Asset Integrity Monitoring (AIM)
What is Asset Integrity Monitoring?
Control the integrity of your assets before someone else does with Asset Integrity Monitoring (AIM). Ensure the integrity of physical assets by providing a baseline of all assets, power systems and processes in your data center or colocation facilities.
Improve the management and strength of the chain-of-custody of all network connected assets in your technology stack from procurement through decommissioning.
Benefits of Monitoring IT Assets
AIM Identifies:
- Undocumented equipment
- Incorrect & unauthorized changes
- Unauthorized network connection
- At Risk equipment, firmware, software
Risk Accountability Checklist:
- Complete IT hardware inventory
- Identify unmanaged IT equipment
- Firmware version monitoring
- Change management procedures
- Asset Integrity Monitoring, deltas
- Contingency planning
- Coordinated resiliency response
- HW/SW Asset Management
How Asset Integrity Monitoring Works
Discovery
Identify all assets connected to the network
Change Management Process
Establish a baseline of all assets, power systems, and processes (ITIL, ITSM, DCIM, TAM)
Monitoring
Compare current asset state against baseline inventory and change management compliance
Alerting and Reporting
Notify security teams of vulnerabilities and noncompliant assets, validate resource availability SLAs
Key Features
Preventative
- Simulate failures, what critical systems affected
- Know critical assets, logical/virtual/physical
- Application redundancy
Proactive
- Real-time monitoring of power and heat
- Alarms set for thresholds
- Identify risk trends
Preventative
- Proactively discover all assets on the network
- Identify software and firmware known issues
- Audit for deltas and introduced vulnerable patches or assets
Proactive
- Hygiene – ITIL, ITSM, DCIM
- Enforce consistent processes – install, manage & decommission
- Stay ahead of requests – issues start creeping in when staff is “behind the curve”
Preventative
- Asset integrity monitoring to see change in assets
- Reconcile actual changes with expected changes
- Monitor unauthorized movement or outside change process
- Identify the consistent culprits introducing risk
Proactive
- Consistently monitor networks for more unplanned changes