Along the lines of Host and Network scanners, Mobile Devices should be scanned for vulnerabilities as well.