At AnchorPoint Security, we believe that security practitioners and IT professionals have enough to worry about, and more than enough work to do. The first thing to worry about is what’s connected to your network.
Within minutes of our Security Engineers installing the necessary sensors, AnchorPoint Integrated Threat Response (ITR) customers will be able to discover all of the IP-enabled devices on their networks, what software is installed on them, how they’re configured, any potential vulnerabilities and active threats being executed against them.
You’ll be able to quickly answer questions such as:
It’s a problem when you don’t know what’s on your network, or how your devices are configured. Wouldn’t you prefer certainty?
Automated asset discovery can start you on the path to certainty. Anchor Point Integrated Threat Response combines three core discovery and inventory technologies to give you full visibility into the devices that show up on your network
highlights hosts on your network and their installed software packages. Information collected includes:
gently probes your network to coax responses from devices. These responses provide clues that help identify the device, the OS, running services, and the software installed on it. It can often identify the software vendor and version without having to send any credentials to the host.
installation of a lightweight, host-based agent provides an additional, more granular level of visibility. By enumerating all the software installed on the machine, the agent greatly extends, deepens, and enhances your understanding of the devices on your network, resulting in a much more dynamic and accurate inventory.