Cutting-edge security begins with a rock-solid foundation that includes knowing with certainty what is in a network. While investments in quantum encryption, artificial intelligence, machine learning, and block-chain are interesting, none of it will matter without a strong foundation. This paper examines some ways organizations attempt to manage inventory. It reviews three primary methods, their strengths and weaknesses, and introduces a new, more effective way to achieve inventory awareness.