Despite the amazing technologies available today in cybersecurity, organizations still struggle with the most fundamental challenge that has been around for decades: understanding all the devices, users, and cloud services they’re responsible for, and whether those assets are secure.
These slides—based on the webinar hosted by leading IT research firm EMA and Axonius—explain why solving asset management for cybersecurity is becoming increasingly important, and why something so fundamental has quickly risen to the top of CISOs priority lists.
Scaling API-first – The story of a global engineering organization
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
1. Solving the Asset Management
Challenge for Cybersecurity:
It’s About Time.
Nathan Burke
CMO, Axonius
Christopher Steffen
Research Director, EMA
2. Solving the Asset Management Challenge for Cybersecurity
(It’s About Time) https://bit.ly/2VzkR3C
Watch the On-Demand Webinar.
3. 1. The Asset Management Mandate for Cybersecurity
2. The Asset Management Challenge
3. The Asset-Related Cybersecurity Use Cases
4. An Approach
5. Questions
AGENDA.
4. WHY DOES ASSET MANAGEMENT MATTER TO CYBERSECURITY?
THE ASSET MANAGEMENT MANDATE
WHY DOES ASSET MANAGEMENT MATTER TO CYBERSECURITY?
THE ASSET MANAGEMENT MANDATE
WHY DOES ASSET MANAGEMENT MATTER TO CYBERSECURITY?
THE ASSET MANAGEMENT MANDATE
8. WHY IS ASSET MANAGEMENT STILL DIFFICULT IN 2021? THE
ASSET MANAGEMENT MANDATE
WHY IS ASSET MANAGEMENT STILL DIFFICULT IN 2021? THE
ASSET MANAGEMENT MANDATE
WHY IS ASSET MANAGEMENT STILL DIFFICULT IN 2021? THE
ASSET MANAGEMENT MANDATE
11. WHAT IS THE IMPACT ON CYBERSECURITY INITIATIVES?
ASSET MANAGEMENT USE CASES FOR CYBERSECURITY
WHAT IS THE IMPACT ON CYBERSECURITY INITIATIVES?
ASSET MANAGEMENT USE CASES FOR CYBERSECURITY
WHAT IS THE IMPACT ON CYBERSECURITY INITIATIVES?
ASSET MANAGEMENT USE CASES FOR CYBERSECURITY
12. 1. Asset Discovery & Inventory
• Traditional, Unmanaged, & Ephemeral devices
• Software Inventory & Coverage
• OS Distribution
• User Accounts & Permissions
CYBERSECURITY AND
ASSET MANAGEMENT.
13. 2. Endpoint Protection
• Devices Missing Agents
• Devices with Agents Not Functioning
CYBERSECURITY AND
ASSET MANAGEMENT.
15. 4. Cloud Security & Configuration
• Cloud VMs Not Being Scanned
• Misconfigured Cloud Workloads
• Cloud Asset Compliance
CYBERSECURITY AND
ASSET MANAGEMENT.
16. 5. Incident Response
• Understanding Device Coverage
• Understanding Context
• Cloud Asset Compliance
• Pivoting Between Alert, Device, State & Users
CYBERSECURITY AND
ASSET MANAGEMENT.
17. 6. GRC and Audit
• Meeting Benchmarks and Regulations
• Satisfying Audit Requirements
CYBERSECURITY AND
ASSET MANAGEMENT.
18. WHAT’S THE SOLUTION? 1 SIMPLE APPROACH
WHAT’S THE SOLUTION? 1 SIMPLE APPROACH
WHAT’S THE SOLUTION? 1 SIMPLE APPROACH
19. THE APPROACH
By connecting to all the
security and management
solutions customers:
• Get a credible, comprehensive
asset inventory
• Discover coverage gaps
• Validate and enforce policies
20. Try it free for 30 days!
https://info.axonius.com/free-trial
21. THANK YOU!
QUESTIONS?
Nathan Burke, Axonius
Chief Marketing Officer
nathan@axonius.com
Christopher Steffen, EMA
Research Director
csteffen@enterprisemanagement.com