
When we talk about cybersecurity fundamentals, “knowing what you’re defending” is arguably the most important tenet. But sometimes it's not enough just to know a device is using your bandwidth; being able to mount an effective defense means knowing where a thing is physically. This is particularly true in environments that are not strictly speaking “office” environments: factories, hospitals, etc.
A common request from customers, particularly in the medical space, is “where are my devices?” It's not that PCs, tablets, or medical IoT devices are missing per se, but a physical check of devices often reveals that they appear to have grown legs and walked off down the hall.
A common request from customers, particularly in the medical space, is “where are my devices?” It's not that PCs, tablets, or medical IoT devices are missing per se, but a physical check of devices often reveals that they appear to have grown legs and walked off down the hall.
Why is this an issue? Medical equipment is not cheap, and because not everyone in a hospital needs a given piece of equipment at the same time, the hospital buys a limited number of those devices. But because no one wants to be on the team that is tapping their feet, arms akimbo, waiting for a lifesaving piece of equipment to free up, they take devices from where they’re supposed to be and put them in places only they or their team know about. This prevents Alice from the east wing of the hospital from coming and ‘borrowing’ your gear and ‘forgetting’ to return it.
That’s all well and good, until that piece of gear needs servicing, or replacing, or is behaving in an abnormal fashion. If a service technician or member of the IT staff needs to lay hands on that gear, she can’t spend half the day wandering about the hospital campus looking for it, she needs to get at it now because if the device has been compromised, and its about to get hooked up to a patient...no one wants to be responsible for what might happen next.
The short use-case video we’ve put together illustrates how one can identify connected devices by hostname or other criteria, and drill down to help identify the network or segment on which it is connected, narrowing down the location of the device. You can also look at the history of all the IP addresses assigned to that device, giving you some insight into where its been, which is data that could be used to help better understand where equipment really should be, and what the optimum number of devices is in your particular situation.
Knowing what your enterprise is really made of is a fundamental task that is made radically easier with Senrio Insight. Visit our website to see more use-case videos, a video demo, and to start an evaluation.
That’s all well and good, until that piece of gear needs servicing, or replacing, or is behaving in an abnormal fashion. If a service technician or member of the IT staff needs to lay hands on that gear, she can’t spend half the day wandering about the hospital campus looking for it, she needs to get at it now because if the device has been compromised, and its about to get hooked up to a patient...no one wants to be responsible for what might happen next.
The short use-case video we’ve put together illustrates how one can identify connected devices by hostname or other criteria, and drill down to help identify the network or segment on which it is connected, narrowing down the location of the device. You can also look at the history of all the IP addresses assigned to that device, giving you some insight into where its been, which is data that could be used to help better understand where equipment really should be, and what the optimum number of devices is in your particular situation.
Knowing what your enterprise is really made of is a fundamental task that is made radically easier with Senrio Insight. Visit our website to see more use-case videos, a video demo, and to start an evaluation.