many tools for system security , such as patch management and vulnerability management software, use proprietary formats , nomenclatures, measurements , terminology , and content. For example, when vulnerability scanners do not use standardized names for vulnerabilities , it might not be clear to security staff whether multiple scanners are referencing the same vulnerabilities in their reports . This lack of interoperability cancause delays and inconsistencies in security assessment, decision making, and remediation