Try our newly launched, free Community Edition risk report tool

DeviceTotal Partners with Lansweeper to Deliver Accurate Data for Proactive Threat Analysis

DeviceTotal Partners with Lansweeper to Deliver Accurate Data for Proactive Threat Analysis With access to Lansweeper data, DeviceTotal provides 100% risk accuracy and attack vector visibility for every device and site across an organization Israel, 24 November, 2021 – DeviceTotal, a provider of connected devices and IoT security solutions, today announced their partnership with Lansweeper, a leading IT Asset Management platform, to provide mutual customers the ability to upload complete and accurate IT asset data to DeviceTotal’s SaaS-based precognitive attack surface management solution, DeviceTotal. A simple API integration enables the two solutions to work together to eliminate time-consuming, tedious manual tasks, while providing 100% risk accuracy and attack vector visibility, enabling a proactive stance against cyber threats. Covid-19 has impacted businesses globally with long-lasting effects. Employees across industries transitioned to remote working and many of them stayed there. As they connect to corporate networks with various devices over unsecured home networks, they expand the attack surface and open the door for cyber-attacks. To mitigate risk and protect corporate assets and data, organizations must take a proactive approach and implement end-to-end attack surface management that protects against both known and potential zero-day vulnerabilities. Currently, 57% of connected devices are vulnerable to medium or high-severity attacks. Organizations need complete visibility across the expanded attack surface, to implement proactive measures for reducing the risk of cyber threats. Dave Goossens, CEO at Lansweeper states, “Through a partnership and API integration with Lansweeper, ArcusTeam has made it possible for our joint customers to instantly and automatically upload complete and accurate IT asset data to DeviceTotal, its SaaS-based precognitive Attack Surface Management solution. The two solutions work hand in hand to deliver 100% risk accuracy and attack vector visibility, enabling a proactive stance against cyber threats.” “We are pleased to be partnering with Lansweeper. DeviceTotal provides holistic visibility and control over the risk and security posture of all connected devices because it can identify threats before they reach the network,” states Dr. Carmit Yadin, Founder and CEO of DeviceTotal. “Clients who take advantage of the Lansweeper API to upload IT asset data into DeviceTotal reduce operational overhead while gaining access to the benefits of both solutions. Not only do they simplify and improve the process of creating and maintaining a complete and accurate IT asset inventory, but they can also rest assured that DeviceTotal is proactively preparing for and mitigating potential cybersecurity threats across their entire IT estate.” DeviceTotal, Lansweeper and LogOn will be hosting a webinar on 30 November 2021, Hong Kong 5:00pm (GMT +8), Rome 11am CET time (CET +1), USA 1:00am (PST -8), Tel Aviv 11am (CET +2). To register visit the following link. About DeviceTotal DeviceTotal, a provider of connected devices and IoT security solutions, was founded by a team of experienced cyber intrusion professionals. Based on proprietary and advanced technology, a unique, centralized, and unbiased attack surface management SaaS platform, DeviceTotal provides complete visibility to all enterprise devices while continuously predicting, identifying, assessing, prioritizing, and mitigating any potential cyber threats from connected devices. About Lansweeper Lansweeper is an IT Asset Management software provider helping businesses better understand, manage and protect their IT devices and network. Lansweeper helps customers minimize risks and optimize their IT assets by providing actionable insight into their IT infrastructure at all times, offering trustworthy, valuable, and accurate insights about the state of users, devices, and software. Since its launch in 2004, Lansweeper has been developing a software platform that scans and inventory all types of IT devices, installed software, and active users on a network – allowing organizations to centrally manage their IT. The Lansweeper platform currently discovers and monitors over 80 million connected devices from 25,000+ customers, including Mercedes, FC Barcelona, Michelin, NASA, Carlsberg, Nestle, IBM, Nintendo, and Samsung to governments, banks, NGOs, and universities, driven by its 120+ strong teams in Belgium, Spain, and the USA. Schedule your free trial today and see how DeviceTotal can protect your network from Fortinet and other connected device vulnerabilities. Share on facebook Share on twitter Share on linkedin

What is Vulnerability Management and Why Does Your Enterprise Need It?

