{"id":16066,"date":"2019-08-13T09:00:34","date_gmt":"2019-08-13T17:00:34","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/08\/13\/news-9809\/"},"modified":"2019-08-13T09:00:34","modified_gmt":"2019-08-13T17:00:34","slug":"news-9809","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/08\/13\/news-9809\/","title":{"rendered":"How Axonius integrates with Microsoft to help customers solve the cybersecurity asset management challenge"},"content":{"rendered":"<p><strong>Credit to Author: Elizabeth Wolk| Date: Tue, 13 Aug 2019 16:00:38 +0000<\/strong><\/p>\n<p>Despite the amazing and futuristic progression of technologies in cybersecurity, it&#8217;s still incredibly hard to answer the most basic of questions like: how many assets do I have, and do they adhere to my security policy?\u00a0Somewhere along the line, asset management became very mundane compared to the other initiatives we\u2019re responsible for in cybersecurity. Yet everything in cybersecurity lies on a foundation of understanding our devices, cloud instances, users, and the solutions that cover them.<\/p>\n<p>So why is asset management\u2014a problem that has persisted for decades\u2014still an issue in 2019? Today, we look at why asset management remains a challenge, the Axonius approach to cybersecurity asset management, and how integrations with several Microsoft technologies are key to solving the problem and delivering value to organizations around the world.<\/p>\n<h3>The cybersecurity solution paradox<\/h3>\n<p>The more devices you have, the more solutions you implement to manage and secure them. Although one might think that the more security and management solutions at an organization the better, that\u2019s not always the case. We call this the cybersecurity solution paradox: the idea that the more solutions you have, the harder it actually becomes to get answers to very basic questions. All of the information exists in separate silos, making it more difficult to aggregate the data, correlate it, and derive context and meaning.<\/p>\n<p>Watch this <a href=\"https:\/\/vimeo.com\/350359620\" target=\"_blank\" rel=\"noopener\">short video<\/a> outlining today\u2019s asset management challenge.<\/p>\n<p><a href=\"https:\/\/vimeo.com\/350359620\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-89755 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/08\/How-Axonius-integrates-with-Microsoft-1.png\" alt=\"\" width=\"555\" height=\"309\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/08\/How-Axonius-integrates-with-Microsoft-1.png 555w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/08\/How-Axonius-integrates-with-Microsoft-1-300x167.png 300w\" sizes=\"auto, (max-width: 555px) 100vw, 555px\" \/><\/a><\/p>\n<h3>The Axonius approach<\/h3>\n<p>If we were to outline an approach to asset management, we\u2019d want a product to:<\/p>\n<ol>\n<li><strong>Understand which assets are unmanaged<\/strong>\u2014Those devices and cloud instances not being managed or secured by the tools outlined in our security policies.<\/li>\n<li><strong>Understand which managed assets are missing agents<\/strong>\u2014For example, which Windows 10 devices are missing an endpoint agent?<\/li>\n<li><strong>Discover new devices<\/strong>\u2014Any time a new device hits the network, we\u2019d want to know whether it adheres to our security policies.<\/li>\n<li><strong>Give context<\/strong>\u2014If our security operations team gets an alert about a device, we would want to understand what the device is, what\u2019s installed, its patch level, known vulnerabilities, which users have signed in, etc.<\/li>\n<\/ol>\n<p>To get this information, a product would need to be very simple, agentless, and it would:<\/p>\n<ol>\n<li>Connect to every security and management solution that knows about assets.<\/li>\n<li>Collect and normalize all relevant asset and user information.<\/li>\n<li>Correlate the information to know that every asset is unique.<\/li>\n<li>Understand the relationship between users, devices, cloud instances, and the solutions that manage and secure them.<\/li>\n<\/ol>\n<p>This is exactly the approach we took in building the <a href=\"https:\/\/www.axonius.com\/\" target=\"_blank\" rel=\"noopener\">Axonius cybersecurity asset management platform<\/a>. By connecting to <a href=\"https:\/\/www.axonius.com\/platform\/adapters\/\" target=\"_blank\" rel=\"noopener\">over 130 management and security solutions<\/a>, Axonius is able to:<\/p>\n<ul>\n<li><strong>Give customers a credible, comprehensive asset inventory<\/strong>\u2014We include every desktop, laptop, mobile device, virtual machine, server, cloud instance, and IoT device that is managed and unmanaged, cloud or on-premises.<\/li>\n<li><strong>Uncover security solution coverage gaps<\/strong>\u2014Using pre-built and custom queries, customers can understand how every asset stacks up against their policies.<\/li>\n<li><strong>Automatically validate and enforce security policies<\/strong>\u2014Customers can create automated enforcement sets to take action whenever assets do not adhere to their security policies.<\/li>\n<\/ul>\n<p>Axonius is integrated with <a href=\"https:\/\/www.microsoft.com\/en-us\/cloud-platform\/microsoft-intune\" target=\"_blank\" rel=\"noopener\">Microsoft Intune<\/a> and <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/active-directory\/\" target=\"_blank\" rel=\"noopener\">Azure Active Directory (Azure AD)<\/a>, core products in the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/partnerships\/intelligent-security-association#office-SecondaryMessaging-as5mg4b\" target=\"_blank\" rel=\"noopener\">Microsoft Intelligent Security Association (MISA)<\/a>. To help customers better understand exactly what assets they have and whether their assets and users adhere to their security policies, Axonius builds upon Intune by connecting to networking gear itself to learn about assets that aren\u2019t being managed. If your policy states that every mobile device needs to have another security or management solution, Axonius can easily identify those devices that aren\u2019t being protected.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-89758 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/08\/Axonius-1.png\" alt=\"\" width=\"2000\" height=\"934\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/08\/Axonius-1.png 2000w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/08\/Axonius-1-300x140.