The Asset Inventory Service improves the cybersecurity of your operational technology (OT) and cooperates with versiondog and all standard automation devices used by your OT ecosystem. The monitoring system contains OT asset identification in the form of an active or passive scan, a network risk analysis as well as the ability to identify vulnerabilities and cyberattacks.
The basis for your smart factory – intelligent protection for your OT
Automatic asset detection thanks to active/passive scans as well as import of connected devices from versiondog
- ASSET MANAGEMENT
Manage the data of all your OT assets even if they are connected or not connected to versiondog
- RISK & VULNERABILITY SCORE
Detailed information about risk levels and vulnerabilities for all of your assets
The devices connected in versiondog are automatically updated and added to the existing list along with all existing information. You can also detect any assets (using the active or passive scan of your network) that are not backed up in versiondog at present and therefore not included in your disaster recovery plan. All identified assets will be automatically added to your central inventory list.
Here’s how you can easily eliminate gaps in your disaster recovery strategy.
Manage all of your critical infrastructure assets automatically in a central inventory list. Thanks to the additional detailed information from versiondog, you will receive a clear and straightforward allocation.
Receive all important information (e.g. firmware versions) concerning your critical assets at a glance.
Ensure your device data is up-to-date thanks to the latest common vulnerabilities and exposures (CVE) data and gain access to an extensive library of insecure protocols, misconfigurations and other vulnerable security points.
Gain an automatic assessment of all vulnerabilities, affected assets and the entire industrial network.
Single Source of Truth
Gain overall device transparency as well as automatic device inventory with comprehensive information about hardware, firmware, model, rack slot, IP, manufacturer, etc.
Expanded disaster recovery
Identify additional critical network assets not included in your disaster recovery plan and ensure future backups.
Centralized access, management, and reporting for all assets, including vulnerability and risk assessment.
Reduce total operation costs
Increase productivity, process streamlining and avoid human error. Thanks to reduced manual effort and simplified reporting you achieve more time to concentrate on more important matters.
At the heart of the Asset Inventory Service is the Asset list – this is where all assets in your OT ecosystem are brought together and managed centrally.
1. Automatic transfer of assets present in versiondog
Assets already available in versiondog are imported into the asset list. During this process, the project data available in versiondog is automatically read in and all asset data contained therein is added. Metadata from versiondog, such as a component path or the latest version, are also saved to facilitate asset assignment. Import is performed automatically after a relevant change (e.g., Check-In of a component or (optionally) after each job execution).
2. Perform an active or passive scan of your network
Additional assets belonging to your OT ecosytsem, but which are not yet present in versiondog as components, can be identified and added via an active/passive scan. Vulnerabilities and possible attacks are then determined from all identified assets and the associated information and data.
All identified network assets, which are not yet secured in versiondog, can be automatically imported into versiondog to extend your disaster recovery coverage.
The passive scan is a non-intrusive method achieved by analyzing artefacts. This approach is the least intrusive because the scan only "reads along" and does not interfere with the network. It provides immediate insight and can detect suspicious behavior (attacks or errors) based on device communications. Furthermore, multiple networks can be monitored simultaneously without the need for them to be connected to each other. This method is characterized by ease of use and speed.
The active scan is unique in that it uses both well-known IT-based queries and detection methods such as SNMP queries and proprietary queries. The unique OEM method of querying these assets is used to ensure the highest level of security. The Asset Inventory Service has broad protocol coverage and has developed specialized engines to query each OT asset according to its specific model and vendor.
AUVESY CONFERENCE 2021
OT Security Summit for Automated Industries
"Prevent, Detect, React" – according to this motto this year's AUVESY conference will focus on OT security for automated industries. The highlight of the online event from 18 to 20 May 2021 will be the presentation of the Asset Inventory Service. Find out more now.