Brian “Stretch” Meyer, director of federal sales engineering at Axonius, said organizations need what might be called a longitudinal view that takes into ac...
To best understand threats, you need more than static view of software and hardware that might be vulnerable. Brian “Stretch” Meyer, director of federal sales engineering at Axonius, said organizations need what might be called a longitudinal view that takes into account activity affecting a given asset over time.
He used the analogy of a house. A simple asset inventory will list doors, windows and items of content.
Other solutions, Meyer said, “can log events, or the security tools that record an event or an incident.” Such tools “might tell you, what comes through the door or the window, whether someone closed the door behind you, or how long they stayed in the house, if they broke a vase.”
He added, still more-capable tools should be able to tell you “the amount of windows you have in your house, how many doors that you have. Do those doors have windows, locks and alarms? Which doors do not have locks and alarms? Or that the glass break sensor hasn’t reported back to the kitchen in over a month?”
This type of data lets cyber practitioners keep up with assets as they are added, and correlate events recorded in logs in a predictive fashion. Emerging tools, Meyer said, are also able to abstract the complexities of discovery and event response and present cybersecurity practitioners with a simpler interface. That capability can help shorten training times for badly-needed addition to the cyber workforce.
Ultimately, the purpose of total visibility into hardware and software assets is to have no unknown attack surfaces. Anything can be an attack surface, as organizations learned from the Log4j vulnerability.
Meyer says this is why Axonius positions itself as a tool for CAASM – cyber asset attach surface management. This emerging idea is less a specific product, he said, than an architectural approach. CAASM uses application programming interfaces to integrate the data relevant to asset protection.
“A lot of organizations are having a really fundamental challenge, just understanding what those assets are,” Meyer said. CAASM can help “understand your assets, the basic configuration of those assets, what’s installed on those assets, where those assets are, then understand and correlate data around those assets with other tools in the environment.” The result is greater ability to find gaps in your environment “and to take action against that.”
Copyright © 2024 Federal News Network. All rights reserved. This website is not intended for users located within the European Economic Area.
Director, Federal Sales Senior Engineering, Axonius
Host, The Federal Drive, Federal News Network
Director, Federal Sales Senior Engineering, Axonius
With more than 15+ years of experience in the Federal technology industry expanding from DOD to the intelligence community, Brian “Stretch” Meyer is currently the Director of Axonius Federal Sales Engineering. Brian’s career has been marked by success in technical leadership with a robust federal background supporting roles in key positions such as the Security Services Manager at key DOD agencies, managing with direct oversight of the Cybersecurity Architecture and Cybersecurity Engineering divisions on the key Mission Partner Environment (MPE) programs. Brian’s focus is identifying customer's challenges and designing innovative cybersecurity solutions to solve their complex problems. Brian’s distinguished career serving in the United States Air Force has supported engineering solutions in theater, supporting both Operation Inherent Resolve (OIR) and Enduring Freedom – Afghanistan.
Host, The Federal Drive, Federal News Network
Tom Temin has been the host of the Federal Drive since 2006 and has been reporting on technology markets for more than 30 years. Prior to joining Federal News Network, Tom was a long-serving editor-in-chief of Government Computer News and Washington Technology magazines. Tom also contributes a regular column on government information technology.