Webinar – Crouching Users, Hidden Assets

The recent SolarWinds breach and associated malware strains such as Sunburst and Supernova have only served to reinforce the importance of understanding exactly what assets are on your network, who is using them and when. In this webinar we examine some of the key characteristics associated with recent security breaches, such as SolarWinds, and see first hand how Aura Asset Intelligence can be used to quickly discover new or abnormal assets and identities on your network.

In this Webinar, you will learn how to:

  • Identify key asset-related characteristics seen during the recent SolarWinds breach, in order to prepare for future breaches.
  • Quickly discover new and/or duplicate assets on your network that have never been seen before.
  • Identify which of your assets are associated with abnormal identities or activity.
  • Discover users on your network logging in from unusual locations.

Easily Discover New Assets on your Network

In this blog, we will show you two ways in which Aura can be used to quickly and easily identify new server assets on your network. Being able to detect new servers and understand what assets are on your network is critical to ensuring you maintain the highest levels of security.

Read more

Webinar – Know your Unknowns – Strengthen Security with Continuous Asset Discovery for Splunk

Learn how Aura Asset Intelligence, a premium solution for Splunk, provides continuous asset discovery to strengthen your security posture by identifying, and better understanding, unknown assets on the network.

As assets are discovered, Aura answers key questions such as is the asset managed or does it have endpoint protection all while providing reports allowing you to continually measure your organization against key compliance and industry standards. Additionally, see how Aura integrates with Splunk Enterprise Security to ensure security analysts and incident responders can quickly, and easily, assess the true impact of a security incident by understanding the relationships of assets and identities on their network.

Reducing Risk Through Legacy Operating System Detection

In this post we will talk about the new Legacy Operating System Detection Report in Aura Asset Intelligence and how it can be used to reduce risk within your corporate environment.

Read more

Continuous CIS Controls Reporting

In the latest release of Aura Asset Intelligence, we introduced the new CIS Controls Report, which provides continuous measurement of several key CIS Controls that are critical to protecting your organization from cyber attack. This post dives into this feature in more detail.

Read more