Skip to content
Axonius Federal Systems
Partners
Documentation
Blog
Platform
PLATFORM
Axonius Platform
Cybersecurity Asset Management
SaaS Management
MODULES
Software Management
Cloud Asset Compliance
Policy Enforcement
WHY AXONIUS
Our Approach
View Adapters
Explore Our Platform
Solutions
BY TEAM
IT
SECURITY
BY INDUSTRY
Energy
Finance
Healthcare
Manufacturing
State & Local Government
Education
Retail
Technology
View Use Cases
Resources
Resource Center
Case Studies
Blog
Glossary
About
About Axonius
Who We Are
Leadership
AxoniusX
News
Events
Axonius Security Program
Become an Axonian
Careers
Open Jobs
Employee Spotlight
Request A Demo
Request A Free Trial
Search
Platform
Platform
Axonius Platform
Cybersecurity Asset Management
SaaS Management
Modules
Software Management
Cloud Asset Compliance
Policy Enforcement
Why Axonius
Our Approach
View Adapters
Solutions
By Team
IT
Security
By Industry
Energy
Finance
Healthcare
Manufacturing
State and Local Government
Education
Retail
Technology
Resources
Resource Center
Case Studies
Blog
Glossary
About
About Axonius
Who We Are
Leadership
Axonius X
News
Events
Axonius Security Program
Become an Axonian
Careers
Open Jobs
Axonius Federal Systems
Partners
Documentation
Blog
Request A Free Trial
Request A Demo
← See all Adapters
Axonius Cybersecurity Asset Management
runZero
Securely Aggregate and Correlate Asset data with
runZero
runZero
Documentation
runZero
Read more about this adapter on the Axonius Documentation site.
Integrate Axonius with the tools you already use. Explore our adapter categories below.
Directory Services
Directory Services provide rich information about your users, their permissions and password policies, and the devices they use.
Configuration & Patch Management
Configuration and patch management solutions provide diverse information about your devices, the software installed on them, which patches exist, and more.
EDR/EPP
Endpoint security agents used for detection, prevention, and response provide rich information regarding device security posture, vulnerabilities, and whether indicators of compromise are present.
Cloud Infrastructure
Organizations are moving more of their infrastructure to the cloud, making cloud infrastructure a critical datapoint for cybersecurity asset management.
Virtualization
Many of today’s systems - whether they are on-premise or in the cloud - are virtualized, making virtualization platforms a key data source for cybersecurity asset management.
Network
Network Infrastructure data helps you understand when and how devices connect to your network, and whether they’re managed by IT and Security solutions.
Vulnerability Assessment
Vulnerability Assessment solutions identify device configuration and software vulnerabilities, providing critical context for cybersecurity asset management.
CMDB
Connecting CMDB platforms allow you to see which devices are missing from existing asset inventories, and push contextual data to existing asset records.
IAM
Identity Access Management solutions provide a view into employee privileges, authentication activity, and associated devices in use.