A unique profile of true asset properties at the physical layer, enabling accurate identification.
Asset Risk Factor
The objective score given to each connected asset, based on its Asset DNA and contextual business, location and rules, to automate risk prioritization.
Asset Risk Management
The ability to see, assess and mitigate all known and shadow assets at any scale as fast as they are connected to a given network.
Cyber Asset Attack Surface Management (CAASM)
A technology that strives to resolve asset visibility challenges by using API integrations to connect with existing data sources to provide a consolidated view of all assets within a network.
CISA Binding Operational Directive 23-01
The Cybersecurity and Infrastructure Security Agency (CISA) issued a Binding Operational Directive (BOD 23-01), aimed at enhancing visibility into agency assets and associated vulnerabilities. Federal agencies must take action in accordance with the directive, which outlines requirements to identify and inventory assets and vulnerabilities on federal networks.
Configuration Management Database (CMDB)
A file storing information about an enterprise’s hardware and software IT assets and the relationships between those assets, providing a structured view of configuration data and the ability to analyze such data.
Cyber Physical Systems
Cyber Physical Systems (CPS) are integrations of computation, networking, and physical processes. When secure, they enable safe, real-time, reliable, resilient and adaptable performance.
IoT Asset Management
The automated process of tracking and managing IoT assets efficiently and effectively to improve an enterprise’s operational efficiency.
A network of objects embedded with sensors, software, and other technologies, that connect, interact, and exchange data with other devices and systems over the internet.
Medical Device Security
The tools, practices, and techniques that prevent unauthorized access to or control over medical devices and the data they store and generate.
The aim of Section 889 is to protect National Security from cyber-attacks carried out by foreign adversaries.