- Use Cases
IT and Infrastructure
Become an Axonian
Always looking to mature their security program, the VP of Security Innovation evaluated new capabilities. The VP of Security Innovation wasn’t convinced the IT and Security team had a complete understanding of their assets, and therefore there were unknown security gaps and risks.
This large bank had several integral tools, including a CMDB, endpoint and configuration management, network access control, and vulnerability assessment. The challenge was each of these tools was owned by different teams, so each team had dissimilar views on the technology environment. Moreover, there was no desire to change tools as the bank had stringent processes and risk controls for changes in the technology environment.
Once the VP of Innovation decided to run a proof of concept (POC) of Axonius, the IT and Security team gained immediate insights and a greater understanding of their technology environment. It only took six adapter connections to reveal deployment gaps across their endpoint management and configuration, network access control, and vulnerability assessment solutions. These gaps also meant there were assets missing from the CMDB, as well as missing context for assets known to the CMDB. When assets were known to the CMDB, information was often stale and out of date.
Security Operations, Incident Response, Threat and Vulnerability Management, and IT Service Management functions now leverage Axonius.