From Visibility to Action.

Cross-device functionality to drive action using plugins.

Using Plugins to Take Action

Once connected to the devices and management systems in a customer's environment via adapters, plugins allow for cross-device functionality using logic. For example, a sample plugin could connect to Active Directory and continuously query for any new OU created.

Axonius Plugins

Ready to see what's possible with a unified view?

Plugin Example: WannaCry

When WannaCry surfaced, it presented an immediate threat to any network running windows and using file sharing. It required immediate action from security teams in order to safeguard their organization. How would we answer the question “which of my devices are vulnerable to WannaCry?”:

  1. First, we would need a list of all machines running Windows within the organization.
  2. We would then need to understand if they are at the patch level that makes them specifically vulnerable to WannaCry.
  3. Since this would require being able to run a command on the devices, and different Windows instances are managed differently (for example some are only managed through SCCM, some have endpoint protection, and others can only be accessed using RDP creds), we would need to go through all these different silos and systems to get the answer.

Axonius plugins answer the question by pulling the relevant data on each device from the respective solution that manages it.

Axonius Uses Adapters to Connect to Existing Solutions

Integrating with Existing Management Solutions

Most organizations have already invested in management and security solutions that do a phenomenal job. The Axonius Cybersecurity Asset Management Platform uses adapters to connect to these systems via APIs to discover, analyze, and correlate device information, creating a unique fingerprint and profile for every device.