 365 (email security), and Defender for Cloud Apps (CASB and shadow IT). Defender XDR is focused on attack detection and response across the full Microsoft security estate, not cloud posture management. The relationship between them is that Defender for Cloud alerts can be surfaced in Microsoft Sentinel (the SIEM and SOAR platform that integrates with both) and can contribute signals to the broader Microsoft threat intelligence ecosystem. Organizations that have deployed the full Microsoft security stack get correlation across Defender for Cloud cloud alerts, Defender XDR endpoint and identity signals, and Microsoft Sentinel for unified incident investigation.

Does Wiz replace the need for a separate vulnerability scanner?

Wiz integrates vulnerability scanning as part of its agentless CNAPP platform, covering operating system packages, application libraries, and container image contents through its workload scanning capability. For cloud-hosted virtual machines and containers, Wiz's agentless scanning provides vulnerability findings without deploying agents on workloads, using cloud provider disk snapshot access to read installed package inventories and compare them against vulnerability databases. For many cloud-native organizations, Wiz's integrated vulnerability scanning is sufficient to replace a dedicated cloud vulnerability scanner like Qualys VMDR or Rapid7 InsightVM for cloud workloads specifically. Wiz's advantage is the integration of vulnerability findings with CSPM and attack path context: a vulnerability on an internet-facing EC2 instance with an overly permissive IAM role produces a more severe combined finding than the same vulnerability on an isolated internal server, which standard vulnerability scanners cannot express. The cases where a dedicated vulnerability scanner remains valuable alongside Wiz are: on-premises infrastructure not covered by cloud provider APIs (Wiz cannot scan on-premises servers), network device scanning (Wiz does not scan routers, switches, or network appliances), authenticated web application scanning (Wiz's vulnerability scanning is host-based rather than web application-focused), and organizations with compliance requirements specifying particular vulnerability scanning tools or scan methodologies that Wiz does not satisfy.

How does Wiz pricing work at scale compared to Microsoft Defender for Cloud?

Wiz pricing is based on the number of billable cloud resources (virtual machines, container nodes, and cloud service resources such as databases, serverless functions, and storage accounts) across connected cloud accounts. Wiz publishes pricing tiers based on resource count ranges, and list pricing is negotiated based on total resource count and contract term. At mid-market scale (hundreds to low thousands of resources), Wiz is typically priced in the range of 15 to 25 US dollars per resource per month for full CNAPP capability including CSPM, vulnerability management, CIEM, and DSPM. At enterprise scale with multi-year commitments, per-resource pricing typically decreases substantially. Microsoft Defender for Cloud pricing at scale requires summing the cost of each Defender plan enabled for each resource type. Defender for Servers Plan 2 at approximately 15 US dollars per server per month is comparable to Wiz per-server pricing, but Defender for Cloud's total cost also includes Defender plans for containers, databases, and storage, plus the Defender CSPM premium plan add-on for attack path analysis. Organizations that need comprehensive coverage comparable to Wiz's platform will find the total Defender for Cloud cost across all required plans approaches Wiz's all-in pricing. The genuine cost advantage of Defender for Cloud is in Azure-only environments where the foundational CSPM tier is included in Azure subscriptions at no additional charge, and where Defender for Servers Plan 1 (a less comprehensive server protection tier) is included in Microsoft 365 E5 Security licensing for organizations that already pay for that bundle. Organizations already paying for E5 Security should calculate their effective Defender for Cloud cost after applying included entitlements before comparing to Wiz's list pricing.

Sources & references

  1. Wiz Platform Documentation
  2. Microsoft Defender for Cloud Documentation
  3. Gartner Innovation Insight for CNAPP 2024
  4. Microsoft Entra Permissions Management Documentation
  5. CIS Microsoft Azure Foundations Benchmark
  6. CISA Cloud Security Technical Reference Architecture v2

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Mythos Brief

Anthropic's AI finds zero-days your scanners miss.