-
Security updates
-
Product news
-
Next-Gen Vulnerability Management
-
Getting started
-
General
-
Operating status
-
Network & System Security
-
Web Application Security
-
Cloud Security
-
API Security
-
Phishing Simulation & Awareness Training
-
Attack Surface Management
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset management
-
Vulnerability manager
-
Reports
-
Digest reports
-
Organizer
-
Continuous monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & conditions
-
Dashboard
What is unification & unified assets?
Data from multiple attack vectors
Security Center offers several scanning methods and other ways to collect data from different attack vectors in your attack surface - everything from web applications and APIs to networks, hosts, devices, cloud infrastructure, services, and users.
As represented in Security Center, these are different asset types as they require other scanning methods. But within an organization, they can all be on a single asset such as a physical or virtual server, or the endpoint client computer.
Unified assets combine vulnerability data
Unified assets combine vulnerabilities from different sources into a single asset (a unified asset) as they are essentially the same virtual or physical device.
This empowers organizations to pinpoint risks more precisely, as the risk from many different sources is collected into a single unified asset. Fewer products are needed, and your work will be more efficient.
Unification roadmap
The roadmap for making Security Center completely unified can be found here:
https://support.holmsecurity.com/hc/en-us/articles/8285887390108