ITOM Visibility & Cloud Accelerate Academy: How to improve Security Posture with ITOM Visibility
yourselves yes so good morning everyone uh SRI suban lead the item product liner business Lea uh good morning everybody excited to be here uh and partnering with Shri and Johan uh Deepak kiadii I'm the senior director of products for the secretary operations portfolio amazing guys thank you so much for being here I'm pretty sure that everyone else is going to be excited about this uh this uh fantastic session today now safe farbor no is um just we're going to make sure uh to stick to the existing products today as much as you can but uh we could still reference the future of our product so please make sure that you're aware of that uh the save harbon or is applies to the content for today's presentation so today's agenda is going to be organized in this way we're going to have a an overview of the value of item and sa Ops together we're going to go through an overview of service now aops offering and the capabilities we're going to see a couple of demos and eventually as usual we're going to have a few minutes at the end of this session for a Q&A session and now um without further saying please make sure you interact with all of us in the Q&A section and I'm going to hand it over to sh fantastic uh so thank you for the opportunity team uh uh let me sh will take you to a couple of narrative decks and we'll show you some demos on so firstly service now is known as the platform of platform uh we support a lot of Enterprise business with the UniFi data model that's delivering workflows across uh uh the landscape uh driving critical outcomes for your business but behind this uh workflow the magic of creating a data platform that is driving an outcome is super important and service now has always been uh known for building that um configuration management database uh with the multi-source approach of curating data from existing data providers and offering the best-in-class discovery technology that can go and collect dependency data relationship information uh from multiple sources so bringing these two dimensions of data together where the reconciliation reconciles and providing that context uh to build that data leg for your it and if I look at uh the existing service graph connectors you can clearly craft a a set of Market segmentation where either it's your monitoring tools security tools uh your enduser Computing uh package manager Solutions like SCM InTune Jam of uh we have connectors for most of the very well-known tool chain in this market uh and this way life we are creating developing continuously maintaining these Integrations bringing that data into our solution and then reconciling with the existing Discovery data so that you get the best-in-class view of your asset data uh and that can help to drive multiple outcomes on top of it like we also add context which we call this as like Ty your infrastructure it to the business so when you look at an asset you would not see this has an a database running on a v Center uh but you would see that the database that's running on a v center it's serving your Logistics systems or serving your line of business uh and that context is super important especially when you deal with uh uh security incidents when you're dealing with uh vulnerability zero day vulnerabilities that are announced and know you want to understand what is the real risk and no impact related to those assets soice now uh see MDB sitting as a nucleus within this platform uh we deliver multiple outcomes uh and today in particular we are going to do a deep dive into the security outcome which is again super important for our cyber teams uh uh where uh there is an a spraw of tool chains available but how service now is a key enabler in driving that outcome and I will do Deep dive into the data elements and deep will uh cover the workflow aspects uh where how this data will be effective effectively used to drive those uh critical outcomes so I call this as a data fabric uh pretty much an integrated layer of connected it because the same data that we collect and uh we will be able to reconcile it and provide that context will be used across the portfolio of workflow so either it's your typical service management use case like change incident or your security operations like incident response vulnerability response or your uh know your casm strategy where you're going to learn today how service now can help and know to drive that cyber asset resilience program or it's your application portfolio management or you're driving up your AI Ops event management strategy Asset Management that includes uh software asset Hardware asset or your grc's every single workflow needs the data and bringing this uh you know multi-dimensional data reconciling and providing that context is uh the foundational Bedrock of for all these workflows let me do deep into some of the discovery elements why Discovery so we all understand that the service graph can bring a lot of inventory view of the landscape but the purpose of many customers adopting an P play Discovery solution is two things one is you need to have complete visibility to your compute network storage relationships connecting to your hypervisor Solutions like Venter hyp know hyperv or nutonic or connect connecting to your multic Cloud connecting to your uh load balancer Technologies or your know current kubernetes or open shift ecosystem so you need this uh powerful capability that can crawl and bring that multi-dimensional data set from service crab but also uh know interrogating the existing infrastructure for data that is not typically visible uh from the existing service graph providers uh and uh we also offer both agent based and agentless the agent based offering called as an agent client collector that can be deployed into an endpoint or to the server