We’re excited to release the latest version of Aura Asset Intelligence! This release brings a number of significant enhancements to the cyber asset attack surface management capabilities of Aura, some of which are highlighted in this post.
The Cybersecurity and Infrastructure Security Agency (CISA) has recently issued Binding Operational Directive (BOD) 23-01, to make measurable progress toward enhancing visibility into agency assets and associated vulnerabilities. In this post, we outline the requirements of this directive and explain how Aura Asset Intelligence helps to not only meet, but exceed these requirements.
The recent SolarWinds breach and associated malware strains such as Sunburst and Supernova have only served to reinforce the importance of understanding exactly what assets are on your network, who is using them and when. In this webinar we examine some of the key characteristics associated with recent security breaches, such as SolarWinds, and see first hand how Aura Asset Intelligence can be used to quickly discover new or abnormal assets and identities on your network, and uncover hidden assets.
In this Webinar, you will learn how to:
Identify key asset-related characteristics seen during the recent SolarWinds breach, in order to prepare for future breaches.
Quickly discover new and/or duplicate assets on your network that have never been seen before.
Identify which of your assets are associated with abnormal identities or activity.
Discover users on your network logging in from unusual locations.
Aura Asset Intelligence runs on Splunk. If you would like to find out more about uncovering hidden assets or get a demo or free trial, please contact us today.
Learn how Aura Asset Intelligence, a premium solution for Splunk, provides continuous asset discovery to strengthen your security posture by identifying, and better understanding, unknown assets on the network.
As assets are discovered, Aura answers key questions such as is the asset managed or does it have endpoint protection all while providing reports allowing you to continually measure your organization against key compliance and industry standards. Additionally, see how Aura integrates with Splunk Enterprise Security to ensure security analysts and incident responders can quickly, and easily, assess the true impact of a security incident by understanding the relationships of assets and identities on their network.
https://assetintelligence.app/wp-content/uploads/2021/05/knowunknowns.png10791923aai-adminhttps://assetintelligence.app/wp-content/uploads/2020/02/di_aura_2020-300x138.pngaai-admin2021-03-01 02:24:002021-05-05 02:32:49Webinar – Know your Unknowns – Strengthen Security with Continuous Asset Discovery for Splunk
We have all been there at some point during a security investigation; staring at a bunch of suspect log events for a specific period of time and trying to figure out who was associated with the IP address found in the event and what asset the IP was assigned to. This task can take security teams hours and hours, depending on the investigation and usually involves trying to manually correlate various different logs or data sets together. However, what if this task could be performed in seconds? Well it can with Aura Asset Intelligence! and in this post, we will show you how this is done and how you can massively accelerate your investigations as a result.
https://assetintelligence.app/wp-content/uploads/2020/10/forensic_activity_search2-1.png8461757aai-adminhttps://assetintelligence.app/wp-content/uploads/2020/02/di_aura_2020-300x138.pngaai-admin2021-01-05 20:35:072022-11-09 18:33:54Accelerate your Investigations – Associating Assets and Identities to Log Events over Time
https://assetintelligence.app/wp-content/uploads/2020/07/legacy_os_report_blog.png10471920aai-adminhttps://assetintelligence.app/wp-content/uploads/2020/02/di_aura_2020-300x138.pngaai-admin2020-08-13 16:34:282022-11-09 18:44:54Reducing Risk Through Legacy Operating System Detection
In the latest release of Aura Asset Intelligence, we introduced the new CIS Controls Report, which provides continuous measurement of several key CIS Controls that are critical to protecting your organization from cyber attack. This post dives into this feature in more detail.