-
Security Announcements
-
Product News
-
Next-Gen Vulnerability Management
-
Getting Started
-
General
-
Operating Status
-
System & Network Scanning
-
Web Application Scanning
-
Cloud Scanning (CSPM)
-
API Scanning
-
Phishing & Awareness Training
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset Management
-
Vulnerability Manager
-
Reports
-
Digest Reports
-
Organizer
-
Continuous Monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & Conditions
What is unification & unified assets?
Data from multiple attack vectors
Security Center offers several scanning methods and other ways to collect data from different attack vectors in your attack surface - everything from web applications and APIs to networks, hosts, devices, cloud infrastructure, services, and users.
As represented in Security Center, these are different asset types as they require other scanning methods. But within an organization, they can all be on a single asset such as a physical or virtual server, or the endpoint client computer.
Unified assets combine vulnerability data
Unified assets combine vulnerabilities from different sources into a single asset (a unified asset) as they are essentially the same virtual or physical device.
This empowers organizations to pinpoint risks more precisely, as the risk from many different sources is collected into a single unified asset. Fewer products are needed, and your work will be more efficient.
Unification roadmap
The roadmap for making Security Center completely unified can be found here:
https://support.holmsecurity.com/hc/en-us/articles/8285887390108