guides

November 22, 2022

A 365-degree view of your Microsoft environment

As the scope of corporate networks has been constantly expanding over time, the challenge of maintaining an accurate asset inventory and effectively identifying unmanaged assets has only grown. In addition to on-premise environments, IT and security teams also have to keep …

Read More

November 3, 2022

Which discovery approach works best for unmanaged devices?

Unmanaged devices are the Achilles heel of any asset inventory. Shadow IT, rogue, or orphaned devices are easy targets for the adversary to gain potential footholds onto the network. Which discovery approaches are the most effective at finding unmanaged devices?

November 1, 2022

Introducing the runZero Infinity Partner Program

The runZero Infinity Partner Program provides partners with the resources, enablement, content, training, and support to deliver a powerful cyber asset management solution to our customers globally. The partner community is one of the most meaningful and significant ways to …

October 28, 2022

How runZero finds unmanaged devices on your network

How do you find unmanaged devices on your network when they aren’t accounted for? Learn how you can use runZero to find unmanaged devices on your network.

October 19, 2022

Contextualize honeypot alerts automatically with GreyNoise, runZero, Thinkst Canary, and Tines

Learn how to continuously enrich your asset inventory with high-fidelity data and context, leveraging tools, like Tines, Thinkst Canary, Greynoise, and runZero.

October 18, 2022

Why unmanaged devices are a challenge for IT and security programs

Why do unmanaged devices matter? We discuss the importance of knowing about the unmanaged devices on your network, highlight some issues stemming from unmanaged devices, and how runZero can help you find them.

September 1, 2022

Transient assets: managing the unmanageable

Transient assets can introduce unique challenges to tracking asset inventory and securing your network, especially in the education sector. Students and faculty rely on a diverse range of personal devices and expect to be able to use them everywhere, resulting in high ratios …

Read More

August 30, 2022

Strengthen your vulnerability management program with asset inventory

Vulnerability scanning plays a crucial role in any enterprise security program, providing visibility into assets that are unpatched, misconfigured, or vulnerable to known exploits. Customers tell us that they can take action on their vulnerability scan results most …

Read More

August 4, 2022

Finding all the things: the role of IT asset discovery in your organization

As organizations grow and change, it becomes increasingly difficult for IT teams to keep track of what assets exist on their network. The spreadsheet that was accurate yesterday might not be tomorrow. The only way to keep up with the changes is through effective IT asset …

Read More

June 22, 2022

Shadow IT: what’s lurking on your network?

Shadow IT poses an immense risk to the security of organizations around the world, but few teams feel prepared to tackle the problem. A Deloitte research report found that 32% of organizations believe “shadow IT” assets are the greatest challenge for IT asset management, but …

Read More