01 One-page executive summary allowing executives to make business-case risk decisions
02 Discovery of every computer, virtual machine, networking device, IoT, OT, and system
03 Map of the hosts, devices, and services that are running the network
04 Determination of the operating system for each host, device, and service that is running the network
05 Analysis of communications to identify type, software version, and patch level, for every host, device, and service
06 Review each result-set for accuracy, removal of false positives and negatives
07 Ability to identify, classify, and categorize all your systems, applications, and devices
08 Option to categorize by type, value, or threat.