Posts

Webinar – Crouching Users, Hidden Assets

The recent SolarWinds breach and associated malware strains such as Sunburst and Supernova have only served to reinforce the importance of understanding exactly what assets are on your network, who is using them and when. In this webinar we examine some of the key characteristics associated with recent security breaches, such as SolarWinds, and see first hand how Aura Asset Intelligence can be used to quickly discover new or abnormal assets and identities on your network.

In this Webinar, you will learn how to:

  • Identify key asset-related characteristics seen during the recent SolarWinds breach, in order to prepare for future breaches.
  • Quickly discover new and/or duplicate assets on your network that have never been seen before.
  • Identify which of your assets are associated with abnormal identities or activity.
  • Discover users on your network logging in from unusual locations.

Webinar – Know your Unknowns – Strengthen Security with Continuous Asset Discovery for Splunk

Learn how Aura Asset Intelligence, a premium solution for Splunk, provides continuous asset discovery to strengthen your security posture by identifying, and better understanding, unknown assets on the network.

As assets are discovered, Aura answers key questions such as is the asset managed or does it have endpoint protection all while providing reports allowing you to continually measure your organization against key compliance and industry standards. Additionally, see how Aura integrates with Splunk Enterprise Security to ensure security analysts and incident responders can quickly, and easily, assess the true impact of a security incident by understanding the relationships of assets and identities on their network.

Accelerate your Investigations – Associating Assets and Identities to Log Events over Time

We have all been there at some point during a security investigation; staring at a bunch of suspect log events for a specific period of time and trying to figure out who was associated with the IP address found in the event and what asset the IP was assigned to. This task can take security teams hours and hours, depending on the investigation and usually involves trying to manually correlate various different logs or data sets together. However, what if this task could be performed in seconds? Well it can with Aura Asset Intelligence! and in this post, we will show you how this is done and how you can massively accelerate your investigations as a result.

Read more

Reducing Risk Through Legacy Operating System Detection

In this post we will talk about the new Legacy Operating System Detection Report in Aura Asset Intelligence and how it can be used to reduce risk within your corporate environment.

Read more

Continuous CIS Controls Reporting

In the latest release of Aura Asset Intelligence, we introduced the new CIS Controls Report, which provides continuous measurement of several key CIS Controls that are critical to protecting your organization from cyber attack. This post dives into this feature in more detail.

Read more

What’s New in Aura Asset Intelligence 2.1

We are excited to announce the release of Aura Asset Intelligence 2.1. This release includes many new powerful features and enhancements such as new Risk Reports, custom asset field definitions, automated legacy asset retirement and much more!

What’s New in Aura Asset Intelligence 2.0

We are excited to announce the release of Aura Asset Intelligence 2.0. This release includes several new powerful features and enhancements.

Read more