Axonius Blog

BlueCat and Axonius Provide a New Level of Visibility into Network Devices and Activity

Posted by Nathan Burke on Apr 3, 2019 11:51:03 AM

Visibility is the first step in any cybersecurity strategy.  Before you can lock down your network, you have to know what’s on it.

Read More

Topics: cybersecurity, Axonius

Thoughts From a Rocket Ship: Announcing Our Funding Round

Posted by Dean Sysman on Feb 12, 2019 8:17:22 AM


Read More

Topics: asset management

Axonius Named a Finalist in the RSA Conference 2019 Innovation Sandbox Contest

Posted by Nathan Burke on Feb 5, 2019 8:45:00 AM

On March 4th, Axonius will compete to be named “Most Innovative Startup” at RSAC 2019

Cylance. Cybereason. Phantom. SentinelOne. SumoLogic. Imperva. Axonius. What do they all have in common? All cybersecurity startups that were put on the map after being selected to compete in the Innovation Sandbox Contest at the RSA Conference. 

Read More

Topics: cybersecurity

Join Axonius on Our Next Retreat?

Posted by Sapir Beglaubter on Jan 21, 2019 8:42:03 AM

A glimpse to our last winter retreat that gathered our employees from different locations on the globe in one place at one time.

Read More

Topics: Axonius

Edna Conway on Why Asset Management is Such a Hot Trend

Posted by Nathan Burke on Nov 9, 2018 9:13:47 AM

On this week's episode of the CISO/Security Vendor Relationship Podcast, Edna Conway discussed with co-host David Spark why the Axonius approach to asset management is unique, and why the topic is such a hot trend right now:

Read More

Topics: asset management

Fast-Growing AppsFlyer Automates Security Policy Validation with Axonius

Posted by Nathan Burke on Nov 7, 2018 1:21:41 PM

Implementing Security Solutions at a Growing Company

When he joined mobile attribution and analytics leader App

sFlyer in January 2018, CISO Guy Flechter began implementing a wide-ranging cybersecurity program to protect his heterogenous environment.

“The nature of our business coupled with how quickly we’ve grown has led to an environment that is far from uniform,” said Flechter. “With Windows devices in AD, Macs managed by JAMF, Linux devices managed by Chef, various security tools (such as: end point protection, EDR, deception and more) on every laptop, MDM solutions, deception agents, and so on, the result was a patchwork of security solutions. And although adopting best-of-breed solutions is the right strategy, it becomes a management headache.”

Ensuring Policy Adherence

After implementing the best security tools for every device type, the AppsFlyer team realized that they needed an automated way to ensure that every device had the required solutions installed, and that users had the correct permissions to adhere to the overall security policy.

“We needed an easy and automated way to have clear visibility into which agents were missing from each device, and a way to know when users had rights that conflicted with our security policies. For example, I want to immediately see all Windows devices missing an endpoint agent, unmanaged devices in various VLANs, and I want to know any time a user has been active but hasn’t changed their password in the past 60 days. These are really foundational elements of any cybersecurity program, and there were no good ways to get the answers,” said Flechter.

Read More

Topics: cybersecurity, asset management

Axonius on the CISO/Security Vendor Relationship Podcast

Posted by Nathan Burke on Oct 29, 2018 9:25:55 PM

Read More

Security Metrics: What’s the Value of Nothing Happening?

Posted by Nathan Burke on Sep 28, 2018 10:05:33 AM

Security is probably the only functional business area that is successful if nothing happens.

Read More

Topics: asset management, cybersecurity metrics

Tell Me When Things Aren’t The Way I Want Them.

Posted by Nathan Burke on Aug 30, 2018 1:34:09 PM


Read More

Topics: cybersecurity, asset management, video

A New Metric for Cybersecurity Asset Management: Mean Time to Inventory

Posted by Nathan Burke on May 24, 2018 2:26:00 PM

Recently the topic of continuous asset management for cybersecurity has spawned some interesting discussion. From Daniel Miessler’s piece “If You’re Not Doing Continuous Asset Management You’re Not Doing Security” to Anton Chuvakin’s note about “asset discovery and asset management for the modern era becoming a BIG HUGE problem”, the topic is gaining steam.

Read More

Topics: cybersecurity

Get Access

Subscribe to Email Updates

Recent Posts