Discovering unmanaged devices can be challenging both in definition and in practice. However, when done effectively, unmanaged device discovery leads to a more credible asset inventory, and a more effective cybersecurity asset management program overall. In this short paper, we’ll look at what constitutes an “unmanaged” device, approaches to discovery, and how continuous data aggregation and correlation helps automate unmanaged device discovery.