Do you know if you have rogue or risky devices or software on your network exposing your organization and business to critical risk or potential non-compliance? Do you have a full asset inventory of assets and applications required to assess the risk from an emerging threat or compliance drift? Learn how automated asset discovery works with security configuration assessment technologies to addresses Critical Security Controls 1 to 3, identify previously undetected or unknown assets on your network, discover inventory software and services that increase security risk, or are prohibited by policy and compliance requirements, and proactively identify areas of exposure, vulnerability and other security weaknesses. Visit Tripwire.com to watch a webcast recording of this presentation.