Cybersecurity Starts with ITAM

A good cyber-security solution requires reliable discovery & inventory systems. These are the foundations of a good ITAM solution.

[us_single_image image=”8551″ size=”medium” align=”center”]
[us_single_image image=”8554″ size=”full” align=”center”]

List of CIS Controls

The Center for Internet Security has defined 20 top controls that are critical for IT security. These are classified into

  • Basic CIS Controls
  • Foundation CIS Controls
  • Organisation CIS Controls

The Basic CIS Controls identify two that relate to IT Asset Management
The Organisation CIS Controls identifies one that relates to Incident Response & so closely related to IT Asset Management.

(you can check up the list of controls at https://www.cisecurity.org/controls/cis-controls-list/ )

Links Between ITAM & IT Security

The three CIS Controls that are related to IT Asset Management are

  • Inventory and Control of Hardware Assets
    Inventory, track, and correct all hardware devices on the network
  • Inventory and Control of Software Assets
    Actively manage (inventory, track, and correct) all software on the network so that only authorized software is installed 
  • Incident Response & Management
    Protect the organization’s information, as well as its reputation, by developing and implementing an incident response infrastructure
[us_single_image image=”8043″ size=”us_img_size_0″ align=”center”]
[us_single_image image=”8046″ align=”center”]

Reason why ITAM is key to security

  • Discovers & locates IT Assets
  • Provides relationship of IT Assets with its usage
  • Provides user & ownership details of IT Assets
  • Track non-compute hardware (IoT, Printers, Scanners, Routers, Switches etc)
  • Maps software assets installed on each computer (Server & Desktops/Laptops)
  • Track incidents related to each IT Asset

Your ITAM foundation for Cybersecurity

[us_single_image image=”7897″ size=”full” align=”center”]
keyboard_arrow_up