| http://www.w3.org/ns/prov#value | - By feeding mobile device vulnerability data into a centralized analytics and reporting console, the updated module enables IT security administrators to identify, profile and assess smart phones and tablets alongside other assets in their environment, such as laptops, servers, web applications, databases and virtual machines.
|