- 08 Mar 2022
- 1 Minute to read
- Print
- DarkLight
- PDF
Axonius Cybersecurity Asset Management: Customer-hosted (on-premise / private cloud)
- Updated on 08 Mar 2022
- 1 Minute to read
- Print
- DarkLight
- PDF
Axonius Cybersecurity Asset Management Solution offers two deployment options:
In on-premise deployments, Axonius is deployed on a virtual appliance that is part of your organization’s internal network.
How It Works & System Architecture
The Axonius solution is deployed as a single virtual appliance. It does not rely on more traditional methods of acquiring data for asset inventories, such as:
- The ability to listen and monitor network traffic.
- The ability to scan the network for systems that are online at the time of the scan.
- The installation of any additional endpoint agents.
To aggregate and correlate asset data, Axonius securely fetches data on periodic and custom discovery cycles from your IT, Security, and Infrastructure solutions using pre-built integrations with hundreds of security and management solutions, known as adapters.
Once the virtual appliance is deployed, the solution utilizes adapters to connect to its target data sources. Each adapter requires basic configuration information, including the hostname or IP address of the target system, and the relevant read only access credentials. For example, in the case of Microsoft Active Directory, the solution needs the IP address or hostname of a Domain Controller and a username/password with sufficient privileges to read all relevant objects.
If an adapter needs to connect to a solution on a separate segregated network, a Collector Node virtual machine (VM) can be deployed to relay the information to the Core Node VM through a dedicated network IP port with all traffic being encrypted across this protocol.
For more details on adapters and enforcement actions, see: