Securing your business depends on firstly knowing what you have and then, what changed and why. It's crucial to spot the changes in time to minimize risk to the business. And when a breach occurs, analysts need information that describes what and who was impacted and how the breach happened. Blind spots are easy targets for fraudulent behavior; and the hardest to fill because the elements are in constant flux: devices, applications, virtual infrastructure, cloud elements, IoT, and patches: added, deleted and moved.