CAASM Use Case #14: CMDB Reconciliation and Maintenance

CAASM Use Case #14: CMDB Reconciliation and Maintenance

Not only can Axonius CAASM augment and complement your CMDB: it can improve it filling in the gaps. This is important because your CMDB is a source of truth, and a map of your IT landscape. Many ITSM processes and tools are likely built on top of and integrated with your CMDB.

Read More
CAASM Use Case #13: Identifying and Prioritizing Vulnerabilities

CAASM Use Case #13: Identifying and Prioritizing Vulnerabilities

In this post we dentify and prioritize those pesky vulnerabilities lurking in your environment. Think of it as being the Sherlock Holmes of cybersecurity—piecing together clues and outsmarting the adversaries before they strike.

Read More
CAASM Use Case #12 – Finding Obsolete Devices

CAASM Use Case #12 – Finding Obsolete Devices

Obsolete devices are those that are still on the network, so accessible to bad actors, but they might be out of support or incompatible with your security tools and processes. Finding them is step one to assessing the threat obsolete devices pose.

Read More
CAASM Use Case #11 – Managing Windows and Linux Servers

CAASM Use Case #11 – Managing Windows and Linux Servers

With user accounts scattered across databases, applications, and cloud services, how can organizations keep track? This post explores the challenges of user inventory management and introduces SJULTRA CAASM, a powerful solution that transforms this daunting task into a streamlined, automated process.

Read More