Skip to content

Blockchain and IoT: Forging a Secure Digital Future

Imagine this. A hospital has two IoT devices – a patient monitoring system and an infusion pump. The patient monitoring system tracks vital signs, while the infusion pump system delivers medication based on those readings. Naturally, these IoT devices need to share data to perform their functions correctly. However, the stakes are high: any unauthorized access or manipulation of this communication could lead to dire consequences, including loss of life. This is just one example of how IoT devices rely on data sharing and communication in the real world, and many others exist. For example, smart home devices such as security cameras, door locks, and thermostats must communicate to provide seamless automation and convenience to homeowners. Likewise, IoT devices such as GPS trackers and traffic sensors enable real-time monitoring of traffic conditions and route optimization in transportation. But as these IoT interactions become more common, how will we authenticate, authorize and establish trust between internet-connected machines? Blockchain could — and should — be the answer.

What is Blockchain and How Does it Work?

Blockchain is a decentralized digital ledger that enables secure and transparent recording of transactions between parties. And to protect the integrity of the ledger, blockchain utilizes cryptographic algorithms. Here’s how it works. Each transaction is recorded as a block, with a unique digital signature, timestamp, and a reference to the previous block. This chain of blocks is called the blockchain, and once a block is added, it can’t be altered or deleted (it’s immutable). This ensures the integrity and authenticity of the ledger. But who maintains this ledger? Well, a distributed network of nodes maintains the blockchain network, ensuring that transactions are verified and validated before being added to the chain. No single entity has complete control over the network or data (it’s decentralized).

Why Are IoT Devices So Insecure?

Many manufacturers prioritize getting their products to market quickly, leaving security an afterthought. Additionally, many IoT devices have limited computing power and may not have the resources to implement robust security features. Lastly, there is currently no universally agreed-upon set of security standards for IoT devices, leaving them vulnerable to attacks.

Blockchain IoT Use Cases

The applications of blockchain in IoT and far-reaching and disruptive. Here are some specific blockchain IoT use cases:
  1. Secure communication: Blockchains can establish secure communication channels between IoT devices, preventing unauthorized access to data and ensuring that messages are not tampered with. For example, a smart home security system could use blockchain to securely transmit data between sensors and a central hub, preventing hackers from intercepting or altering the data.
  2. Immutable record-keeping: Blockchain can provide an immutable record of all transactions and communications between IoT devices. Any attempted changes or unauthorized access to the data can be immediately identified and traced back to the source. This is especially critical in industries where data integrity is paramount, like healthcare and finance.
  3. Supply chain management: With blockchain, we can track the movement of goods throughout the supply chain, ensuring no counterfeiting or tampering occurs. For example, a food company could use blockchain to track the movement of its products from the farm to the store, ensuring that they are fresh and safe to eat.
  4. Smart contracts: Organizations can use blockchain to create smart contracts that execute automatically when certain conditions are met. For example, a smart parking system could use blockchain to automatically charge drivers when they park their cars in designated spaces, based on how long they stay parked.
  5. Decentralized data storage: Organizations can use blockchain to store data in a decentralized manner, ensuring that the data remains safe from loss or tampering. For example, a healthcare provider could use blockchain to store patient records, ensuring they are secure and accessible to authorized parties.
  6. Energy management: Blockchain can be used to manage energy distribution more efficiently and transparently. For example, a smart grid system could use blockchain to track the production and consumption of energy and automatically adjust the distribution of energy based on demand.
  7. Identity management: Blockchain can be used to manage digital identities in a secure and decentralized way. For example, an office could use blockchain to manage employee and device identities and provide secure access to services and resources.

How Could Blockchain Solve IoT Security and Scalability Challenges

IoT presents a unique challenge when it comes to security and scalability. With data transactions taking place across multiple devices owned and administered by different organizations, pinpointing the source of any data leaks in case of a cyber attack can be difficult. Additionally, the sheer volume of data generated by the IoT, coupled with multiple stakeholders involved, often leads to accountability disputes. However, blockchain technology offers a promising solution to these challenges. Here’s how:
  • Distributed ledger technology removes the need for trust among involved parties and reduces the risk of unauthorized access or data breaches.
  • Blockchain’s robust encryption provides an additional layer of security that makes it virtually impossible to overwrite existing data records.
  • Blockchain’s transparency allows authorized users to track past transactions and identify the source of any data leakages. It removes any debate about where a breach originated and who is accountable.
  • Blockchain technology enables fast processing of transactions and coordination among billions of connected devices. This will become increasingly important as IoT devices continue to surge in popularity.
  • Blockchain can reduce costs by eliminating the processing overheads related to IoT gateways, such as traditional protocol, hardware, or communication overhead costs.

