The importance of gaining real-time insights
You cannot manage what you do not know.
Building on this principle, IT teams struggle with the challenges of device discovery and inventory in an ever-expanding perimeter where personal devices have become part of everyday work.
The tools used, from simple spreadsheets to the most advanced discovery tools capable of tracking all IT assets that connect to the corporate network, share one key element: they are snapshots of the state of devices that "fade" almost immediately.
The data that return to us are tied to a concept of historicity that does not evolve dynamically like the environment they photograph. In fact, the desire to keep one's computers protected and up-to-date collides with the growing number of vulnerabilities affecting operating systems and applications.
A NIST report recorded more than 18,000 in 2020, of which more than 10,000 are classified as serious or very serious...Based on this data, we can hypothesize 50 new vulnerabilities per day that can be exploited, and the available reports are already late compared to their appearance.
In fact, most of the reports provided are weekly, and it is not always possible to relate all the "security threats", application updates, and critical conditions detected on the device to all the new threats coming from outside. This is because a concept of real-time monitoring is missing.
IT teams have a twofold need: a managerial need for a 360-degree view and control of managed (and unmanaged) devices, and a more operational need, intervening at the perimeter of managed devices with security updates.
The management of new machines is tied to the information base used of which managers must be well aware in order to effectively manage risk. This is where Edge Intelligence technologies come into play: they leverage modern IT infrastructure to transform edge computing activities and data into usable insights.
The Edge, in fact, is where people, devices, and IoT connect to the perimeter of the network. Using Edge Intelligence gives IT teams the ability to query the status of all devices in real time by harnessing the power of AI that aggregates and collects insights into easily usable formats.
The added advantage compared to inventories and discovery activities is precisely its dynamic nature: it provides immediate, intuitive and easily actionable information. It becomes the magic box to query, as if it were a search engine, to:
Edge intelligence technologies such as Ivanti Neurons, our partner Ivanti's UEM platform, in fact, can provide us with valuable data to support endpoint protection activities in the perimeter environment.
Through an information-aggregating dashboard that can be queried in natural language using NLP algorithms, managers can see at a glance the trends that affect machines: knowing how many devices present security risks, what are the reasons and what is the context (their location, for example).
The sensor-based architecture detects applied safety conditions, from:
If we relate the Edge Intelligence data to systems that classify risk severity to prioritize interventions and correct vulnerabilities in an automated manner, operations are also aligned with the managerial view of risk and affect all machines, even those not managed util that moment.
We will explore this topic in our webinar "Let's Prioritize Risk" (in italian language only) scheduled for October. 27th at 2:30 p.m., where we will provide knowledge and tools to manage risk related to vulnerabilities.
Insights
OUR OFFICES
OUR OFFICES
PADUA
Via Arnaldo Fusinato 42, 35137
MILAN
Viale Enrico Forlanini 23, 20134
ROME
Viale Giorgio Ribotta 11, 00144
Copyright © 2022 WEGG S.r.l. • P.I 03447430285 • C.F. 02371140233 • REA 311023
Certified company ISO 9001:2015