Date Published: September 2018
Author(s)
Michael Stone (NIST), Chinedum Irrechukwu (MITRE), Harry Perper (MITRE), Devin Wynne (MITRE)
Editor(s)
Leah Kauffman (NIST)
While a physical asset management system can tell you the location of a computer, it cannot answer questions like, “What operating systems are our laptops running?” and “Which devices are vulnerable to the latest threat?” An effective IT asset management (ITAM) solution can tie together physical and virtual assets and provide management with a complete picture of what, where, and how assets are being used. ITAM enhances visibility for security analysts, which leads to better asset utilization and security.
While a physical asset management system can tell you the location of a computer, it cannot answer questions like, “What operating systems are our laptops running?” and “Which devices are vulnerable to the latest threat?” An effective IT asset management (ITAM) solution can tie together physical and...
See full abstract
While a physical asset management system can tell you the location of a computer, it cannot answer questions like, “What operating systems are our laptops running?” and “Which devices are vulnerable to the latest threat?” An effective IT asset management (ITAM) solution can tie together physical and virtual assets and provide management with a complete picture of what, where, and how assets are being used. ITAM enhances visibility for security analysts, which leads to better asset utilization and security.
Hide full abstract
Keywords
asset management; financial sector; information technology asset management; ITAM; personnel security; physical security; operational security
Control Families
Access Control; Assessment, Authorization and Monitoring; Identification and Authentication; Incident Response; Risk Assessment