SlideShare uma empresa Scribd logo
1 de 21
Baixar para ler offline
Solving the Asset Management
Challenge for Cybersecurity:
It’s About Time.
Nathan Burke
CMO, Axonius
Christopher Steffen
Research Director, EMA
Solving the Asset Management Challenge for Cybersecurity
(It’s About Time) https://bit.ly/2VzkR3C
Watch the On-Demand Webinar.
1. The Asset Management Mandate for Cybersecurity
2. The Asset Management Challenge
3. The Asset-Related Cybersecurity Use Cases
4. An Approach
5. Questions
AGENDA.
WHY DOES ASSET MANAGEMENT MATTER TO CYBERSECURITY?
THE ASSET MANAGEMENT MANDATE
WHY DOES ASSET MANAGEMENT MATTER TO CYBERSECURITY?
THE ASSET MANAGEMENT MANDATE
WHY DOES ASSET MANAGEMENT MATTER TO CYBERSECURITY?
THE ASSET MANAGEMENT MANDATE
THE ASSET MANAGEMENT MANDATE
THE ASSET MANAGEMENT MANDATE
INDUSTRY SPECIFIC
REGULATIONS
WHY IS ASSET MANAGEMENT STILL DIFFICULT IN 2021? THE
ASSET MANAGEMENT MANDATE
WHY IS ASSET MANAGEMENT STILL DIFFICULT IN 2021? THE
ASSET MANAGEMENT MANDATE
WHY IS ASSET MANAGEMENT STILL DIFFICULT IN 2021? THE
ASSET MANAGEMENT MANDATE
THE ASSET MANAGEMENT PROBLEM
THE ASSET
MANAGEMENT
PROBLEM
WHAT IS THE IMPACT ON CYBERSECURITY INITIATIVES?
ASSET MANAGEMENT USE CASES FOR CYBERSECURITY
WHAT IS THE IMPACT ON CYBERSECURITY INITIATIVES?
ASSET MANAGEMENT USE CASES FOR CYBERSECURITY
WHAT IS THE IMPACT ON CYBERSECURITY INITIATIVES?
ASSET MANAGEMENT USE CASES FOR CYBERSECURITY
1. Asset Discovery & Inventory
• Traditional, Unmanaged, & Ephemeral devices
• Software Inventory & Coverage
• OS Distribution
• User Accounts & Permissions
CYBERSECURITY AND
ASSET MANAGEMENT.
2. Endpoint Protection
• Devices Missing Agents
• Devices with Agents Not Functioning
CYBERSECURITY AND
ASSET MANAGEMENT.
3. Vulnerability Management
• Devices Not Being Scanned
• Prioritizing CVE’s
CYBERSECURITY AND
ASSET MANAGEMENT.
4. Cloud Security & Configuration
• Cloud VMs Not Being Scanned
• Misconfigured Cloud Workloads
• Cloud Asset Compliance
CYBERSECURITY AND
ASSET MANAGEMENT.
5. Incident Response
• Understanding Device Coverage
• Understanding Context
• Cloud Asset Compliance
• Pivoting Between Alert, Device, State & Users
CYBERSECURITY AND
ASSET MANAGEMENT.
6. GRC and Audit
• Meeting Benchmarks and Regulations
• Satisfying Audit Requirements
CYBERSECURITY AND
ASSET MANAGEMENT.
WHAT’S THE SOLUTION? 1 SIMPLE APPROACH
WHAT’S THE SOLUTION? 1 SIMPLE APPROACH
WHAT’S THE SOLUTION? 1 SIMPLE APPROACH
THE APPROACH
By connecting to all the
security and management
solutions customers:
• Get a credible, comprehensive
asset inventory
• Discover coverage gaps
• Validate and enforce policies
Try it free for 30 days!
https://info.axonius.com/free-trial
THANK YOU!
QUESTIONS?
Nathan Burke, Axonius
Chief Marketing Officer
nathan@axonius.com
Christopher Steffen, EMA
Research Director
csteffen@enterprisemanagement.com

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Cyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in DepthCyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in Depth
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
Cloud security
Cloud security Cloud security
Cloud security
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleWalk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
 
Azure Security Center- Zero to Hero
Azure Security Center-  Zero to HeroAzure Security Center-  Zero to Hero
Azure Security Center- Zero to Hero
 
Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security Demystified
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 
Compliance in the Cloud Using “Security by Design” Principles
Compliance in the Cloud Using “Security by Design” PrinciplesCompliance in the Cloud Using “Security by Design” Principles
Compliance in the Cloud Using “Security by Design” Principles
 
(ISC)2 CCSP - Certified Cloud Security Professional
(ISC)2 CCSP - Certified Cloud Security Professional(ISC)2 CCSP - Certified Cloud Security Professional
(ISC)2 CCSP - Certified Cloud Security Professional
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity Framework
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architecture
 
Cyber security career development paths
Cyber security career development pathsCyber security career development paths
Cyber security career development paths
 
2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+Design
 
Understanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM iUnderstanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM i
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
 

Semelhante a Solving the Asset Management Challenge for Cybersecurity (It’s About Time)

AWS Summit Tel Aviv - Security Keynote
AWS Summit Tel Aviv - Security KeynoteAWS Summit Tel Aviv - Security Keynote
AWS Summit Tel Aviv - Security Keynote
Amazon Web Services
 

Semelhante a Solving the Asset Management Challenge for Cybersecurity (It’s About Time) (20)

Security as a top of mind issue for mobile application development
Security as a top of mind issue for mobile application developmentSecurity as a top of mind issue for mobile application development
Security as a top of mind issue for mobile application development
 
CSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudCSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the Cloud
 
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnoxZero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
 
2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk Management2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk Management
 
CSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudCSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the Cloud
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
 
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and ControlWhose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Future-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical ThreatsFuture-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical Threats
 
Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the Cloud
 
SRE and Security: Natural Force Multipliers
SRE and Security: Natural Force MultipliersSRE and Security: Natural Force Multipliers
SRE and Security: Natural Force Multipliers
 
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...
 
