Organizations need verifiable data about the software on their endpoints. SWID tags, when digitally signed, provide higher assurance in scenarios where trust is important. This presentation will explore use cases such as software asset management, vulnerability assessment, and configration settings management, touching on the elements critical to the successful deployment and use of signed tags. We’ll cover the latest guidance specifications from stakeholder groups. We’ll share success stories, barriers to tag adoption, the state of the market for tools and solutions, and open source alternatives and research efforts.