Sevco Blog

Video Series: Part 2 – You Don’t Know What You Own

Security
Greg
Play Video

Last time, we talked about the weakest link in IT security: the need to ensure that we’re comprehensively deploying our security investments across our environment. But the reality is that getting an accurate asset inventory is extremely difficult.

The problem is siloed tools – no tool has a single, comprehensive view of asset inventory. We have lots of tools that report inventory, but each of these tools provides a siloed view of the assets based on that specific tool’s purpose: 

    • Directory Services such as Active Directory are only aware of the systems coming from registered accounts. 
    • Endpoint technologies are only aware of where they are installed. With their new discovery tools, they may be able to see “other” assets that are near existing agent deployments – but will still miss the 50 BYOD devices from your remote employees that still don’t have an endpoint security agent. 
    • Network-based technologies such as vulnerability scanners or passive network scanners can discover unknown devices, but they can only see those that are connected to the network. They are blind to the remote sales team that rarely connects to the network since and only access SaaS applications like your CRM.

The takeaway is that you have many tools that report asset inventory, but because they are all siloed, none provide a comprehensive view.

Next, we’ll talk about some approaches that teams are taking to tackle this gap.

Subscribe to our blog and receive periodic updates on the latest thought leadership and product updates from Sevco.

Subscribe to our blog and receive periodic updates on the latest thought leadership and product updates from Sevco.

Featured Blogs

Security

Featured: Lorem Ipsum

Why enterprises should boost their CMDB with integrated asset intelligence

Security

Featured: Lorem Ipsum

New “Dirty Pipe” Linux Bug – Are You Sure You Know Your Entire Attack Surface?

Security

Featured: Lorem Ipsum

What CISA Vulnerability Alerts Mean for Your Asset Inventory

Security

Featured: Lorem Ipsum

Video Series: Part 8 – How to Ensure a Successful IT Asset Initiative

Security

Featured: Lorem Ipsum

Video Series: Part 7 – The Impact of an Asset Inventory Initiative

Security

Featured: Lorem Ipsum

Video Series: Part 6 – Asset Telemetry

Resources and
Latest News

Security 3 min read
A CMDB is a foundational tool for managing an enterprise’s IT operations environment. They enable powerful workflows for handling a variety of business processes, such as change management, incident management, and problem management. And because they provide visibility into the interdependencies between the organization’s people, processes, applications, and IT infrastructure, CMDBs are essential for making...
Security 3 min read
For most organizations, the onslaught of vulnerabilities can be overwhelming. Enterprises can go line by line through the CISA list and compare it against their inventory of known IT assets, and the likelihood is that there will still be opportunities for malicious actors to access their network.
Security 3 min read
For most organizations, the onslaught of vulnerabilities can be overwhelming. Enterprises can go line by line through the CISA list and compare it against their inventory of known IT assets, and the likelihood is that there will still be opportunities for malicious actors to access their network.
Security 3 min read
A CMDB is a foundational tool for managing an enterprise’s IT operations environment. They enable powerful workflows for handling a variety of business processes, such as change management, incident management, and problem management. And because they provide visibility into the interdependencies between the organization’s people, processes, applications, and IT infrastructure, CMDBs are essential for making...
Security 3 min read
For most organizations, the onslaught of vulnerabilities can be overwhelming. Enterprises can go line by line through the CISA list and compare it against their inventory of known IT assets, and the likelihood is that there will still be opportunities for malicious actors to access their network.
Security 3 min read
For most organizations, the onslaught of vulnerabilities can be overwhelming. Enterprises can go line by line through the CISA list and compare it against their inventory of known IT assets, and the likelihood is that there will still be opportunities for malicious actors to access their network.