0
5.3.2
Yokohama, Xanadu, Washington DC, Vancouver
This application provides you with visibility into your enterprise asset inventory and security tool coverage. Use policies provided with the product to identify assets missing key security tools, such as endpoint protection, configuration management, and vulnerability scanning. These policies also identify assets with critical combinations such as missing security tools, vulnerabilities, and internet exposure. Cybersecurity teams can copy existing policies to create their own so they can monitor assets for security tool configurations that are specific to their environments and automate the remediation workflow for identified security gaps.
- Visibility into assets with missing critical security tool coverage, such as endpoint protection and vulnerability assessment.
- Visibility into high-risk combinations that include security tool coverage issues, vulnerabilities, and internet exposure. Note: Currently, only Amazon Web Services (AWS) assets are supported for internet exposure analysis.
- Connect seamlessly with various security and IT tools. Generate insights on the security hygiene and posture of your assets with supported API-based integrations for Service Graph Connectors.
- Use data that has been imported into Vulnerability Response to identify assets with critical and high-risk combinations.
- Create custom policies and insights to monitor assets for their compliance with desired security tool configuration. Identify assets that have critical combinations of missing security tools, vulnerabilities, and internet exposure.
With advanced policy features:
- Create new policies that inherit the conditions of other policies.
- Exclude assets that match existing policies or that are associated with approved exceptions in the Integrated Risk Management (IRM) product.
- Perform an instant search for assets based on:
- Connectors and tools that reported these assets in the CMDB.
- Metadata reported by different tools. For example, with agent-version and core asset data from the CMDB, search for operating system and host-name.
- Converting your searches into a policy for continuous monitoring.
- View complete metadata reported by various connectors or tools for any given asset identified by search queries or policies in the Security Posture Control product.
- Create custom insights to visualize the overall security hygiene and posture of your enterprise assets.
- Control the prioritization of vulnerable items in Vulnerability Response with insights from Security Posture Control. For example, increase the risk score for vulnerable items identified on assets with missing endpoint protection.
Fixed:
- Retired assets are filtered out from key insights.
- The logic for use cases on the Connectors and Dashboard pages.
- Conditions for policies that are included with the application.
- Required plugins and products
- Security Posture Control Core
- Vulnerability Response Licensing and Usage
- Dependencies
- ITOM Discovery licensing