estate the agent provides uh some fantastic capability mainly for the security audience you might not you know you might be aware of os query uh which is again a f famous demon that many of the security incident response tools uses agent client collector comes with an O query that can be used for security insent response that can help you to enrich the data that you're collecting from know your cmdb perspective both from your laptop endpoints and from the server infrastructure uh will show a quick demo on this as well the multicloud visibility again is super important for many customers uh and this is a place like where we cater the needs of multiple personas who are looking into this data sets uh whether you are a discovery manager looking at connecting to your multic Cloud we provide both service graph approach and uh the uh pattern-based approach to collect this data uh we provide a fantastic enablement platform for you to set the security standards during the time of provisioning uh so that all the cataloges uh can be approved uh by the security you're not giving the uh keys to the kingdom to the decentralized SRI teams where you still can have effective governance in the provisioning process where we offer catalog based offering that sits on top of terraform or anible and we help in the governance play there uh on the Discovery side uh pretty much uh know the data that we can collect from the cloud estate container estate is pretty um know exhaustive uh and in fact uh know in the demo you will see some of the use cases how this data will drive uh those effective security outcomes on the kubernetes estate or open shift or pretty much anything that is running inside a container uh you need this visibility from the cyber security perspective we have many banks asking saying can you uh get that visibility inside the docker image collect all the software Bild of materials uh but also to get visibility into that Library level information is super important uh we can absolutely support this use case for the Cyber audience uh so with that note like the last one I have is the certificate management where uh you might have uh seen how uh even digital certificates like TLS certificates this visibility is super important for cyber teams uh expiry of certificates have uh not just an nightmare for your uh uh service outages and War Room scenarios but also uh it is super important from cyber angle where uh know in expired certificate has pretty much caused a lot of headaches in terms of uh the hacks that we see in you know today's Enterprise world uh so we have complete visibility to that as well so with that note uh let me just like know go into a quick demo mode and show you the power of Discovery What discovery can collect and crawl as I said we support both agent based and agentless uh the devil is always in the details and that's where like if you look at the elements of What discovery collects just from the compute perspective you'll have a lot of infrastructure data operating system data versions uh kernel informations but the most interesting thing for um cyber security team is the visibility into the installed software data which is absolutely critical for driving a vulnerability response program uh a lot of zero day vulnerabilities are you know coming into this ecosystem and you need to have a system of record uh that can immediately give you uh context on what is your uh no attack uh uh no surface and what is your exposure and uh know have an quick uh see on how to remediate some of those critical zero day vulnerabilities uh on top of it Discovery also collects extended data set on running process traffic data which is again super important for the security audience and in fact one of the things that we do with this data is like we apply machine learning we perform clustering analysis and immediately give you the context of what is connected to what like we what we call this as an ml based uh service mapping where at any point in time you will have the complete visibility uh to all the networking elements of traffic of what process uh from a server is talking to another process on the other server if the maps are there you will be able to curate a map with few clicks but even if the maps are not generated the machine learning will analyze will uh find all the connections potential service suggestions that can be quick added to the map as I said the service mapping context is super important for customers uh know to get that business Dimension to that infrastructure elements but on top of it when you think about even simple things like install software data many inventory scanners can get the package manager information but serers now discovered us uh two levels deep into this vza where we can get information from process fingerprints looking into uh the p patterns that can go and interrogate and collect extended data set for software asset management or your vulnerability management use case even simple things like um file based Discovery uh where we can crawl into the file system collect necessary informations that are super important for your cyber uh resiliency programs like uh uh a good example is like know your lock forg where uh uh uh if you have uh uh no the elements needed like either it's Java or lock forj or any of those files that are sitting in your file systems you will be able to search for those file systems get to see where the file is located what is the size what version is deployed and we also create install software data uh based on the data sets uh uh we can pretty much uh know collect this information from cloud from containers from your on-prem uh know and your virtualized infrastructure the the critical narrative that you have to take is like when you think about a typical inventory scan it can collect lot of those basic data elements but as I said even in the installed software world we can collect a lot of other extended data but when I see a a simple compute in this case it's a Linux server uh know from uh my uh Venter environment the breadth and depth of data that you see like in terms of uh know your computer infrastructure what applications that are running uh where it is running know in terms of ESX host or AWS infrastructure you will have that context of dependency mapping information which is in fact super important uh when you are dealing with uh cyber security incidents where you want to see those relationships in near real time you want to see those application context you want to see whether the compromise Linux server has an Oracle database which is part of an know an azure AWS stack what Ami images are being provisioned who provision this virtual machine in terms of cloud service accounts and so on so that entire context of dependency uh is there in your system and we do this across like uh your network estate firewalls load balances uh uh so sample of what we get from firewall estat is like certain firewalls like where you see the firmware version sometimes know when the vulnerabilities are exposed like no you would always is like wanted to see how many of my network switches uh with certain iOS information or you want to see uh no track of like firmware version so we can get that visibility but also again the dependency mapping as I said is super important for the relationship mapping to understand the estate to understand where it is located who owns this uh uh what Vall policies are associated with this and so on a very powerful stack uh know getting into the cloud or con container uh we get uh extended data set getting into the software decomposition super important for your no cyber Security Programs as well so with that note a quick overview of uh uh what we can do right in terms of uh helping the cyber security program uh but here in this call uh we want to do a deep dive into the Kaza Market which is a cyber uh know attack surface management Market where uh many of the C players where they will look for integration points because the chm tool chain does not have uh know specialized Discovery technology right they completely rely on the existing information and and here's the simple analogy where I would look for like where uh you are seeing an outside in view for your it infrastructure where you can actually do some basic information like hey give me the servers give me the uh VMS and give me the inventory data from the package manager perspective I think any third party Integrations uh right can provide this data set but what you need from the discovery is like getting inside uh know this compute collecting the file level information process level information traffic data providing that service contacts ability to interrogate with o query and collect extended data set for your security team uh so I think this analogy of outside in and inside view right it's super important when you think about your casm strategy and in the next few uh slides de will introduce you to this Market what we offer within this Market but also how the km product from service now primarily is using the itom visibility data both service graph data and the discovery data to drive critical outcomes so with that note Deepak over to you thank you Shri going to share my uh screen here do you see my window yeah we can all right okay um this as sh mentioned right now the service now platform uh being a platform of one data model and one architecture uh drives a lot of uh synergies across it uh security being uh one of those uh areas where where customers are already getting uh great outcomes uh by being on the service now platform and using uh uh the Bedrock of uh uh capabilities built into it operations uh management a very quick look at our portfolio today uh the security operations portfolio helps customers both on the reactive side and the proactive side of security operations on the reactive side we do security case management which is life cycle management of all security incidents uh coming out of the Enterprise be it from the sock or outside the sock or in business function socks like fraud and uh privacy for example and on the attack surface management uh we are the single platform of response for all kinds of uh uh uh attack findings be it vulnerabilities misconfiguration application code issues or issues in the cloud and uh OT environment all kind of you know covering different asset classes uh using technology services on the platform and uh leveraging uh several cross functional intelligence capabilities be it uh our threat Andel uh module or be it the controls Intel uh capability that we have in security posture control that I'll talk to you more about and our goal is hey we will be that platform that will automate connect and orchestrate Enterprise uh security posture and today uh I'm super thrilled to kind of uh share with you how you can supercharge your security outcomes by harnessing the Synergy of itom uh to do uh two things right you know you can merge robust automation capabilities that are uh in itom with proactive thread detection capabilities uh that are you're going to see in security posture control to keep your Enterprise ahead of cyber uh threats so so that's what uh I'm going to be walking you through and before that uh just giving you a backdrop into why did we even think about this solution uh for our customer on top of the platform uh we've spoken to numerous cesos and uh uh we got to know that hey they all struggle with gaining a 360° view of their attack surface you know what does that mean uh first uh they have visibility gaps into their asset inventory cesos don't know have I accounted for all devices on my network uh the second is uh they do not know if those assets are being protected uh or being uh uh governed by the right security controls