You can:
maintain secure configuration and accurate information, controlling IT assets in one or more significant areas verify the location and state of assets
You can:
maintain secure configuration and accurate information, controlling IT assets in one or more significant areas verify the location and state of assets