a

Asset Intelligence

Asset intelligence refers to a deep and broad collection of details associated with IoT assets deployed in an enterprise environment.

Read full definition

Asset Inventory

Asset inventory is a challenge for most organizations, and connected devices can be difficult to discover when they fall under different operational owners.

Read full definition

b

Building Automation Systems

Building Automation Systems (BAS) automatically centralize control of a building's operations for increased efficiency and security.

Read full definition

c

CMDB

Inventory Management is continuous in healthcare and incorporating real time information about devices into CMDB systems is paramount.

Read full definition

CMMS

CMMS systems are found in manufacturing, healthcare, construction, transportation, and other industries where physical infrastructure is critical.

Read full definition

CVE

CVE stands for Common Vulnerabilities and Exposures. When a CVE is found, software companies release patches so users can repair the vulnerability.

Read full definition

d

Device Utilization

Device utilization refers to how, how often, and by whom, connected devices are used in an organization.

Read full definition

Device Visibility

Device visibility refers to visibility into the traffic, devices, and behaviors in enterprise IT networks that are continually connecting more IoT devices.

Read full definition

e

f

g

h

i

IoMT

IoMT is the inventory, visibility, and control of devices that are internet-connected to enable the exchange or collection of data.

Read full definition

IoT Asset Management

For many organizations, asset management is performed as a periodic audit, which can lead to gaps in visibility when IoT devices are missed during an audit.

Read full definition

IoT Security

IoT security is the inventory, visibility, and control of devices that are internet-connected to enable the exchange or collection of data.

Read full definition

j

k

l

m

Medical Device Security

Medical device security refers to tools and practices that prevent attackers from gaining unauthorized access to medical devices and the data they generate.

Read full definition

Microsegmentation

Microsegmentation is the concept of segmenting IoT devices to a fine-grained level, so minimal communication is required for proper operation and management.

Read full definition

n

Network Access Control

Network access control prevents unauthorized devices from joining a network, and identifies existing devices on a network.

Read full definition

Network Segmentation

Network segmentation is an important part of a zero trust network, in which every device must be granted permission to access a network.

Read full definition

NIST Cybersecurity Framework

The NIST Cybersecurity Framework provides the foundation for modern cybersecurity programs and controls.

Read full definition

o

p

q

r

s

t

u

v

Vulnerability Management

Vulnerability management includes asset discovery, monitoring, mitigation, remediation and defense tactics to protect an organization's IT network and devices.

Read full definition

w

x

y

z

Zero Trust

A zero trust architecture means that devices have no access to a network or hosted resources until a system verifies that each device should be granted access.

Read full definition