TOP 6 SECURITY USE CASES for Automated Asset Inventory

Solution Brief: Top 6 Security Use Cases for Automated Asset Inventory 1 # Use Case Pinpoint and prioritize vulnerabilities that are actively being exploited Most global organizations are dealing with thousands of vulnerabilities across thousands of systems and applications. Trying to mitigate them all at once is a lost cause. With an automated asset inventory that’s correlated to vulnerability information, it’s easy to run a query that finds assets that have specific vulnerabilities that are being actively exploited in the wild. After all, these are the most critical exposures to fix first. Time is of the essence. In a recent study of data breaches, 99.9% of exploited vulnerabilities were compromised more than a year after the CVE was published. – Verizon Data Breach Investigations Report 20151 1 http://www.verizonenterprise.com/DBIR/2015/ page 3 Solution Brief: Top 6 Security Use Cases for Automated Asset Inventory 2 # Use Case Find unauthorized software As the corporate user has gained more control over the computers they use to do work, IT security teams have had to tolerate the risks associated with having less control over these endpoints. These risks include malware infection, system compromise, data leakage, and more – all easily exploited via a simple download of unauthorized software to a user’s laptop. Based on these risks, it’s essential for IT security teams to have the ability to query their assets to discover unauthorized software that is installed and is actively running. In addition, by setting up alerts to be triggered when unauthorized software is installed IT gains granular control over policy enforcement and response – across remote, roaming and distributed endpoints. Unauthorized software poses risks that can extend beyond cybersecurity vulnerabilities, threats and exploits. It could also pose legal and financial risks to your organization if the installed software isn’t authorized or licensed for use. This enables a new level of real-time risk reporting for your executive stakeholders, and positions IT security teams as the leaders in transformational risk management. page 4
Please complete the form to gain access to this content