Subscribe to our blog and receive periodic updates on the latest thought leadership and product updates from Sevco.
New “Dirty Pipe” Linux Bug – Are You Sure You Know Your Entire Attack Surface?
For most organizations, the onslaught of vulnerabilities can be overwhelming. Enterprises can go line by line through the CISA list and compare it against their inventory of known IT assets, and the likelihood is that there will still be opportunities for malicious actors to access their network.
What CISA Vulnerability Alerts Mean for Your Asset Inventory
For most organizations, the onslaught of vulnerabilities can be overwhelming. Enterprises can go line by line through the CISA list and compare it against their inventory of known IT assets, and the likelihood is that there will still be opportunities for malicious actors to access their network.
Video Series: Part 8 – How to Ensure a Successful IT Asset Initiative
Since different tools have different owners across IT and Security teams, we delve into exactly what an initiative like this requires of an organization.
Video Series: Part 7 – The Impact of an Asset Inventory Initiative
The impact that an IT asset inventory initiative can have in an organization is enormous. In our latest video, Sevco co-founder Greg Fitzgerald discusses how an asset inventory initiative can help your team to prioritize its focus on the most pressing IT security issues – something essential when security teams are already overstretched with work.
Video Series: Part 6 – Asset Telemetry
By capturing changes in asset attributes, and IT asset inventory with “Asset Telemetry” enables IT teams to leverage inventory data for an broader set of use cases.
Video Series: Part 5 – Inventory Source Reconciliation
An essential aspect of creating a comprehensive IT asset inventory is reconciling devices across sources. That’s not as easy as it sounds, though: To reconcile the inventory reports from each source, we need to analyze and then correlate the detailed attributes that are reported by them in order to determine the true number of unique assets. In this video, Sevco co-founder, Greg Fitzgerald, discusses how to think about this process so you know what your TRUE IT asset inventory is.
Video Series: Part 4 – Building Automated Asset Inventory Yourself
We’ve met a number of maturity security teams who appreciated the scope of the IT asset inventory problem and decided to address it by developing an in-house, custom application to deliver a comprehensive inventory since no commercial solution existed at the time. Learn what the challenges are with this strategy (and why a solution like Sevco might be better instead).
Video Series: Part 3 – A Manual Inventory of Assets
It’s challenging to get a comprehensive view of your inventory from your many siloed security tools. One approach we’ve seen teams take is to perform a manual reconciliation of inventory reports from the different IT systems. However, this approach has major drawbacks – learn what these drawbacks are in our latest video from Sevco’s co-founder, Greg Fitzgerald.
Video Series: Part 2 – You Don’t Know What You Own
Getting an accurate asset inventory is extremely difficult. The problem is siloed tools – no tool has a single, comprehensive view of asset inventory. We have lots of tools that report inventory, but each of these tools provides a siloed view of the assets based on that specific tool’s purpose. This means any asset inventory that doesn’t reconcile across all tools is missing critical assets. Learn more in this video from Sevco’s co-found, Greg Fitzgerald.