Final Thoughts

Blockchain technology offers a promising solution to IoT’s security and scalability challenges. With its ability to establish trust, provide robust encryption, offer transparency, enable fast processing of transactions, and automate contractual arrangements, blockchain can transform IoT interactions for the better. As a result, Blockchain IoT technology can help build a safer and more secure future.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

Navigating the MOVEit Transfer vulnerabilities

Last week, Progress Software released yet another patch for the MOVEit file transfer software to address the third in a series of recently discovered vulnerabilities.

If exploited, these vulnerabilities allow an unauthenticated attacker to gain unauthorized access to a MOVEit Transfer database. MOVEit users are urged to apply the latest patch. Until they have done so, software users should follow the mitigation steps provided by the MOVEit team and prepare to update as soon as possible.

Likewise, organizations should also investigate the indicators of compromise published by CISA and Progress Software to determine whether their networks have been potentially compromised. ESET security products detect the webshell payloads seen in the attacks as ASP/Webshell.LZ. Hence
ESET PROTECT customers can search for this detection name as a way of checking whether they have been attacked:

A search result of “No results found” means you have likely not been attacked. However, any hits from the search should trigger a review of the detections on the specific computers/servers where the detections occurred. ESET Inspect customers can see more detail on the actions that occurred prior to the detection of the webshells.

If you have purchased an ESET security service, such as ESET Detection and Response Advanced, make sure to request a threat hunt by one of our security specialists. If you have ESET Detection and Response Ultimate, then our security specialists have likely already performed a hunt in your environment and are actively monitoring for any threat activity related to this attack.

If the installed ESET protection detects ASP/Webshell.LZ within the environment, the customer will want to:
– Verify that they have applied patches as per Progress MOVEit’s advisory
– Review MOVEit IIS logs for known indicators of compromise showing the use of known malicious human2.aspx. This will supply them with dates of the first attempted uses of the malicious webshell, and IP Addresses used by attackers to use the webshell.
  o    GET /human2.aspx

  • human2.aspx = malicious and does not exist on a default install of MOVEit
  • human.aspx = safe and exists on a default install of MOVEit

– Review MOVEit AUDIT logs to look for exfiltrated data using MOVEit’s built in reporting

  o    Create a custom report inside of MOVEit to generate a report of all downloaded files from May/June 2023.

  • Fields: *
  • Tables: log
  • Criteria: Action = ‘file_download’ AND (LogTime LIKE ‘2023-05%’ OR LogTime LIKE ‘2023-06%’)

  o    Compare this report to the dates/timestamps for the use of the webshell identified in IIS logs to find likely exfiltrated files.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

從密碼到密鑰:解開未來資安的鑰匙!

數碼時代來臨,資訊安全成為人們關注的焦點。密碼作為我們網上資訊的守衛,它一直扮演著重要的角色。然而隨著技術的進步和資安風險的增加,密碼的安全性受到了質疑。為了提高安全水平,出現了一種新的身份驗證方式 – 密鑰(Passkey)。

密鑰是一種基於公開 / 私密金鑰加密(Public / Private Key Cryptography)的身份驗證方法。相較於傳統密碼,密鑰不需要記住一長串的字母、數字和符號組合,取而代之的是一個簡單的密鑰,可以是一個短語、圖片、指紋等。這種驗證方式更為安全,因為它基於非對稱加密,需要搭配一對公鑰和私鑰才能進行驗證。

儘管密鑰有著許多優勢,但在實際應用中還存在一些挑戰。首先,使用者需要具備相應的硬件設備或軟件應用程式來生成和管理密鑰。其次,密鑰的使用還需要相關的技術支援,例如支援公鑰基礎結構(PKI)的網站和應用程式。由於密鑰是獨一無二的,一旦遺失或被盜,將導致無法存取相應的資訊。

然而隨著技術的發展,這些問題正在逐漸被解決。例如生物識別技術的進步使得指紋、臉部辨識等成為可能的密鑰選擇。同樣地,硬件密鑰和對於密鑰的安全儲存也取得了重大突破。此外,隨著越來越多的網站和應用程式開始支援密鑰驗證,使用者將更容易適應這一變革。

對於企業來說,密鑰的推廣也具有重要意義。他們應該積極推動密鑰的使用,以提高資訊安全水平。首先企業可以提供相關的教育和培訓,幫助員工了解密鑰的優勢和使用方法。包括解釋密鑰驗證的原理、安全性和便利性,以及如何生成、管理和保護密鑰。企業還可以提供支援和指導,確保員工能夠順利轉換並適應新的身份驗證方式。而對於使用者來說,接受密鑰驗證的轉變可能需要一些時間和適應,因此企業可以進行漸進式的過渡,例如逐步引入密鑰驗證作為選項,讓使用者自主選擇是否採用,同時提供支援和指導,幫助使用者設置和管理他們的密鑰,並回答相關問題。

最後,企業和用戶都應該持續關注資訊安全的最新趨勢和技術進展。這包括密鑰驗證方法的改進、相關漏洞和風險的評估,以及最佳實踐和建議的更新,以確保我們始終處於資訊安全的前沿,保護個人和企業的重要資訊免於洩露和濫用。

總括而言,密碼的傳統方式正在逐漸被密鑰所取代。這種新的身份驗證方式能夠提供更高的安全性和便利性,同時也帶來一些挑戰和適應的需求。然而,通過企業和用戶的共同努力,我們可以實現更強大的資訊安全保護。密鑰的使用需要企業提供教育和培訓,建立支援系統,並進行漸進過渡。同時,用戶需要理解密鑰的優勢和使用方法,並適應這種新的身份驗證方式。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

從密碼到密鑰:解開未來資安的鑰匙!

數碼時代來臨,資訊安全成為人們關注的焦點。密碼作為我們網上資訊的守衛,它一直扮演著重要的角色。然而隨著技術的進步和資安風險的增加,密碼的安全性受到了質疑。為了提高安全水平,出現了一種新的身份驗證方式 – 密鑰(Passkey)。

密鑰是一種基於公開 / 私密金鑰加密(Public / Private Key Cryptography)的身份驗證方法。相較於傳統密碼,密鑰不需要記住一長串的字母、數字和符號組合,取而代之的是一個簡單的密鑰,可以是一個短語、圖片、指紋等。這種驗證方式更為安全,因為它基於非對稱加密,需要搭配一對公鑰和私鑰才能進行驗證。

儘管密鑰有著許多優勢,但在實際應用中還存在一些挑戰。首先,使用者需要具備相應的硬件設備或軟件應用程式來生成和管理密鑰。其次,密鑰的使用還需要相關的技術支援,例如支援公鑰基礎結構(PKI)的網站和應用程式。由於密鑰是獨一無二的,一旦遺失或被盜,將導致無法存取相應的資訊。

然而隨著技術的發展,這些問題正在逐漸被解決。例如生物識別技術的進步使得指紋、臉部辨識等成為可能的密鑰選擇。同樣地,硬件密鑰和對於密鑰的安全儲存也取得了重大突破。此外,隨著越來越多的網站和應用程式開始支援密鑰驗證,使用者將更容易適應這一變革。

對於企業來說,密鑰的推廣也具有重要意義。他們應該積極推動密鑰的使用,以提高資訊安全水平。首先企業可以提供相關的教育和培訓,幫助員工了解密鑰的優勢和使用方法。包括解釋密鑰驗證的原理、安全性和便利性,以及如何生成、管理和保護密鑰。企業還可以提供支援和指導,確保員工能夠順利轉換並適應新的身份驗證方式。而對於使用者來說,接受密鑰驗證的轉變可能需要一些時間和適應,因此企業可以進行漸進式的過渡,例如逐步引入密鑰驗證作為選項,讓使用者自主選擇是否採用,同時提供支援和指導,幫助使用者設置和管理他們的密鑰,並回答相關問題。

最後,企業和用戶都應該持續關注資訊安全的最新趨勢和技術進展。這包括密鑰驗證方法的改進、相關漏洞和風險的評估,以及最佳實踐和建議的更新,以確保我們始終處於資訊安全的前沿,保護個人和企業的重要資訊免於洩露和濫用。

總括而言,密碼的傳統方式正在逐漸被密鑰所取代。這種新的身份驗證方式能夠提供更高的安全性和便利性,同時也帶來一些挑戰和適應的需求。然而,通過企業和用戶的共同努力,我們可以實現更強大的資訊安全保護。密鑰的使用需要企業提供教育和培訓,建立支援系統,並進行漸進過渡。同時,用戶需要理解密鑰的優勢和使用方法,並適應這種新的身份驗證方式。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

The limitations of vulnerability scanners for cyber asset management

Keeping assets safe is a big part of security programs. But how can you keep your assets safe if you don’t even know about them? That’s where asset inventory comes in. Some people try to build an asset inventory using vulnerability scanners. Others combine that vulnerability data with information about their unmanaged assets, even orphaned and rogue devices. That’s what cyber asset attack surface management (CAASM) or cyber asset management is about.

Magnifying glass looking at the matrix

How vulnerability scanners fail at asset inventory

Theoretically, security teams can scan their entire local network for vulnerabilities. In practice, it’s too difficult operationally. Let’s dig into this.

  1. Corporate IoT and OT equipment
    Many vulnerability scan configurations exclude IoT and OT devices. Offices contain many IoT devices like your printers, thermostats, and surveillance cameras. Robotic arms, biomedical devices, and traffic signs are examples of operational technology (OT) devices. They often rely on archaic or uncommon network stacks that can’t handle unexpected input from an aggressive security probe. The device easily freezes or crashes, so security teams exclude them from most vulnerability scans. Some vulnerability scanners are smart enough to detect and automatically exclude fragile devices, but in doing so they also leave a gap in the asset inventory.
  2. Long scan times
    Vulnerability scanners need to cover hundreds of thousands of exposures, each of which requires time and bandwidth to complete. Extrapolate this requirement to your entire enterprise and it’s not a surprise that some vulnerability scans can take weeks to complete. These slow scan cycles lead to stale asset data, and becomes even more so when a scan needs to be split across multiple maintenance windows.
  3. Phantom assets
    Some vulnerability scanners have trouble differentiating between a response from an actual device and an intermediate firewall response or proxy reflecting the traffic. You end up with non-existent devices in your inventory, sometimes even with operating system details.

The point of cyber asset management is to have a full and accurate inventory of what is connected to your network, from IT to OT, cloud to remote devices. If your data is incomplete or inaccurate, it’s just a list of some assets, not an inventory. Leading vulnerability scanners do not provide a full, accurate, current asset inventory in everyday practice.

Insufficient details from credential-less vulnerability scans

Many vulnerability scanners support a discovery-only mode, or “host discovery mode”, that avoids using credentials and security probes. While it avoids using credentials, is faster, and can uncover more unmanaged devices, the results are only marginally better than an ICMP response.

Here’s an example of device details detected by a discovery-only scan of a leading vuln scanner:

  • IPv4 address: 192.168.40.248
  • MAC address: 00:0c:29:59:c4:65
  • Public: No
  • First seen: 05/24/2023 10:39AM
  • Last seen: 05/24/2023 10:39AM

It essentially only includes the IP and MAC addresses of the discovered device – not enough information to be useful for asset inventory.

Potential limitations of vulnerability scanners for managed devices

Vulnerability scanners are a giant collection of security probes you hope can find all the vulnerabilities before the adversary. A vulnerability scanner should be able to collect a ton of information on the devices it can log into. However, vulnerability scanners are not purpose-built for asset inventory and don’t collect as much information as you need in a cyber asset inventory.

Here are the details for the same device as above with a standard authenticated scan by the same product:

    • IPv4 address: 192.168.40.248
    • MAC address: 00:0c:29:59:c4:65
    • Public: No
    • First seen: 05/24/2023 10:39AM
    • Last seen: 05/24/2023 10:39AM
    • Installed software:
      • cpe:/a:apache:http_server:2.4.41
      • cpe:/a:apache:http_server:2.4.99
      • cpe:/a:openbsd:openssh:8.2
      • cpe:/a:elasticsearch:logstash:7.17.6
    • Vulnerabilities:
      • High, Ubiquiti UniFi Network Log4S…, 10, 9.3, 05/24/2023
      • Medium, TLS Version 1.0 Protocol Det…, , 6.1, 05/24/2023
      • Medium, SSL Certificate Cannot Be Tru…, , 6.4, 05/24/2023
      • Medium, SSL Medium Strength Cipher…, 6.1, 5, 05/24/2023
      • Medium, SSL Certificate Cannot Be Tru…,, 6.4, 05/24/2023

125 additional vulnerabilities…

Asset information from this leading scanner includes more details on software and vulnerabilities but few additional asset details, such as exact operating system version or hardware platform.

