Axonius Blog

Fast-Growing AppsFlyer Automates Security Policy Validation with Axonius

Posted by Nathan Burke on Nov 7, 2018 1:21:41 PM

Implementing Security Solutions at a Growing Company

When he joined mobile attribution and analytics leader App

sFlyer in January 2018, CISO Guy Flechter began implementing a wide-ranging cybersecurity program to protect his heterogenous environment.

“The nature of our business coupled with how quickly we’ve grown has led to an environment that is far from uniform,” said Flechter. “With Windows devices in AD, Macs managed by JAMF, Linux devices managed by Chef, various security tools (such as: end point protection, EDR, deception and more) on every laptop, MDM solutions, deception agents, and so on, the result was a patchwork of security solutions. And although adopting best-of-breed solutions is the right strategy, it becomes a management headache.”

Ensuring Policy Adherence

After implementing the best security tools for every device type, the AppsFlyer team realized that they needed an automated way to ensure that every device had the required solutions installed, and that users had the correct permissions to adhere to the overall security policy.

“We needed an easy and automated way to have clear visibility into which agents were missing from each device, and a way to know when users had rights that conflicted with our security policies. For example, I want to immediately see all Windows devices missing an endpoint agent, unmanaged devices in various VLANs, and I want to know any time a user has been active but hasn’t changed their password in the past 60 days. These are really foundational elements of any cybersecurity program, and there were no good ways to get the answers,” said Flechter.

Read More

Topics: asset management, cybersecurity


Tell Me When Things Aren’t The Way I Want Them.

Posted by Nathan Burke on Aug 30, 2018 1:34:09 PM

 

Read More

Topics: cybersecurity, asset management, video


A New Metric for Cybersecurity Asset Management: Mean Time to Inventory

Posted by Nathan Burke on May 24, 2018 2:26:00 PM

Recently the topic of continuous asset management for cybersecurity has spawned some interesting discussion. From Daniel Miessler’s piece “If You’re Not Doing Continuous Asset Management You’re Not Doing Security” to Anton Chuvakin’s note about “asset discovery and asset management for the modern era becoming a BIG HUGE problem”, the topic is gaining steam.

Read More

Topics: cybersecurity


As Cybersecurity Vendors, Are We Making Things Better Than Before?

Posted by Nathan Burke on May 21, 2018 2:41:00 PM

It’s funny how and when inspiration strikes. A few days ago, I was reading our almost 4-year-old one of her favorite books, “We Forgot Brock”. It’s a book I’ve read to hear dozens of times, but this time was different. When I got to the last page and saw the final sentence, it struck me in a way I haven’t been able to forget:

And everything was even better than before.

Read More

Topics: cybersecurity


Bringing Cybersecurity Back to 1985.

Posted by Nathan Burke on Apr 27, 2018 9:38:50 AM

 

Cybersecurity’s Next Best Alternative to Time Travel

Back in the 1980s and 1990s, cybersecurity was easy. Work consisted of PCs connected to networks through a cable. There were no smartphones, BYOD only meant something at fraternity parties, and IoT was science fiction. It was a simpler time. There was no way we could have foreseen the huge changes in the way we work, and the way attackers target corporate information.

Read More

Topics: cybersecurity


The Story of Axonius — Why We are Here Today

Posted by Dean Sysman on Sep 6, 2017 9:55:00 AM

“You want to leave?” He asked me.

“Yes, there’s something I have to do,” I replied.

“Now? We are just getting started,” said my co-founder and CEO.

My former startup, Cymmetria, a Y Combinator graduate, had raised over $10m from leading investors, had many Fortune 500 clients, and was a leading company in one of the fastest growing categories in cybersecurity, deception. You couldn’t find a clearer path to success.

“I have to do it now” was my final reply.

Read More

Topics: cybersecurity, IoT Security


Get Access

Subscribe to Email Updates

Recent Posts