Big Data Security: Facing the challenge
Big Data Security: Facing the challengeBig Data Security: Facing the challenge
Big Data Security: Facing the challenge
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
AWS Summit Tel Aviv - Security Keynote
AWS Summit Tel Aviv - Security KeynoteAWS Summit Tel Aviv - Security Keynote
AWS Summit Tel Aviv - Security Keynote
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...
 
The New Security Practitioner
The New Security PractitionerThe New Security Practitioner
The New Security Practitioner
 
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
 

Mais de Enterprise Management Associates

Mais de Enterprise Management Associates (20)

Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
 
Real-world incident response, management, and prevention
Real-world incident response, management, and preventionReal-world incident response, management, and prevention
Real-world incident response, management, and prevention
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
 
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizations
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
 
Transcending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in AuthenticationTranscending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in Authentication
 
Modernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network MonitoringModernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network Monitoring
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and Opportunities
 
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...
 
CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?
 
Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Solving the Asset Management Challenge for Cybersecurity (It’s About Time)

  • 1. Solving the Asset Management Challenge for Cybersecurity: It’s About Time. Nathan Burke CMO, Axonius Christopher Steffen Research Director, EMA
  • 2. Solving the Asset Management Challenge for Cybersecurity (It’s About Time) https://bit.ly/2VzkR3C Watch the On-Demand Webinar.
  • 3. 1. The Asset Management Mandate for Cybersecurity 2. The Asset Management Challenge 3. The Asset-Related Cybersecurity Use Cases 4. An Approach 5. Questions AGENDA.
  • 4. WHY DOES ASSET MANAGEMENT MATTER TO CYBERSECURITY? THE ASSET MANAGEMENT MANDATE WHY DOES ASSET MANAGEMENT MATTER TO CYBERSECURITY? THE ASSET MANAGEMENT MANDATE WHY DOES ASSET MANAGEMENT MATTER TO CYBERSECURITY? THE ASSET MANAGEMENT MANDATE
  • 8. WHY IS ASSET MANAGEMENT STILL DIFFICULT IN 2021? THE ASSET MANAGEMENT MANDATE WHY IS ASSET MANAGEMENT STILL DIFFICULT IN 2021? THE ASSET MANAGEMENT MANDATE WHY IS ASSET MANAGEMENT STILL DIFFICULT IN 2021? THE ASSET MANAGEMENT MANDATE
  • 11. WHAT IS THE IMPACT ON CYBERSECURITY INITIATIVES? ASSET MANAGEMENT USE CASES FOR CYBERSECURITY WHAT IS THE IMPACT ON CYBERSECURITY INITIATIVES? ASSET MANAGEMENT USE CASES FOR CYBERSECURITY WHAT IS THE IMPACT ON CYBERSECURITY INITIATIVES? ASSET MANAGEMENT USE CASES FOR CYBERSECURITY
  • 12. 1. Asset Discovery & Inventory • Traditional, Unmanaged, & Ephemeral devices • Software Inventory & Coverage • OS Distribution • User Accounts & Permissions CYBERSECURITY AND ASSET MANAGEMENT.
  • 13. 2. Endpoint Protection • Devices Missing Agents • Devices with Agents Not Functioning CYBERSECURITY AND ASSET MANAGEMENT.
  • 14. 3. Vulnerability Management • Devices Not Being Scanned • Prioritizing CVE’s CYBERSECURITY AND ASSET MANAGEMENT.
  • 15. 4. Cloud Security & Configuration • Cloud VMs Not Being Scanned • Misconfigured Cloud Workloads • Cloud Asset Compliance CYBERSECURITY AND ASSET MANAGEMENT.
  • 16. 5. Incident Response • Understanding Device Coverage • Understanding Context • Cloud Asset Compliance • Pivoting Between Alert, Device, State & Users CYBERSECURITY AND ASSET MANAGEMENT.
  • 17. 6. GRC and Audit • Meeting Benchmarks and Regulations • Satisfying Audit Requirements CYBERSECURITY AND ASSET MANAGEMENT.
  • 18. WHAT’S THE SOLUTION? 1 SIMPLE APPROACH WHAT’S THE SOLUTION? 1 SIMPLE APPROACH WHAT’S THE SOLUTION? 1 SIMPLE APPROACH
  • 19. THE APPROACH By connecting to all the security and management solutions customers: • Get a credible, comprehensive asset inventory • Discover coverage gaps • Validate and enforce policies
  • 20. Try it free for 30 days! https://info.axonius.com/free-trial
  • 21. THANK YOU! QUESTIONS? Nathan Burke, Axonius Chief Marketing Officer nathan@axonius.com Christopher Steffen, EMA Research Director csteffen@enterprisemanagement.com