Pros

  • Easy to use
  • Good risk-assessment tools
  • Informative

Cons

  • Unable to identify ping access attempts by name