1 minute read

■ Map module

Next Article
Report

Report

2. Map module

Every system needs a dynamic inventory technique to control the organization’s IT environment as it grows or changes.

Advertisement

SunMap automatically stores, classifies and structures all IT, vulnerabilities, and asset compliance as soon as they appear in the network environment. Users can easily extract actionable insights from our inventory, making it the foundation of their security strategy.

Live inventory

Automatically identify and classify all your assets and vulnerabilities

Complete inventory

Intuitively request any data on assets and export it in multiple formats

Incident Response

Get information about any asset present in your network when an alert is related to it

Data exchange

Cross-link data between the scan and your tools to enrich the results and leverage precision Asset tagging

Tag your asset with default or custom fields to add business context. Tag assets to automatically categorize hosts by using network attributes, such as network address, open ports, OS, installed software, and detected vulnerabilities

Asset profiling

Automatically identifies and classifies the type of OS, ports, services, and certificates running on each device on the network

Attack follow up

Leverage inventory to gain context on what went wrong and when

SUNMAP | 9

This article is from: