No complete and accurate inventory? == No Security

IT networks are commonly referred to as a modern jungle by their own IT managers. The traditional inventory and asset management tools an organization may use simply cannot cope with the complexity and the dynamic nature of the IT networks. At best they provide information about 50%-60% of the organizational devices. On most organizations one may plug in a device without the knowledge of IT, receiving an IP address and being able to interact with the rest of the network.

The worst part is the effect over the Security of the IT networks. If one is unaware of a certain device then it is also unable to defend it, or defend against it. The security products we buy, and let’s assume they are all best of breed, are deployed only against known devices and entities.

This creates a dangerous situation in which we secure what we know about only. A large number of devices, 20%-50% of additional devices the organization is unaware of,  jeopardizes the stability, the availability and the integrity of the IT networks and the data they carry.

In order to truley security our IT networks we must have a compelte and accurate knowledge with regards to the inventory of the devices that are attached to our networks. an inventory that reflects a true picture of the currently connected devices and must be used as the basis for any security operations.


Tags: ,

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: