You cannot secure what you cannot see. This is where endpoint management comes into play. However, it is difficult to manage endpoints when you have end-user configuration changes, IoT devices constantly popping on and off the network, and you have no way to detect what is on the network on a given time. Our process allows you to manage Cloud/SaaS Applications, Enterprise Mobility Management, Integration Methods & Connectors – through Hardware / Software License Recognition, and Hardware / Software versioning. It will show you everything on your network – including: Hardware makes and models; Software versions, license types and programs, and product use rights; Manufacturer and reseller product codes, SKUs and UNSPC classification data; Physical dimensions, weight, power utilization, and other characteristics; MSRP pricing; Vendor details and much more. They will reveal what assets are in the environment, who manages them, and any security risks.
The ClearArmor process supports all UNIX, Linux, Windows, AS400, IBM operating systems and gathers Data for any IP device Providing:
- Full Detailed Hardware and Software Asset Inventory
- Detailed Hardware and Software Utilization
- Software Distribution
- IoT Device management
- Cloud Management
- Virtual Machine (including host management) Management
- Historical Data
- Change Management Data
- ITSM CMDB Support
- Wireless Device support
- BYOD Management
ClearArmor EndPoint Management Processes:
- Intrusion Detection
- Malware detection
- Log Analysis / SIEM
- Vulnerability Scanning
- White/Black list management
Other processes:
- Threat Alerts (Stix and Taxii)
- Threat Information Sharing
- System Hardening