Deploying the {{COMPANY_NAME}} {{PRODUCT_NAME}} involves gathering the scope and nature of the end points you wish to scan for risk analysis, deciding on a {{COMPANY_NAME}} scanning method, and integrating your compatible vulnerability scanner into the {{COMPANY_NAME}} appliance. Understanding each deployment method and what their pros and cons are will help reduce confusion and improve the risk analysis data {{COMPANY_NAME}} can provide. The simplest deployment option is the Agent-Based Deployment option.