Asset Discovery and Management

Take the guesswork out of what’s installed across your network

Assets Mgmt Screen

CloudAccess Asset Discovery and Management transcends typical enterprise asset management software offerings. It addresses challenges such as:

assetfilterOur unique interpolation with various security and administrative tools across the enterprise provides the most comprehensive asset management services:

Seamlessly integrate with our on premise and or cloud security solutions.

CloudAccess offers several optional security modules that enhance your Asset Management program. They provide better visibility, proactive analysis of risk, and actionable intelligence to keep your assets secure. Our tight integration between Asset Management and security emphasizes the desired best practices that seamlessly help IT manage and protect the entire environment.

Enhanced scanning and analysis provide better visibility, greater control and actionable intelligence.asset3

Easily manage and control IT Inventories across sites and across your entire IT landscape


Asset Discovery Features

Agentless and/or Agent-based: Agent based asset discovery provides more in-depth analysis.
This requires an agent installed of every inventoried computer. It can also deploy software packages.

  • Asset Discovery for Hardware, OS and Versions, Application software
  • Open port discovery
  • Service discovery
  • Operating System manufacturer and version discovery

Asset Management Features

CloudAccess Security Information and Event Management (SIEM) tools allow you constantly analyze security data and take needed action when policies are broken:

  • Policy Management
  • Configuration Management for service ports, OS and hardware
  • Asset Alarm Integration
  • Detailed Asset Enumeration (requires credentials)
  • Network Profile Management
  • Host-level asset monitoring and inventory management
    – Features log analysis, rootkit detection, system integrity checking a
    Windows registry monitoring.
  • Customizable options for host and network scanning (Speed, range, precision…)
  • Configurable policies and filters

 

.

Monitoring

  • Vulnerability scanning and management (Optional) incl: vulnerability description
  • Hardware monitoring
  • Usage network statistics
  • Time and activity matrices
  • Real-time session monitoring
  • File integrity (HIDS)
  • IP address change detection
  • ARPSpoofing
  • Network abuse
  • MAC address anomaly detection. (Ability to identify changes
    or spoofing. )

CloudAccess uses a SQL database which stores normalized information, allowing strong analysis and data mining capabilities.

  • Compliance automation
    • Hundreds of canned compliance reports
    • Advanced reporting wizard
    • Forensic auditing console
  • Advanced contextual correlation
    • Network and applications
    • Events and flows
    • Asset inventory
    • Intrusion detection
    • Vulnerability assessment/database
    • Reliable attack detection
  • Drill‐down risk oriented analysis
  • Compliance reports and dashboards
  • Automated asset inventory
  • Availability and resource monitoring
  • Comprehensive incident management system
  • Real‐time analysis and reporting
  • Automated network profile and inventory management
  • Hierarchical, distributed architecture
  • Real‐time attack identification
  • Pre‐installed security and compliance directives
  • Integrated wireless, host and network
  • IDS/IPS Connectors for thousands of event sources
  • Flexible and customizable dashboards
  • Granular user management
  • Search
  • Real-time alarms

.

    SEE            READ            TRY       

Read more about CloudSIEM