When we began this journey nearly six months ago, COVID-19 was just starting to get out of control and the various state shutdowns were on the distant horizon. While the scientists and medical professionals tell us we are still in the first wave of the pandemic with records numbers of new cases reported almost daily, many states are starting to re-open operations, schools are … [Read more...] about Normalizing your COVID-induced digital transformation
Featured
IT asset management vs. cybersecurity asset management
“How is IT asset management different from cybersecurity asset management?” We hear this question a lot — and rightfully so. There’s significant overlap of responsibilities between IT asset management (ITAM) and cybersecurity asset management. Yet, these core functions ultimately have different objectives, and often are carried out by different teams. IT … [Read more...] about IT asset management vs. cybersecurity asset management
Q&A: Asset management and risk
In this installment of the Axonius Q&A series, CISO Lenny Zeltser discusses how IT asset management impacts risk management. SC Media: Obviously knowing what your assets are, where they reside, and their lifecycle status are a key part in resource planning. Let’s look at how this impacts risk management. How does asset management play in the overall risk and compliance … [Read more...] about Q&A: Asset management and risk
Managing data compliance and workflows
As companies meet increasingly stringent compliance regulations, the stresses on IT asset management also escalates. This raises two important questions: Can a company fully document its workflow from one asset to another? Can a company be sure that that personally identifiable information (PII), personal health information (PHI) and other protected data is not moving through … [Read more...] about Managing data compliance and workflows
Why unmanaged device discovery is critical for asset management programs
Unmanaged devices present significant security risks for organizations. When these devices are left unidentified, and they’re unprotected, they provide attackers with an entry point into a corporate network. Once these devices have been compromised, it can allow for lateral movement to other machines that may have sensitive data residing on them. With so many connected … [Read more...] about Why unmanaged device discovery is critical for asset management programs