Skip to main content
Skip table of contents

Endpoint Security

Category

Requirement

CSCC

SAMA CSF

ECC-1

Endpoint Security

All new and existing assets have active endpoint security and data protection

2-3-1-2
2-5

 

2-3-4
2-4-4

Lucidum can help you accurately identify assets without endpoint protection.

After Lucidum ingests data from your security solutions, Lucidum uses graph data, machine learning, and predictive analytics to detect and classify all assets and users, even those not detected by the solutions in your environment.

You can then create queries to find a list of all assets without endpoint protection, export the list, or create dashboards.

You can also view pre-built dashboards, called Value-Oriented Dashboards or VODs. You can easily edit these dashboards to suit your needs or easily create your own custom dashboards about endpoints.

Endpoint Management

The Endpoint Management dashboard, included with Lucidum, displays information about assets that are not running an endpoint agent.

The Endpoint Management dashboard looks like this:

The Endpoint Management dashboard includes:

  • Endpoint Agent Missing: Compute Assets. This chart displays a count of all assets, including VMs, cloud assets, servers, and workstations, without endpoint agents.

  • Data Sources of No-Endpoint-Agent Devices. This chart displays all all assets, including VMs, cloud assets, servers, and workstations, without endpoint agents. and also displays the data sources associated with these endpoints.

  • Locations of No-Endpoint-Agent Devices. This chart displays the locations for all assets without endpoint protection.

  • Departments of No-Endpoint-Agent Devices. This chart displays the departments associated with assets without endpoint protection.

  • OS of No-Endpoint-Agent Devices. This chart displays the operating systems and versions associated with assets without endpoint protection. Asset

  • Asset Types of No-Endpoint-Agent Devices. This chart displays the asset types associated with assets without endpoint protection.

  • Vendors of No-Endpoint-Agent Devices. This chart displays the vendors associated with assets without endpoint protection.

  • Risk Level of No-Endpoint-Agent Devices. This chart displays the risk level for the assets without endpoint protection.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.