Axonius is constantly working with our users and advisors, looking for ways to expand our cybersecurity asset management platform. The long-term vision is to best equip our customers to manage and reduce their cyber asset attack surface.
Our goals with our latest product release — version 4.7 — include:
Today, Axonius is excited to announce the general availability of the following enhancements to our cybersecurity asset management platform. The items, below, are only a snapshot of the work we’ve been doing over the last several months.
Vulnerability management is a never-ending challenge. In our previous product rollout, Axonius addressed some basic features to allow customers greater insight to vulnerabilities impacting their assets.
In product release 4.7, we’ve now enhanced vulnerability management capabilities to provide more granularity of vulnerability data, and make that data more actionable for customers that want to reduce cyber risk.
Axonius, in this latest release, added data ingestion from the National Vulnerability Database (NVD) to help our customers more quickly and easily identify known vulnerabilities, their exploitability, and impact scores. Data ingestion from the NVD is automatic, and customers don’t need to turn on any special features or configure new data feeds. This automatic data inclusion allows our customers to better understand known vulnerabilities that could be affecting their organizations and to prioritize remediation.
In addition, the Cybersecurity and Infrastructure Agency (CISA) Known Exploitation Vulnerabilities (KEV) list is now directly integrated within the existing Vulnerability Management Module. As with the NVD data feed, CISA KEV data is automatically imported to our customers’ Axonius environment. The integration allows federal agencies to ensure that they can identify and remediate vulnerabilities according to federal directives. It also gives non-agency organizations guidance on leading practices for prioritizing known vulnerabilities.
NVD and CISA KEV data enrichment allows Axonius users to:
Getting to the right data is a key requirement for asset management and (more broadly) cyber risk management. In the past, it was difficult for Axonius platform users to see all data scopes without a considerable amount of manual configuration.
With our latest release, we’ve made it easier for authorized users to view various data scopes and to be automatically enrolled in those data scopes. Using role-based access control (RBAC), Axonius customers now have a simpler way to see and interact with the data that is relevant to them.
Users can also now dynamically create and assign role-based access permissions based on SAML attributes. Dynamic data scope creation reduces the manual effort of assigning authorized users to data scopes, which is especially helpful in large, distributed organizations. This gives users easier access to the right data, right away
RBAC and data access enhancements allow our customers to:
Axonius has simplified reports management by giving customers greater customization in how they name and download reports. This makes it easier for Axonius users to share asset information with colleagues, executives, and other stakeholders, and makes the presentation of the data clearer. Customers can now choose to download a local copy of the CSV file without having to enable email notifications first, which saves time and effort. What’s more, they can also elect to attach the downloaded file to reports emails, making it simpler to share reports directly with colleagues.
Improved manageability for reporting allows Axonius customers to:
We’ve updated our Cloud Asset Compliance (CAC) center to include the latest guidance from Microsoft. The Center for Internet Security (CIS) Microsoft Azure Foundations Benchmark v1.4.0 has been added to the CAC, making it easier for our customers to manage their Azure environment with recommended cybersecurity practice information, and to comply with industry regulations.
The CIS is continuously updating its benchmarks to help companies address new and evolving security concerns and misconfiguration complexities. The Azure Foundations Benchmark was released by CIS at the end of May 2021. Axonius has incorporated this guidance into our latest product release to facilitate security and compliance.
Cloud asset compliance allows Axonius customers to:
The Axonius Query Wizard is one of the features that our customers like best about our cybersecurity asset management. It gives them the ability to conduct myriad targeted queries using pre-built recommendations, and dive deep into assets and their associated security state to surface vulnerabilities, security gaps, and policy violations.
So, in the vein of continuous improvement, the latest Axonius release provides better solution management and ease of use. We’ve added the ability to:
Customers will also now spend less time managing queries because we’ve added the ability to:
In all, we’ve added a slew of new features to our cybersecurity asset management platform. Here are a few more:
To get the complete lowdown on what’s new with Axonius, contact your sales or customer service liaison, or follow our release notes.
"Culture is the foundation for any high-performing team. We all process information differently, we listen differently. We come from different backgrounds and experiences. No matter who you are, I want to know that. I want to understand what makes you you and treat you the way you want to be treated, not how I project myself onto you.”
— Jen Easterly, director, Cybersecurity and Infrastructure Security Agency (CISA)
“[Create an environment] where people can understand when they can take time off and not feel like everything is going to fall apart. [Where] they have a plan for their career and how they’re going to grow. [Where] they have time to be with their friends and family enough not to be burned out."
— Deidre Diamond, founder and CEO of CyberSN and Security Diversity
“Actively invite engagement, listen with purpose, and look for signs of burnout. You can't expect everyone to feel equally comfortable expressing an opinion, and so it's important to solicit feedback at times as opposed to always passively expecting it. When you are getting engagement, listen with purpose. Make an effort to not only hear what's being said, but understand and empathize. Lastly, look for signs of burnout. … If you're noticing signs of burnout on the team, look for ways to intervene, like ensuring adequate team resourcing/load balancing to create a healthy work/life balance for everyone, and that team members are able to take PTO."
— Daniel Trauner, senior director of security, Axonius
“We need an environment where failure is not only tolerated, but an understood aspect of innovation. Our attackers are failing forward every single day, [and] we deserve the ability to do the same if we are going to protect our people, data, and organizations.”
— Chris Cochran, co-founder at Hacker Valley Media and creative director at Axonius
41 Madison Avenue, 37th Floor
New York, NY 10010