Cyber Security Asset Management

Rebasoft’s Cyber Security Asset Management (CSAM) is an all-in-one system. It offers multiple native capabilities to help IT security teams who are budget-constrained, overwhelmed and under-resourced. CSAM:

  • Reduces your ransomware risk by up to 86%
  • Improves your cyber resilience and reduces misconfiguration – 96% of networks have misconfigurations that cyber criminals use

Rebasoft’s CSAM system reduces complexity and costs. It is agile and can evolve as your digital transformation gathers pace.​

CSAM is the foundation for security controls as recommended by NIST, ISO, CIS, PCI-DSS Cyber Essentials and more​. Gartner’s Hype Cycle discusses it as Cyber Asset Attack Surface Management.

Constantly discover all of your assets, work out their importance, assess, monitor, and defend against cyber-threats.

Click below to learn more about each Cyber-security asset management area:

How Rebasoft’s CSAM works

  1. Discovery – find all connected assets using our in-built, agentless discovery. Your network is your “sensor”, reporting every connection to Rebasoft. No endpoint should ever be missed. All hardware and software asset information can be flexibly and automatically collected in real-time
  2. Classification – use collected to classify each type of system (eg PC, server, Access Point etc). Customers can also set BIA values for critical systems – this can help in the future to aid prioritisation when remediating security issues
  3. Asset security assessment – using the information collected during discovery and type classification, Rebasoft can perform a continuous assessment of security including network hygiene factors; Anti-malware coverage, secure configuration and Vulnerability assessment
  4. Monitor – the system can look for changes, non-compliance and even the spread of malware across the network, providing early warning of any incidents to reduce the potential impact
  5. Defend – revoke/change network access for non-compliant or rogue devices to reduce the impact of any security breaches without human intervention. Alerts can also be forwarded to external systems for logging, additional analysis or other control actions