Assets

What is unification & unified assets?

Data from multiple attack vectors

Security Center offers several scanning methods and other ways to collect data from different attack vectors in your attack surface - everything from web applications and APIs to networks, hosts, devices, cloud infrastructure, services, and users.

As represented in Security Center, these are different asset types as they require other scanning methods. But within an organization, they can all be on a single asset such as a physical or virtual server, or the endpoint client computer.

Unified assets combine vulnerability data

Unified assets combine vulnerabilities from different sources into a single asset (a unified asset) as they are essentially the same virtual or physical device.

This empowers organizations to pinpoint risks more precisely, as the risk from many different sources is collected into a single unified asset. Fewer products are needed, and your work will be more efficient.

Unification roadmap

The roadmap for making Security Center completely unified can be found here:

https://support.holmsecurity.com/hc/en-us/articles/8285887390108