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/08\/Axonius-1-768x359.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/08\/Axonius-1-1024x478.png 1024w\" sizes=\"auto, (max-width: 2000px) 100vw, 2000px\" \/><\/p>\n<p>Let\u2019s look at two specific examples that show how Axonius customers use integrations with Microsoft to solve their asset management challenges.<\/p>\n<h3>How Appsflyer uses Axonius for better asset management<\/h3>\n<p>When Guy Flechter, joined mobile attribution and analytics leader AppsFlyer in January 2018 as their chief information security officer, he began implementing a wide-ranging cybersecurity program to protect his heterogenous environment. After implementing the best security tools for every device type, the AppsFlyer team realized that they needed an automated way to ensure that every device had the required solutions installed, and that users had the correct permissions to adhere to the overall security policy.<\/p>\n<p>\u201cWe needed an easy and automated way to have clear visibility into which agents were missing from each device, and a way to know when users had rights that conflicted with our security policies. For example, I want to immediately see all Windows devices missing an endpoint agent and unmanaged devices in various VLANs. These are really foundational elements of any cybersecurity program, and there were no good ways to get the answers,\u201d said Flechter.<\/p>\n<p>Using simple queries in Axonius, Flechter was able to get this level of visibility in minutes:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-89757 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/08\/Axonius-2.png\" alt=\"\" width=\"2000\" height=\"996\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/08\/Axonius-2.png 2000w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/08\/Axonius-2-300x149.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/08\/Axonius-2-768x382.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/08\/Axonius-2-1024x510.png 1024w\" sizes=\"auto, (max-width: 2000px) 100vw, 2000px\" \/><\/p>\n<h3>Moving from configuration manager to Intune: No device left behind<\/h3>\n<p>As part of their initiative to be nimble and cloud first, AppsFlyer wanted to move from on-premises Microsoft System Center Configuration Manager (ConfigMgr) to Intune, yet the team needed a way to make sure that no devices were left behind. Using queries from Axonius, Flechter was able to easily monitor the switch to Intune and could prioritize which assets should be moved and in what order. Watch this <a href=\"https:\/\/vimeo.com\/335916620\" target=\"_blank\" rel=\"noopener\">video<\/a> to learn more.<\/p>\n<h3>Understanding user permissions<\/h3>\n<p>In addition to devices, Axonius customers are able to understand how each user compares to the overall security policy. Using information from Active Directory, Azure AD, and other IAM providers, customers are able to understand whenever a user account deviates from what is expected.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-89756 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/08\/Axonius-3.png\" alt=\"\" width=\"2000\" height=\"1004\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/08\/Axonius-3.png 2000w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/08\/Axonius-3-300x151.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/08\/Axonius-3-768x386.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/08\/Axonius-3-1024x514.png 1024w\" sizes=\"auto, (max-width: 2000px) 100vw, 2000px\" \/><\/p>\n<p><em>Example query showing users with bad configurations.<\/em><\/p>\n<h3>Learn more<\/h3>\n<p>To learn more about how the Axonius cybersecurity asset management platform and its many integrations with Microsoft and other leading security and management providers can help your organization, visit <a href=\"https:\/\/www.axonius.com\/\" target=\"_blank\" rel=\"noopener\">Axonius.com<\/a>. Also, visit the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/partnerships\/intelligent-security-association\" target=\"_blank\" rel=\"noopener\">MISA<\/a> website to learn more about how top security companies are partnering with Microsoft to defend against increasingly sophisticated cyberthreats.<\/p>\n<p><strong>About Axonius<\/strong><\/p>\n<p>Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with more than 130 security and management solutions, Axonius is deployed in minutes, improving cyber hygiene immediately. Covering millions of devices at customers like the New York Times, Schneider Electric, and AppsFlyer, Axonius was named the Most Innovative Startup of 2019 at the prestigious RSAC Innovation Sandbox and was named Rookie Security Company of the Year by SC Magazine. For more visit Axonius.com.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/08\/13\/how-axonius-integrates-with-microsoft-to-help-customers-solve-the-cybersecurity-asset-management-challenge\/\">How Axonius integrates with Microsoft to help customers solve the cybersecurity asset management challenge<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Microsoft Security<a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/08\/13\/how-axonius-integrates-with-microsoft-to-help-customers-solve-the-cybersecurity-asset-management-challenge\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Elizabeth Wolk| Date: Tue, 13 Aug 2019 16:00:38 +0000<\/strong><\/p>\n<p>Why is asset management\u2014a problem that has persisted for decades\u2014still an issue in 2019? Axonius is integrating with Microsoft to understand and solve this problem. <\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/08\/13\/how-axonius-integrates-with-microsoft-to-help-customers-solve-the-cybersecurity-asset-management-challenge\/\">How Axonius integrates with Microsoft to help customers solve the cybersecurity asset management challenge<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Microsoft Security<a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[4500],"class_list":["post-16066","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-cybersecurity"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16066","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16066"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16066\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16066"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16066"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16066"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}