
1 minute read
■ Map module
from Sunmap eBook Design
2. Map module
Every system needs a dynamic inventory technique to control the organization’s IT environment as it grows or changes.
Advertisement
SunMap automatically stores, classifies and structures all IT, vulnerabilities, and asset compliance as soon as they appear in the network environment. Users can easily extract actionable insights from our inventory, making it the foundation of their security strategy.
Live inventory
Automatically identify and classify all your assets and vulnerabilities
Complete inventory
Intuitively request any data on assets and export it in multiple formats
Incident Response
Get information about any asset present in your network when an alert is related to it
Data exchange
Cross-link data between the scan and your tools to enrich the results and leverage precision Asset tagging
Tag your asset with default or custom fields to add business context. Tag assets to automatically categorize hosts by using network attributes, such as network address, open ports, OS, installed software, and detected vulnerabilities
Asset profiling
Automatically identifies and classifies the type of OS, ports, services, and certificates running on each device on the network
Attack follow up
Leverage inventory to gain context on what went wrong and when
SUNMAP | 9