2. Map module Every system needs a dynamic inventory technique to control the organization’s IT environment as it grows or changes. SunMap automatically stores, classifies and structures all IT, vulnerabilities, and asset compliance as soon as they appear in the network environment. Users can easily extract actionable insights from our inventory, making it the foundation of their security strategy.
Live inventory
Asset tagging
Automatically identify and classify all your assets and vulnerabilities
Intuitively request any data on assets and export it in multiple formats
Tag your asset with default or custom fields to add business context. Tag assets to automatically categorize hosts by using network attributes, such as network address, open ports, OS, installed software, and detected vulnerabilities
Incident Response
Asset profiling
Get information about any asset present in your network when an alert is related to it
Automatically identifies and classifies the type of OS, ports, services, and certificates running on each device on the network
Complete inventory
Data exchange Cross-link data between the scan and your tools to enrich the results and leverage precision
SUNMAP
Attack follow up Leverage inventory to gain context on what went wrong and when
| 9