Discovery: It can identify authorized and unauthorized devices and software across organization and classify them more reliably into a robust asset inventory system.
Audit: It consistently scan workstations and servers and observe changes in hardware and software to maintain an up-to-date asset inventory.
Monitor: It identify changes through audit within organization and take action to remediate problems or apply technical processes and policies to manage changing assets effectively.