What is Vulnerability Management and Why Does Your Enterprise Need It? Add Your Heading Text Here Vulnerability management is an ongoing process that is crucial to your enterprise as it helps eliminate and mitigate vulnerabilities that can open an enterprise’s networks up to attack. But what exactly is vulnerability management, what are it’s benefits and challenges, and what can help solve these challenges? Keep reading to find out. Cyberattacks are on the rise and enterprises are scrambling to find ways to protect themselves from falling victim to the next attack. In the year 2020 alone, cybersecurity experts reported 4,000 cyberattacks a day since the onset of Covid-19, a 400% increase from pre-Covid-19 days.  Amidst this exponential rise in cyberattacks, vulnerability management (VM) has become a key buzzword in the realm of cybersecurity as a means to prevent these attacks. But what is vulnerability management and why is it essential that enterprises like yours have it? What is Vulnerability Management Vulnerability management is an ongoing process that is usually performed by IT security teams to eliminate vulnerabilities that pose severe threats to an organization. VM is crucial as its goal is to eliminate vulnerabilities that can open and enterprise’s networks up to attack. The process consists of a few critical steps that together, provide an enterprise with appropriate coverage from attack. Identify: An enterprise needs to identify all of its IT assets across the environment. These IT assets can range from routers, printers, servers, scanners, and other various types of connected devices. Following their identification, they are then correlated to continuously updated vulnerability databases to identify security threats, vulnerabilities, backdoors, and misconfigurations.  Prioritization: Once all IT assets are accounted for, IT security teams need to categorize the devices according to their importance to the enterprise and assign risk-based prioritization.  Risk Assessment: A risk baseline for found vulnerabilities needs to be created and remediated accordingly. While VM solutions will produce long lists of discovered vulnerabilities and assign them to risk ratings, such as Common Vulnerability Scoring System (CVSS) scores, these vulnerabilities still need further assessment. For example, are the vulnerabilities real or false positives, are they exploitable, and are the devices affected by these vulnerabilities essential to business processes? Plan of Action: Once vulnerabilities are assessed, security teams need to decide on the best plan of action for handling them. There are several ways a security team can address discovered vulnerabilities: Remediation would mean completely patching it to prevent exploitation. Mitigation would reduce the chances of the vulnerability being exploited. Mitigation is used when full remediation isn’t always a possibility.  Acceptance, where no action is taken because either the vulnerability is of low threat, or the cost of fixing the vulnerability would outweigh any repercussions of the vulnerability being exploited. A Solution to your Vulnerability Management Problems To overcome the many challenges that enterprises face with the VM process, especially those related to device vulnerability management, Device total platform is created. Unlike traditional VM solutions, DeviceTotal is a fully SaaS, automated solution that generates a unique risk score per vulnerability based on the device’s found vulnerabilities and its role in both its site (physical or logical) and organization. Using this unique risk score, accurate prioritizations are generated that enable security teams to focus on the most critical vulnerabilities first.  Schedule your demo today and see how DeviceTotal can protect your network from vulnerabilities lurking within your connected devices.

