Identify and eliminate endpoint device security gaps using the new JupiterOne Unified Device Matrix

by

It seems like a simple question. “Are any of our deployed user endpoint devices missing an endpoint detection and response agent?” For starters, answering yes to this question is at least a compliance violation and represents a critical gap in an enterprise’s security posture. Seems fairly straightforward, right? How many devices are out there? How many agents are reporting in? Compare the two numbers and you got your answer. If that answer is yes, how can you figure out which devices are at risk? Who is it assigned to? How often should we be checking?

We developed the Unified Device Matrix to help security teams quickly answer these types of questions using JupiterOne’s asset analysis capabilities. In a single view, Unified Device Matrix shows a normalized and comprehensive inventory of servers, laptops, workstations, mobile devices and other similar assets as reported by multiple sources, such as device management solutions, vulnerability scanners, endpoint security agents, identity providers or directory services. Correlating all this data together, JupiterOne builds the matrix view of all your devices, along with the presence (or absence) of agents and services you have integrated. Laptop is reported by Jamf but not by Crowdstrike? You can find that in two clicks in the Unified Device Matrix interactive dashboard.

JupiterOne’s Unified Device Matrix dashboard view answers the difficult questions

Triangulation is key

I don’t have a lot of experience orienteering, but I’ve seen enough movies to know that when you’re looking for something, triangulation is the way to go. Counter-intuitively, this best practice is also what makes answering device questions really hard. A typical enterprise laptop can be reported by 5 different data sources: endpoint security, configuration management, directory services or identity provider, vulnerability scanner and an IT asset management or configuration management database (CMDB).

The truth of what devices you have and their current configuration lies in the correlation of all these different datasets and wouldn’t you know it, they don’t all play nicely together, putting all the work on the teams that manage these tools. And, as you’re probably aware, it’s not all the same team, adding another layer of complexity and coordination to the solution.

Easily see how many devices are reported by combinations of data sources

Unified Device Matrix does all the hard work of collecting, correlating and deduplicating the data from multiple data sources to provide that accurate, comprehensive view of our devices and their configurations. This view helps our security users primarily in their work to secure endpoint devices, but this consolidated view is also extremely useful for IT teams that have a similar struggle related to inventory management.

Using Unified Device Matrix to solve top device management challenges

With the wide array of data sources available to JupiterOne, users are able to solve a number of difficult device management challenges, notably related to configuration and security posture management:

  • Identifying unmanaged devices or without configuration management
  • Identifying devices missing endpoint agents
  • Identifying devices that are not aligned to your company’s directory services
  • The OS distribution of your devices across all of your device data sources
  • Identifying devices that haven’t been online recently
  • Reporting on a device’s encryption status

Users can configure the Unified Device Matrix dashboard to highlight the misconfigurations and coverage gaps that are top of mind for their current strategy. The matrix can be fully customized to include the critical data source combinations that require action, filtering on attributes, such as operating system, critical assets or last seen date, as well as heat map configurations that visually draw attention to devices that require attention.

Filter for devices last reported across its various data sources

Unlocking the answers hiding in your asset data

Unified Device Matrix is another milestone in our commitment to improving the overall experience for our users. We debuted our natural language search capabilities to simplify getting answers to tough questions about your asset data and this dashboard is another way to bring together asset data and analysis that all our users can benefit from.

If device visibility and management is a challenge you have today, contact us and schedule a demo to see it in action. If you want to learn more about our approach to asset analysis and how we fuel this dashboard with insights about our digital infrastructure, check out our approach to asset analysis.

Jeff Whalen
Jeff Whalen

Security is a passion of mine. With over 15 years of experience in cybersecurity in both product management and product marketing roles, I am driven to help security teams by connecting them with solutions that solve some of their biggest challenges. When I'm not working on the best asset analysis platform in the market, you can find me watching or playing basketball.

Keep Reading

Open Source Compliance, Endpoint and Vulnerability Management with Fleet | JupiterOne
July 24, 2024
Blog
Open Source Compliance, Endpoint and Vulnerability Management with Fleet

Here’s how Fleet integrates with JupiterOne to gain comprehensive insights and enhance the security in our environment.

Better Together: CAASM and EASM | JupiterOne
July 18, 2024
Blog
Better Together: Cyber Asset Attack Surface Management and External Attack Surface Management

Today, we’ll dig deeper into attack surface management and explore the benefits and differences across CAASM and EASM

Explore Gartner's insights on Attack Surface Management (ASM) and how innovations like CAASM, EASM, and DRPS are transforming cybersecurity. Learn how to stay ahead of cyber threats with proactive security measures and comprehensive asset management.
June 27, 2024
Blog
What You Need to Know from Gartner Innovation Insight: Attack Surface Management

Discover how Gartner's latest report on Attack Surface Management can help your organization enhance cybersecurity with proactive measures and asset visibility.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.