Asset Integrity Monitoring (AIM)

Ensuring the physical integrity of computing infrastructure, whether it is in a data center, in a colocation facility, or on the edge.

It’s been said that the biggest danger to physical compute infrastructure is human error.

Most of the time, these errors are not malicious, just authorized people making mistakes. They:

  • Make incorrect/unplanned/unauthorized changes.
  • Perform changes at unauthorized times.
  • Fail to record these changes centrally.
  • Turn off supporting equipment.
  • Introduce new assets, which negatively affect operations.
  • Fail to be aware of all firmware and software patches which might be vulnerable to cyber-attack.

AIM Solution Brief

Physical Layer Not Managed With Same Discipline as Rest of Technology Stack

  • Organizations have change control systems for their applications/code
  • Many organizations monitor IT infrastructure at the software layer
  • However, many organizations lack protection and are vulnerable to unapproved, inaccurate or unplanned changes at the physical level
  • Risk introduced into physical layer that is often “invisible” until something catastrophic fails

Nlyte Asset Integrity Monitoring and Change Control

  • When and where should assets be placed
  • Discover if new assets are introduced or removed
  • Monitor if resource responses have changed in any way
  • Report expected changes against actual changes made


With a combination of Nlyte Discovery and Nlyte Asset Optimizer (EE) you can Manage and monitor all changes occurring at the physical level of infrastructure

  • Proactively discover any asset across the compute infrastructure network
  • Determine if anyone is adding or moving assets without authority or outside change process
  • Validate and reconcile all changes with expected changes and process
  • Determine which assets have known software and firmware issues
  • Check to see if new vulnerabilities are introduced with patches and firmware updates
  • Identify sources introducing change and risk
  • Notify appropriate personnel to validate compliant changes and unauthorized introductions