Asset Integrity Monitoring (AIM)

What is Asset Integrity Monitoring?

Control the integrity of your assets before someone else does with Asset Integrity Monitoring (AIM). Ensure the integrity of physical assets by providing a baseline of all assets, power systems and processes in your data center or colocation facilities.

Improve the management and strength of the chain-of-custody of all network connected assets in your technology stack from procurement through decommissioning.

 

Benefits of Monitoring IT Assets

AIM Identifies:

  • Undocumented equipment
  • Incorrect & unauthorized changes
  • Unauthorized network connection
  • At Risk equipment, firmware, software

Risk Accountability Checklist:

  • Complete IT hardware inventory
  • Identify unmanaged IT equipment
  • Firmware version monitoring
  • Change management procedures

 

  • Asset Integrity Monitoring, deltas
  • Contingency planning
  • Coordinated resiliency response
  • HW/SW Asset Management
AssetIntegrity Diagram@2x

How Asset Integrity Monitoring Works

Discovery
Identify all assets connected to the network

Change Management Process
Establish a baseline of all assets, power systems, and processes (ITIL, ITSM, DCIM, TAM)

Monitoring
Compare current asset state against baseline inventory and change management compliance

Alerting and Reporting
Notify security teams of vulnerabilities and noncompliant assets, validate resource availability SLAs

Key Features

Reducing Power/Cooling Outages Risks
Reducing Asset Vulnerabilities
Reducing Unplanned Changes

Preventative

  • Simulate failures, what critical systems affected
  • Know critical assets, logical/virtual/physical
  • Application redundancy

Proactive

  • Real-time monitoring of power and heat
  • Alarms set for thresholds
  • Identify risk trends

Preventative

  • Proactively discover all assets on the network
  • Identify software and firmware known issues
  • Audit for deltas and introduced vulnerable patches or assets

Proactive

  • Hygiene – ITIL, ITSM, DCIM
  • Enforce consistent processes – install, manage & decommission
  • Stay ahead of requests – issues start creeping in when staff is “behind the curve”

Preventative

  • Asset integrity monitoring to see change in assets
  • Reconcile actual changes with expected changes
  • Monitor unauthorized movement or outside change process
  • Identify the consistent culprits introducing risk

Proactive

  • Consistently monitor networks for more unplanned changes