• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer

Cybersecurity
Asset ManagementPRESENTED BY

  • Home
  • Features
  • Video
  • Resources
You are here: Home / Features / So many assets, so little visibility: Today’s device inventory challenges

So many assets, so little visibility: Today’s device inventory challenges

By Nathan Burke

Once upon a time, conducting a device inventory was as simple as walking through the office and ticking off the number of computers you had. Nowadays, that sounds like a fairy tale.

Today, that same inventory requires tracking down each device used to access your company’s systems or information by every single employee. It’s no longer a carefree magical journey — it’s a scavenger hunt.

That’s because a typical employee uses more than 4 devices each week.

The takeaway? Device inventories are harder than ever, and that complexity isn’t going away. It’s one of the biggest roadblocks facing asset visibility and security today.

HOW’D WE END UP WITH SO MANY DEVICES?

In 2010, the average person had 1.84 connected devices. In 2020, that number has nearly quadrupled to 6.58. (That’s not even counting the impact of Internet of Things, or IoT, devices, which we’ll cover in a future post.)

The reason for this trend is pretty straightforward: technology is more available than ever. It’s affordable to own so many devices, or to offer multiple work devices to employees.

It’s also about convenience. While it might be more secure — or even company policy — to only use a work laptop, it’s convenient to connect a home computer or a phone to get work done more quickly, in more places. And though it shouldn’t, convenience often trumps security.

That goes hand in hand with another key device trend: BYOD, or bring your own devices. The trend is nothing new, but it also has yet to be fully solved, particularly as the proliferation of devices continues. Companies often struggle to enforce BYOD rules or verify that they’re being followed.

WHAT ARE THE IMPLICATIONS OF THESE TRENDS?

IT complexity has exploded, and with it, the number of devices used by an average employee. One user might use a personal phone, work phone, tablet, laptop and desktop computer within a week to do work. There are more assets, more types of assets, and more employee-owned assets than ever before.

And IT security teams must inventory and secure every single one of them.

SLOWER DEVICE INVENTORIES

All of these challenges combine into one unsurprising but uncomfortable fact. Getting a device and asset inventory — one of the most basic processes in IT and security — is cumbersome, cost-prohibitive, and incredibly time-consuming. They often require multiple weeks of manpower and significant manual labor.

Even worse, device inventories go out of date so frequently that some IT security teams find themselves in a constant state of device inventory rather than device protection.

LESS VISIBILITY

One of the biggest implications of a rising number of devices is a correlated falling level of visibility, and device inventories are more likely to miss hidden assets. In fact, our recent visibility report found that organizations believe they may be blind to 40% of all problematic devices.

According to our report, nearly two thirds of companies that prohibit BYOD believe their employees may be violating those policies. Even when you try to keep devices out, they find their way in. This creates an enormous security risk, because an unknown device is an unsecure device.

MORE SECURITY TOOLS

At the same time, the more devices you have, the more tools you need to track and secure them. Even the difference between an iPhone and a Samsung requires specialized programs to protect those distinct types of asset, and each new device or device type adds strain to IT security teams.

Moreover, IT teams can’t always rely on tried-and-trusted tools when it comes to mobile or personal devices. Those devices may be used on public WiFi or left lying around, unlike desktop computers. As a result, enterprises purchase and implement additional security and management solutions to control all of these scattered devices.

HOW CAN WE ADDRESS THESE CHALLENGES?

In a nutshell: as devices abound, so do the tools required to secure those devices. But device inventories are no longer able to easily identify network devices, so the best security practices often fall short.

That’s particularly true when combined with the visibility challenges highlighted above, because IT security teams have to track down hidden devices or create contingency plans for those gaps. It’s a vicious cycle that feeds into the rise of siloed information during a device inventory.

Many security teams struggle to keep up. It’s a choice between having a million tools to manage that can cover every gap, and having a few tools that do a pretty good job. Security is often compromised as a result: insights from last year’s RSA Conference, for instance, show that many companies fall short of best practices when it comes to mobile security.

For in-depth coverage, download our ESG eBook: 2020 Asset Management Trends: As IT Complexity Increases, Visibility Plummets. You’ll get insights into:

  • Detailed research findings on device adoption, solution deployment, and time to inventory
  • An understanding of the key asset inventory challenges and how organizations are addressing these issues
  • Emerging innovations and approaches to continuous asset discovery and automation

Nathan Burke, Chief Marketing Officer, Axonius

Nathan Burke is the Chief Marketing Officer at Axonius. Passionate about bringing new technologies to market to solve real problems, he has held marketing leadership roles at Hexadite (acquired by Microsoft), Intralinks, MineralTree, CloudLock (acquired by Cisco), and is a frequent speaker and contributing author on topics related to the intersection of collaboration and security. 

Primary Sidebar

The asset management challenge

Tweets by AxoniusInc

Footer

Cybersecurity Asset Management is a partnership between Axonius and SC Media. Its mission is to highlight best practices, thought leadership and important trends related to IT asset management’s evolving role in cybersecurity.

SC Media is cybersecurity. For 30 years SC Media armed information security professionals with in-depth and unbiased information through timely news, comprehensive analysis, cutting-edge features, contributions from thought leaders, custom research, and independent product reviews in partnership with and for top-level information security executives and their technical teams.

Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with over 200 security and management solutions, Axonius is deployed in minutes, improving cyber hygiene immediately.

Contact Us

© 2020 Axonius & SC Media