Sunmap eBook Design

Page 9

2. Map module Every system needs a dynamic inventory technique to control the organization’s IT environment as it grows or changes. SunMap automatically stores, classifies and structures all IT, vulnerabilities, and asset compliance as soon as they appear in the network environment. Users can easily extract actionable insights from our inventory, making it the foundation of their security strategy.

Live inventory

Asset tagging

Automatically identify and classify all your assets and vulnerabilities

Intuitively request any data on assets and export it in multiple formats

Tag your asset with default or custom fields to add business context. Tag assets to automatically categorize hosts by using network attributes, such as network address, open ports, OS, installed software, and detected vulnerabilities

Incident Response

Asset profiling

Get information about any asset present in your network when an alert is related to it

Automatically identifies and classifies the type of OS, ports, services, and certificates running on each device on the network

Complete inventory

Data exchange Cross-link data between the scan and your tools to enrich the results and leverage precision

SUNMAP

Attack follow up Leverage inventory to gain context on what went wrong and when

| 9


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Sunmap eBook Design by nafiscreation - Issuu