Use Case – Lansweeper for Cyber Security
Why Cyber Security Starts with ITAM Data
IT Discovery: A Critical First Step in IT Security
- Gain Complete Visibility of your IT Asset Inventory with Lansweeper
- The First Step in Protecting Anything is Knowing What You Have
Discover assets you don’t even know about and eliminate blind spots.
Anticipate potential cyber security attacks with audit preventive measures.
Get an instant cybersecurity audit across your entire network through valuable reports.
You Can’t Protect What You Don’t Know You Have
For many years, Asset Inventory lists at the very top of most industry-leading security frameworks such as ISO, NIST, and CIS. The discovery of hard- and software data plays a critical role in maintaining an up-to-date synopsis of your entire IT estate to protect yourself against cyber security attacks. Leveraging that collected network data is a fundamental starting point for implementing security measures across your organization.
Create an IT Inventory Baseline for IT Security
With all this information at our fingertips, so much more can be done to ensure that organizations are not only running efficiently but can easily identify cyber security threats and opportunities.
You’re using discovery and inventory data to understand the number of deployed assets, software installations, and other asset-specific information. The IT security department is using data to assess security threats, vulnerabilities, and respond to security incidents. The thing they have in common: the need for complete visibility.
A Critical First Step in Cyber Security
Making IT Discovery a key process of your cyber security management enables you to discover new devices as they come into the organization and inventory all software and hardware across your IT environment. Cases of IT Discovery supporting a response to a security threat include the WannaCry and Meltdown vulnerability exploits. Once identified, IT teams were able to query Lansweeper to find instances of vulnerable software using a custom report.
Instantly Detect Assets the Moment They Connect to the Network
Ensuring that unknown devices – which are far more likely to become a rogue network device – are detected the moment they enter your organization’s network is crucial.
Lansweeper’s Asset Radar detects assets the moment they connect to the network. Combined with our advanced, AI-powered Credential-free Device Recognition technology to recognize and identify these unknown assets, this delivers complete coverage and unmatched inventory accuracy to eliminate blind spots across your IT environment.
How Lansweeper Helps You Go Further
The first step in protecting anything is knowing that an asset exists. Sounds so simple, but a solid cybersecurity program requires reliable inventory and discovery as its foundation. Once you’ve established your asset inventory baseline, you can start to dig deeper.
Where software versions can be identified, vulnerability reports check if the software is not missing any security patches that could leave it exposed.
Monthly Patch Tuesday Report
Every month, Microsoft releases a scheduled security fix, known as ‘Patch Tuesday’. We create a monthly report that checks if the assets in your network are on the latest Patch Tuesday update.
Deploy Software Patches
Mitigate security risks by silently installing and uninstalling software, deploy software updates, make command-line changes, kill processes and run custom scripts.
Is your Windows infrastructure protected against viruses? Identify if there are any Windows devices without anti-virus software and whether the anti-virus is up-to-date.
Check Hardware Warranties
Automatically check the warranty status for your Dell, Fujitsu, HP, IBM, Lenovo or Toshiba assets to make sure that your assets are still under coverage with the manufacturer.
Mitigate Local Admin Risks
Lansweeper tells you which users have Local Administrative Rights on an asset-by-asset basis. Capture all the unauthorized administrators so that you can control who can manage your assets.
Detect Unauthorized Software
Is there any menacing software installed on your corporate workstations? Lansweeper enables you to mark identified software as authorized, unauthorized and neutral.
Report on Hard Drive Encryption
Data protection is often key in a business security policy. Lansweeper automatically scans if your drives are encrypted with BitLocker and if the prerequisites for enabling BitLocker are present.
Leverage Event Log Scanning
With the wealth of information available in the Windows event log, you can keep an eye on anything that might indicate a security risk.
Start Building Your IT Asset System of Truth
Discover assets you don’t even know about and eliminate network blind spots.
LOGON is a pan-asian company operating in China, Hong Kong (HK), India, Singapore, Malaysia, Indonesia, Vietnam, Philippines and Thailand. LOGON has local dedicated trained product specialists in Hong Kong, Guangzhou, Kuala Lumpur, Mumbai and Bangalore. LOGON acts both as value added reseller and sole distributor for award winning software solutions. Customers can buy new licenses, purchase upgrades and renewals from any of our local offices. Contact us for first line support during evaluations, PoCs. We offer best practices consulting services and classroom & online training. Check our site for latest offers, special discounts, bundle deals, etc..