And the same device scanned by runZero:

Asset information from runZero includes a wealth of information about the device and individual services.

Comparing scans

Let’s compare and contrast what each solution found:

 Host Discovery ScanFull Vuln ScanrunZero
First seen
Last seen
IP address
Secondary IPs
MAC address
Seen by sensor/scanner
Device type
Operating system
Hardware
Outlier score
Vulnerabilities
Hostnames
Domain names
Ownership
Recent user
Open ports
Searchable banners
Protocols
Software products
Upstream switches & ports

runZero creates an asset inventory from multiple sources, one of which is its proprietary scanner, which does not require credentials. Though it’s an unauthenticated, active scanner, it gathers more details than a vulnerability scanner’s authenticated active scanner because it was purpose-built for asset inventory.

Beyond a lack of detail, vulnerability scanners sometimes simply get it wrong. A large telecom customer used a leading vuln scanner and runZero to scan the same device. The leading vuln scanner fingerprinted it as a CentOS Linux device, but runZero accurately identified it as an F5 load balancer, which happened to be running a CentOS-based firmware. Though the vulnerability scanner was superficially accurate, the shallow detail misled the security team to de-prioritize the risk from that device. A public-facing load balancer and a smart light bulb with a private IP address are meaningfully different for a security team. Knowing the operating system is simply not enough.

Unintended risk exposure while verifying vulnerabilities

Vulnerability scanners must use authenticated active scanners to get onto devices to verify on-box vulnerabilities. Unfortunately, if an adversary has compromised or added any device on the network, they can collect and reuse those credentials for privilege escalation or lateral movement. Limiting the scan scope and only scanning trusted devices makes sense, but that further widens the gaps in your asset inventory.

Risks and uncertainty due to missing devices

You can’t even pretend to manage your security posture if you don’t have a full asset inventory. How can you find end-of-life (EOL) devices, insecure configurations, and vulnerabilities if you don’t even know what’s on the network?

Gaps in your asset inventory mean uncertainty. Vulnerability scanners are superb at probing devices to verify the presence of CVEs, as long as you scan everything you should. Scoping scans without knowing where all devices are means you are not scanning your whole network. It is no surprise that the assets missed by vulnerability scans are often unmanaged devices that are behind on patches; after all, the scanner doesn’t have the credentials to authenticate to them so it cannot do a full assessment. These are the types of devices that an adversary hunts for when looking for a foothold in the environment.

CAASM solutions leverage vulnerability data but go far beyond.

You now understand why vulnerability scanners alone cannot answer the question of asset inventory. However, they can be part of the solution.

CAASM solutions combine vulnerability data with other sources:

  • Corporate security solutions via APIs: Many CAASM solutions integrate with EDR, MDM, vulnerability management solutions, and even productivity tools such as Google Workspace to cover all managed devices.
  • Modern network scanners: Some of the best CAASM solutions also use specialized network scanners optimized for asset inventory to find unmanaged IT and OT devices.

As a best practice, all organizations should scan for vulnerabilities wherever possible, prioritize quickly, and remediate them swiftly. An effective vulnerability management program is an essential defensive undertaking for any mature security organization. A full asset inventory stands alongside vulnerability scanning as a core component of the overall program. Learn more about how asset inventory can improve vulnerability management.

A cyber asset management solution that covers assets from IT to OT, cloud to remote devices

runZero is a cyber asset management solution that includes CAASM functionality. It combines integrations with vulnerability management and other sources with a proprietary network scanner that is fast and safe even on fragile IoT and OT networks.

runZero scales up to millions of devices, but it’s easy to try. The free 21-day trial even downgrades to a free version for personal use or organizations with less than 256 devices. Find out what’s connected to your network in less than 20 minutes.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×