Device Vulnerability and Threat Management Solutions: An Overview

Device Vulnerability and Threat Management Solutions: An Overview Traditional device vulnerability and threat management solutions claim to fill gaps in vendor-provided security for connected devices. But how well do they really protect your connected devices, network, and business-valuable assets? In this post, we’ll drill down to see what traditional device security solutions offer, where most companies are still exposed to risk and what can be done to overcome these challenges. The IoT industry has been growing exponentially. This has led to a proliferation of connected devices, which in turn, has changed the threat landscape and led to a sharp increase in IoT device targeting.  From routers to switches, and modems to smartphones, connected devices all have the potential to become entry points for hackers. By exploiting connected device vulnerabilities, hackers are able to gain access to the most sensitive areas of an enterprise’s networks. And while most vendors equip devices with some form of threat detection tools, these solutions are usually specific to already-reported, known vulnerabilities for specific device types and manufacturers, and do not take other vulnerabilities into account. Therefore, companies cannot afford to depend on vendor solutions alone for their device security. Traditional Device Security Solutions Can traditional device vulnerability and threat management solutions fill in these gaps? Let’s find out. Network-Based Solutions Network scanning is basically the mapping of all active devices on a network. This is done by sending a ping to each device and waiting to get a response. Cyber threat detection is conducted by reviewing the responses to see if there are inconsistencies that could point to a threat. It’s like having a teacher calling attendance in class and waiting for each student to respond—slow, and easy to circumvent.   By definition, network scanners are reactive, only detecting attacks after they happen. They have no way to proactively eliminate potential threats, and their support is limited. While they do offer the visibility to identify network-connected endpoints, they rarely incorporate the ability to accurately identify, track, and secure IoT devices. They’re also high risk—scanning gives an external tool access to an enterprise’s network and requires the devices’ credentials to perform the scans. Client/Agent-Based Solutions These endpoint threat management systems work with agents/clients on a connected device to uncover the device vulnerabilities. They were designed for computers, tablets, and phones that have the ability to run agents. However, IoT devices often run custom or outdated operating systems that cannot install agents after manufacturing.  Therefore, connected device manufacturers have to cooperate fully and install the agent during the development of the firmware for this type of solution to be effective. Since manufacturers don’t generally install agents, cybersecurity systems see IoT devices as unknown endpoints, and their security issues are left unattended, exposing the enterprise to attack. Vulnerability Management Solutions Vulnerability management solutions aim to offer a proactive and preventative security alternative but many of them have disadvantages that limit their effectiveness. Most vulnerability management tools are only relevant to connected devices that can install a client or agent. So as explained above, they have limited applicability.  Even when the device does have an agent or client, these VM solutions are still not ideal. For example, they generate a high rate of false positives, leading IT security teams to waste valuable time and resources manually verifying non-existent problems. Another problem is that they do not accurately prioritize vulnerabilities according to the device’s importance in business processes. This often results in less important devices that have a high CVSS score being marked as higher priority than more important devices with lower CVSS scores. Without the proper prioritization, critical devices can slip between the cracks and endanger the enterprise. DeviceTotal- Everything you Need for End-to-End Device Vulnerability and Management DeviceTotal is a complete threat elimination platform for connected devices. DeviceTotal enables you to effortlessly monitor your attack surface and get ahead of cyber threats, before they impact your connected networks. It gives you full visibility into your connected devices while continuously predicting, identifying, assessing, prioritizing, and mitigating cyber threats. How does DeviceTotal Compare to Traditional Solutions? DeviceTotal vs. Network-Based​ Unlike network-based solutions, DeviceTotal is predictive and can identify and eliminate attacks before they reach the network. It proactively scans connected devices and lets you know when device firmware needs to be updated to prevent exploitation.  The DeviceTotal dashboard displays all of the connected devices and shows which are vulnerable to attack, and the risk severity level for each device, making it easy for your security team to decide where to focus its resources. DeviceTotal vs. Client/Agent-Based DeviceTotal doesn’t require any client or agent installation—it identifies each and every device connected to the network by scanning the device’s firmware files. It offers a centralized solution for all devices, even those that aren’t able to install agents due to their outdated or custom operating systems, and prevents them from becoming a security risk. DeviceTotal vs. Vulnerability Management​ With DeviceTotal, there are no false positives. DeviceTotal provides the exact exploitation path for detected vulnerabilities, which allows it to verify that the vulnerability actually exists and can be weaponized in an attack. Even better—DeviceTotal not only identifies public vulnerabilities, it can also identify unknown vulnerabilities. DeviceTotal doesn’t require any network integration, making it a zero-risk solution. Summing it Up In today’s evolving threat landscape, the question isn’t whether your connected devices will be attacked, but when. Proactive threat elimination is the only way to keep your network safe and DeviceTotal is the only solution that offers an agentless, SaaS, zero-risk integration that supports any type of connected device. It’s also the only solution that identifies unknown vulnerabilities, provides mitigation and action plans, and prioritizes security risks according to business impact so that you can focus your resources where they matter most. Ready to get started? Schedule your demo today and see how DeviceTotal can protect your network from vulnerabilities lurking within your connected devices.