Axonius - Intro
  • 1 minute to read
  • Print
  • Share
  • Dark
    Light

Axonius - Intro

  • Print
  • Share
  • Dark
    Light

image.png

The Axonius Cybersecurity Asset Management platform allows security and other organizational teams to

  • Get a credible, comprehensive asset management inventory
  • Discover security coverage gaps
  • Automatically validate and enforce security policies

The Axonius platform does this by connecting to 140+ security and management solutions, collecting and correlating information about devices, cloud instances, and users.

NOTE
There is an interactive tutorial within the solution. To start the tutorial, click image.png button on the top right corner of any screen.

Axonius collected data related to devices and users:

  • Devices – Term to define any computing entity that has an IP address. This includes anything from workstations, servers, local virtual instances, cloud instances and containers, IoT and more.
  • Users – Term to define any identities used in the organization that authenticate and own devices.

After deploying the solution, customers complete the following steps:

  1. Connecting Adapters – connecting to the sources of data for devices and users.
  2. Querying Devices and Users – defining the desired policy for different types of devices and users in different environments.
  3. Defining Enforcement – Using queries to identify whenever a device/user is out of policy and take the relevant action.
  4. Using the Axonius API – in specific scenarios, using the Axonius API to enrich the data of existing business processes.
Was this article helpful?