Free asset visibility solution

July 2019 Information Security

Cynet has announced the new Cynet Proactive Visibility tool for end-customers and service providers. The free offering provides fast and efficient asset inventory reporting and attack surface elimination in support of security and productivity tasks that organisations struggle with on an ongoing basis. Immediate access to the Cynet Proactive Visibility tool is available at: https://go.cynet.com/free-visibility-experience

The Cynet Proactive Visibility tool supports IT/security decision makers who acknowledge the lack of visibility as the inhibitor of critical IT operations, whether as end-users or service providers. Using the new offering, administrators can apply the visualisation tool to optimise existing tasks or perform new actions. Other actions that can be performed include:

• Checking if there are systems and apps that are missing security patches;

• Identifying the accurate number of hosts, operating system versions, and installed software;

• Customising and creating asset inventory reports, and

• Discovering risky user accounts and network connections.

Common among today’s enterprise security environments are two areas where the lack of IT system/infrastructure visibility creates challenges. First, there is the maintenance of patched applications, change management procedures and tracking software which can result in system errors over time. This issue is multiplied for security service providers catering to a multitude of customers. With Cynet Proactive Visibility, security administrators can boost the efficiency of security monitoring workflows, enabling MSSPs/MSPs to better address the needs of their customers with greatly reduced efforts.

“There is a critical need for a single-source-of-truth where users get a complete visual of both positive and negative actions/processing taking place across their centralised or distributed IT infrastructure,” said Eyal Gruner, Cynet founder and president. “Our free Proactive Visibility Experience delivers the operational reality of having all this data available with the click of a button, allowing for accurate data-driven decision making.”

Cynet Proactive Visibility is an integrated component of the Cynet 360 Security Platform and includes two additional pillars: Attack Protection, which natively integrating various technologies such as NGAV, EDR, network analytics, UBA and deception; and Response Orchestration, providing a wide set of both pre-built and customisable remediation tools for infected hosts, compromised user accounts, malicious files and attacker-controlled traffic. Cynet is the first vendor to consolidate all the essential breach protection capabilities and apply them on the entire internal environment in a single interface.

See Cynet’s Proactive Visibility tool at https://go.cynet.com/free-visibility-experience





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
Get proactive with cybersecurity
Information Security
The ability to respond effectively to a cybersecurity breach is critical, but the missing piece of the puzzle is a thorough, proactive evaluation to ascertain weaknesses and identify any hidden threats.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
How to securely manage your digital footprint
Information Security Training & Education
Managing your online presence is critical to safeguarding your privacy and security. It is imperative to take a proactive approach, including using robust cybersecurity best practices.

Read more...
The state of code security in 2024
Information Security
The 2024 State of Code Security survey reveals that organisations have continued to shore up application security defences over the last year, according to OpenText Premier Partner iOCO Application Management.

Read more...
What is the level of safety and integrity of the software supply chain?
Information Security IoT & Automation
Organisations are embracing AppSec practices and focusing on their software security posture. However, they highlight that insufficient funding and security resources, plus a disconnect between developers and security teams, remain major roadblocks.

Read more...
Cybercriminals target financial service providers to get at sensitive client data
Information Security
According to Ryan van de Coolwijk, Product Head for cyber at iTOO Special Risks, hackers target financial service providers because they hold sensitive client information that unauthorised individuals could use for fraudulent activities.

Read more...
Fortinet establishes new point-of-presence in South Africa
News & Events Information Security
Fortinet has announced the launch of a new dedicated point-of-presence (POP) in Isando, Johannesburg, to expand the reach and availability of Fortinet Unified SASE for customers across South Africa and southern African countries.

Read more...