Article Details

Scrape Timestamp (UTC): 2025-05-12 18:49:19.111

Source: https://www.theregister.com/2025/05/12/prelude_security/

Original Article Text

Click to Toggle View

Why aggregating your asset inventory leads to better security. Today’s complex IT environments demand a new approach. Partner content For many organizations, managing IT assets is like trying to complete a jigsaw puzzle without all the pieces. Despite massive investments in security tools and controls, many companies still have critical gaps in their ecosystems that leave them vulnerable to breaches. Often, these gaps stem not from a lack of tools (as if such a thing exists in security) but from incomplete visibility and integration across them. By aggregating and analyzing data from multiple systems, security leaders can gain a more robust picture of their IT inventory and security posture. The challenge with disparate security tools It’s not unusual for enterprises to deploy a wide array of security tools. The average organization uses roughly 10 of them, covering everything from endpoint management to identity and access control. These tools often operate in silos, creating fragmented and occasionally contradictory reports. Let's look at a practical example. Consider an organization using these tools: On paper, each system might appear to report accurate asset figures. For example, both Intune and Jamf might show 5,000 managed devices, while Entra reports 4,500 user accounts. At first glance everything looks secure, but collecting and analyzing inventory from these tools in the aggregate reveals a more complex picture. Finding the gaps in disconnected data The first step in finding control inventory gaps is typically a lengthy, manual effort. Perhaps data is exported and dumped into a complex, multi-tab nightmare spreadsheet. Others may turn to more nuanced but equally challenging SQL and Power BI queries. Aggregating asset and control inventory has been one of the foundational capabilities we're building at Prelude to reduce dependency on lengthy, manual exercises that ultimately contribute enormous value to your security program. Whatever the path to correlating which devices have X and Y tools, surprising discrepancies often come to light. Leaning on our previous example, we may find now that our actual inventory is 5,500 managed endpoint devices, not 5,000. And within this aggregated data set: Even more concerning would be any issues related to the functionality and efficacy of existing security tools on those new devices: When we apply the same process to our users, the gaps can be just as alarming: Because these disparate security tools don't talk to one another, these gaps are rarely visible when each tool is evaluated in isolation. Looking at asset management in the aggregate detects them, offering organizations a previously unattainable level of insight into their true security posture. How does any of this happen? One of the biggest challenges in cybersecurity is not new threats and vulnerabilities, but an unclear picture of what needs to be secured. When I ran product management at Tanium, we often found that between 10-15% of an organization's devices were unmanaged and missing at least one management or security tool. While this happens quite easily already, remote work and an increasing number of tools available means the likelihood for gaps to pile up has only grown. As a security leader, you may inherit that company with 4,500 employees and 5,000 devices. These are the known variables. You have contracts with CrowdStrike for 5,000 devices, Entra for 4,500 users and so on. But perhaps other devices were never properly retired or acquired through non-standard channels, such as bring-your-own policies or temporary project teams. Small oversights like these pile up. Devices get added without proper tracking, and as the business grows and evolves, the gap between what you think you have and what you really have widens. With inventory happening on many different platforms, the things you don't know can hurt you. How an aggregate asset inventory supports your security program Control gaps, missing data, and misconfigurations aren’t just technical hiccups; they can be the difference between thwarting a cyberattack and suffering a career-ending breach. Many security teams and tools get hung up on false positive suppression, tuning detections, and the next best vendor. But knowing what to secure—and ensuring your current tools are doing so—is a lion's share of the battle. Complete visibility into what you need to secure Looking at asset management in the aggregate provides a single source of truth for IT inventory by consolidating data from all your various security tools. Instead of relying on each tool’s reports, organizations gain a unified view of their assets, including devices, user accounts, and cloud resources. Not only does this expose any blind spots in your control environment, but it affords greater operational efficiency for your team. With a single source for your inventory, your team spends less time reconciling disparate reports and more time focusing on meaningful improvements to your program. Improved control coverage and performance The simplest way for an attacker to evade EDR is to go where it isn't. By aggregating data, organizations can ensure that critical controls such as EDR, MDM, and vulnerability management are applied consistently across all assets. It’s much easier to identify which devices are missing protections or misconfigured when you’re looking at the full picture. Aggregate asset management highlights gaps in real time, allowing teams to address vulnerabilities before attackers exploit them. Whether it’s a rogue device, a misconfigured control, or outdated vulnerability data, these risks can be mitigated proactively when they’re visible. Justification of control investments Best-of-breed security tools are only as effective as you enable them to be. You invest heavily into tools like your EDR and IAM platform and have certain expectations of what they'll do to protect your business. Those tools immediately lose value when entire segments of your estate aren't being covered or have fallen into suboptimal performance states. By establishing your full inventory of assets, you can lay the foundation for a better defense built with tools you're already invested in. Better security starts with better inventory The complexity of today’s IT environments demands a new approach. Aggregate asset management ensures the most comprehensive visibility into your assets, strengthens security tool integration, and delivers actionable insights to close critical gaps in your security posture. If you'd like to learn more about what we're doing at Prelude to make this an easier reality for teams at scale, create an account and start connecting your tools. About the author Pete Constantine has a storied history in product management and development of endpoint security products. Formerly the chief product officer of Tanium, Pete now leads product development at Prelude Security, focusing on building capabilities that empower teams to easily evaluate the coverage, configuration, and efficacy of their security tools. Sponsored by Prelude Security

Daily Brief Summary

MISCELLANEOUS // Enhancing IT Security Through Aggregate Asset Management

Aggregating IT asset inventory from multiple tools provides a more complete picture of an organization’s security posture, revealing critical gaps that isolated tool reports might miss.

Typical organizations deploy numerous security tools that operate in silos, often resulting in fragmented and contradictory asset reports.

Manual processes involved in correlating control inventory can be lengthy and error-prone, with discrepancies frequently appearing only when data is consolidated and analyzed.

A unified view of IT assets helps expose blind spots and overlaps in control environments, improving operational efficiency and security coverage.

Aggregating data helps ensure that critical security controls such as endpoint detection and response (EDR) and mobile device management (MDM) are consistently applied across all assets, revealing misconfigurations and unprotected devices.

This comprehensive visibility enables teams to address vulnerabilities proactively, preventing potential cyberattacks by addressing them before they are exploited.

Accurate asset management supports better justification and optimization of investment in security tools, ensuring that all parts of the IT estate are adequately protected.

Complete asset inventory aggregation is essential for facing the complexities of modern IT environments, enhancing tool integration, and closing security gaps.