Automatic Asset Monitoring
Multi-dimensional Asset Discovery; Shadow Asset Identification
Comprehensive Asset Management; Asset Change Monitoring
In-depth Data Collection
Professional O&M Collection Technology; Cross-platform Network and Host Compatibility
Data Retrieval From Deep Risk Points; Accurate and All-round Real-time Data
Multi-view Ledgers
Business System View; Association view
Asset Type View; O&M view
Lifecycle Management
Sorting of Key Assets; Precise Risk Identification
Categorized and Classified Risk Visualization; Risk Disposal and Tracking
Efficient Risk Detection
Dynamic Risk Detection; Vulnerability Management by Scanners Integration, Secure Configuration Baselines Management, and High-Risk Patches Management
Continuous Risk Identification; Precise Positioning of Impact Scope
Flexible Deployment Modes
Agent-free; Private Cloud Environment Supported
Host Deployment; Network and Security Equipment Supported
Shadow Asset Identification
Issue Analysis:Shadow assets are difficult to be discovered in the data center, posing a huge security risk.
Solution: Use technologies such as network management protocols, network protocols, and host detection technology to discover unmanaged IP addresses and identify shadow assets.
Customer Benefits:Identify shadow assets to mitigate security risks of the data center from the source.
Asset Ledger Sorting
Issue Analysis:The data center contains a large number of assets that cover diverse brands and rapidly change, making it difficult to view the assets clearly.
Solution: Use agent-less technology to collect accurate information about network, host, and software assets and synchronize IT business attributes, building an asset ledger from a business perspective.
Customer Benefits:Obtain an accurate ledger of all IT business assets without deploying an agent.
Vulnerability Management by Scanners Integration
Issue Analysis: The data center allows multiple manufacturers to scan vulnerabilities to improve coverage. However, fragmented management leads to low efficiency.
Solution:Connect multiple vulnerability scanning APIs to centrally associate the scanning results with asset information. Display the results from the business perspective by classification and category.
Customer Benefits:Uniformly scan, display, process, and re-test vulnerabilities to improve efficiency.
Compliance Baseline Verification
Issue Analysis: A lot of compliance baselines need to be met. The data center covers various and numerous assets. The conventional local verification method is time-consuming and inefficient.
Solution: Continuously collect data from probe points on network devices, hosts, and software. Use the asset mid-end to centrally verify configuration baselines.
Customer Benefits:Get rid of agents. Perform automatic and rapid checks, greatly shortening the verification interruption period.