Skip to content
    Request A Free Trial
    Securely Aggregate and Correlate Asset data with

    Symantec Control Compliance Suite (CCS)

    Symantec Control Compliance Suite (CCS) is a solution to help identify security gaps and vulnerabilities and automate compliance assessments for over 100 regulations, mandates, and best practice frameworks including GDPR, HIPAA, NIST, PCI and SWIFT. Symantec CCS discovers and inventories all networks and assets including managed and unmanaged devices allowing for assets to be profiled and ranked for risk potential.

    Integrate Axonius with the tools you already use. Explore our adapter categories below.


    Directory Services

    Directory Services provide rich information about your users, their permissions and password policies, and the devices they use.


    Configuration & Patch Management

    Configuration and patch management solutions provide diverse information about your devices, the software installed on them, which patches exist, and more.



    Endpoint security agents used for detection, prevention, and response provide rich information regarding device security posture, vulnerabilities, and whether indicators of compromise are present.


    Cloud Infrastructure

    Organizations are moving more of their infrastructure to the cloud, making cloud infrastructure a critical datapoint for cybersecurity asset management.



    Many of today’s systems - whether they are on-premise or in the cloud - are virtualized, making virtualization platforms a key data source for cybersecurity asset management.



    Network Infrastructure data helps you understand when and how devices connect to your network, and whether they’re managed by IT and Security solutions.


    Vulnerability Assessment

    Vulnerability Assessment solutions identify device configuration and software vulnerabilities, providing critical context for cybersecurity asset management.



    Connecting CMDB platforms allow you to see which devices are missing from existing asset inventories, and push contextual data to existing asset records.



    Identity Access Management solutions provide a view into employee privileges, authentication activity, and associated devices in use.