Category: Cybersecurity Observability

How to reduce IT entropy caused by Joiners, Movers, and Leavers

How to reduce IT entropy caused by Joiners, Movers, and Leavers

IT entropy is cause by process break down as well as human mistakes. You need to find it before you can fix it. Here we explain how you can use Axonius CAASM to find and fix IT Entropy.

Read More
The Impact of Persona Groups and Use Cases on Asset and Attack Surface Management

The Impact of Persona Groups and Use Cases on Asset and Attack Surface Management

Which persona groups and use cases are impacted by cybersecurity asset and attack surface management?

Read More
CAASM Use Case #14: CMDB Reconciliation and Maintenance

CAASM Use Case #14: CMDB Reconciliation and Maintenance

Not only can Axonius CAASM augment and complement your CMDB: it can improve it filling in the gaps. This is important because your CMDB is a source of truth, and a map of your IT landscape. Many ITSM processes and tools are likely built on top of and integrated with your CMDB.

Read More
CAASM Use Case #13: Identifying and Prioritizing Vulnerabilities

CAASM Use Case #13: Identifying and Prioritizing Vulnerabilities

In this post we dentify and prioritize those pesky vulnerabilities lurking in your environment. Think of it as being the Sherlock Holmes of cybersecurity—piecing together clues and outsmarting the adversaries before they strike.

Read More