• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer

Cybersecurity
Asset ManagementPRESENTED BY

  • Home
  • Features
  • Video
  • Resources

Features

Proper cyberhygiene for medical assets

By Scott Mace

If there is one thing medical professionals understand it is hygiene. They remind patients and staff alike to wash their hands and keep equipment clean to prevent creating a breeding ground for viruses. For the hospital’s IT and security teams, cyberhygiene is just as important. Limiting network vulnerabilities using good data security hygiene is essential, but sometimes … [Read more...] about Proper cyberhygiene for medical assets

3 ways IT pros can use Axonius

By Noah Simon

When we talk to people about Axonius for the first time, we often hear this: “Your platform is a Swiss Army knife of sorts.” We’ve even heard, “Your platform is kind of like a platypus (“the Swiss Army knife of animals”) for IT and Security teams.” And that’s true — it is. Our platform touches a variety of different use cases across roles ranging from IT … [Read more...] about 3 ways IT pros can use Axonius

Customer case study: Fast-growing AppsFlyer automates security policy validation with Axonius

By Nathan Burke

Implementing Security Solutions at a Growing Company When he joined mobile attribution and analytics leader AppsFlyer in January 2018, CISO Guy Flechter began implementing a wide-ranging cybersecurity program to protect his heterogeneous environment.  “The nature of our business coupled with how quickly we’ve grown has led to an environment that is far from uniform,” … [Read more...] about Customer case study: Fast-growing AppsFlyer automates security policy validation with Axonius

Managing data compliance and workflows

By Ed Tittel

As companies meet increasingly stringent compliance regulations, the stresses on IT asset management also escalates. This raises two important questions: Can a company fully document its workflow from one asset to another? Can a company be sure that that personally identifiable information (PII), personal health information (PHI) and other protected data is not moving through … [Read more...] about Managing data compliance and workflows

Q&A: Developing an asset management strategy

By SC Contributor

In this installment of our Question and Answer series with Axonius subject matter experts on data and cybersecurity in an IT asset management environment, we talk with Daniel Trauner, director of security at Axonius.  SC Media: Some fast-growth companies that have focused on sales and expansion might not have an effective asset management program. How do you start … [Read more...] about Q&A: Developing an asset management strategy

« Previous Page
Next Page »

Primary Sidebar

The asset management challenge

Tweets by AxoniusInc

Footer

Cybersecurity Asset Management is a partnership between Axonius and SC Media. Its mission is to highlight best practices, thought leadership and important trends related to IT asset management’s evolving role in cybersecurity.

SC Media is cybersecurity. For 30 years SC Media armed information security professionals with in-depth and unbiased information through timely news, comprehensive analysis, cutting-edge features, contributions from thought leaders, custom research, and independent product reviews in partnership with and for top-level information security executives and their technical teams.

Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with over 200 security and management solutions, Axonius is deployed in minutes, improving cyber hygiene immediately.

Contact Us

© 2020 Axonius & SC Media