218 Vulnerability ManageMent
helps engineers replicate the functionality with similar components
by identifying potential compatibility and configuration issues.
Depending on the technology used to discover the asset, the accu-
racy of this information may vary significantly. Identifying assets
through automated means can be a very challenging task for any
technology. Not only is the variety of available versions and brands of
products extensive, but the similarities and methods of identification
are a daunting challenge as well. Agents have generally performed
better in this area than agentless discovery technologies.
7.3 Evaluation Reports
e inventory is also used in numerous risk management activities
and requires evaluation. e invento