TOP 6 SECURITY USE CASES for Automated Asset Inventory
Solution Brief: Top 6 Security Use Cases for Automated Asset Inventory
1
#
Use Case
Pinpoint and prioritize vulnerabilities that are
actively being exploited
Most global organizations are dealing with thousands of vulnerabilities across
thousands of systems and applications. Trying to mitigate them all at once is a lost
cause. With an automated asset inventory that’s correlated to vulnerability
information, it’s easy to run a query that finds assets that have specific
vulnerabilities that are being actively exploited in the wild. After all, these are the
most critical exposures to fix first.
Time is of the essence. In a recent study of data breaches,
99.9% of exploited vulnerabilities were compromised more
than a year after the CVE was published.
– Verizon Data Breach Investigations Report 20151
1
http://www.verizonenterprise.com/DBIR/2015/
page 3
Solution Brief: Top 6 Security Use Cases for Automated Asset Inventory
2
#
Use Case
Find unauthorized software
As the corporate user has gained more control over the computers they use to do
work, IT security teams have had to tolerate the risks associated with having less
control over these endpoints. These risks include malware infection, system
compromise, data leakage, and more – all easily exploited via a simple download
of unauthorized software to a user’s laptop.
Based on these risks, it’s essential for IT security teams to have the ability to query
their assets to discover unauthorized software that is installed and is actively
running. In addition, by setting up alerts to be triggered when unauthorized
software is installed IT gains granular control over policy enforcement and
response – across remote, roaming and distributed endpoints.
Unauthorized software poses risks that can extend beyond cybersecurity
vulnerabilities, threats and exploits. It could also pose legal and financial risks to
your organization if the installed software isn’t authorized or licensed for use.
This enables a new level of real-time risk reporting for your executive
stakeholders, and positions IT security teams as the leaders in transformational
risk management.
page 4
Please complete the form to gain access to this content