you know do am I scanning them with vulnerability scanners do I have the right kind of endpoint protection agents on them and the third is they're making all these investments into security tools uh but they still have this feeling that hey my threat mitigation capabilities are not complete right now how do I get view of how my defenses are working and what are they doing today uh is that they are either solving for these problems using manual methods like maintaining asset inventory and spread sheets or building customized solution that Maps assets to what controls are running on them or using many point tools that are out in the market it's easy to go create Point tools but it's hard to kind of you know do it in a way where it's operationally less complex for customers toop and that is why we came out with a better way partnering with the technology workflow capabilities that's already you know in the platform today that's already kind of you know customers are have deployed uh and do it with um much more uh Superior outcomes so we will be able to solve for asset visibility and exposure management uh with the goals of hey can we build an a comprehensive asset inventory uh into all devices in your network both unmanaged and unknown assets absolutely yes with because you already have itom Discovery and itom visibility with all the service mapping capability uh can you identify security controls uh whether they're operating on those assets or not and uh if they're not operating uh are they lead leading to elevated uh risks uh because of the lack of uh uh you know presence of those controls we can absolutely do that because again you have those foundations in the form of uh uh itom Discovery and service graph connectors and finally knowing whether you know you know are your kind of you know mitigation controls in place to protect against vulnerability exploits and threats absolutely yes because it's the same foundation so it's a single Foundation meeting three goals you don't need individual kind of you know capabilities uh to meet all of these three goals and this is where our solution uh that I'm going to talk about which is built on the asset intelligence in the cmdb powered by itom uh enabling end uh actionability of those findings there are many tools that will provide you visibility into what's missing but do they help you close the gap uh this is where uh the power of the workflows in the platform uh comes to bear and and you know doing it very close to where there are other security operations workflow where I spoke about security case management and attack surface management workflows being already built into the service now platform through seops you can provide these asset intelligence close to where those workflows are happening not keep them kind of you know away and then finally you know organizations uh uh that need to comply to regulatory standards can still demonstrate compliance and their uh risk management uh in initiatives using uh this context this is where security posture control enters uh an offering that we have been uh evaluating with customers over the last one year uh it's out in the market uh since end of last year we have many customers who are looking to adopt uh this particular product and this is our service now play as Shri called it the the chasm solution that provides 360° visibility into your uh attack surface and casm is a gner coin term that stands for cyber asset attack surface uh management and what this capability does is it looks at all of your bank of security and it tools that you have be it uh your EDR tools be it your patch management or config management tools be it the active directory uh be it your hyperscalers converge those uh into uh the cmdb which is what the foundation of service graph connectors itom visibility and the multisource uh cmdb provides and and kind of you know run policy checks on top of those to weed out those gaps so give you comprehensive visibility but also gaps uh on your asset security posture so with this solusion you'll be able to monitor asset security posture like hey are my tools running on all of the devices um are my devices being scanned are there software that posing a risk on you know on these devices or any combination of these above do they lead to elevated risks you'll be able to kind of you know automate radiation workflows once you find an issue you don't sit on it you immediately act on it and you are able to find feed this intelligence into other workflows like vulnerability prioritization organizations are dealing with millions of vulnerabilities this tool will help you to kind of you know prioritize vulnerability Smarter with the awareness of hey is there a compensa control you know part of the asset or is it missing and then mapping of all these results into compliance objectives all done on a single uh platform so with that right now uh before I jump into the demo uh John are we ready to run uh the first poll here yes we are so the first Poll for today is to really better understand how are you your security teams really getting the insights into the security tool coverage of your assets as of today you can select all of the options that apply uh will give you a couple of seconds so you can go through them we're essentially uh asking you are you using a third party tool are they using a third party tool or manual spreadsheet exports to understand the coverage or a custom homegrown solution or uh you're not aware perhaps or they're not monitoring security tool coverage proactively as of today I see a lot of answers coming in so please um make sure that you express your preferences or you reflect your state-ofthe-art as of today they'll see some uh answers coming in so I'm going to give extra five seconds and then we can end the poll and share the results and I'm going to do that now so as we can see the uh vast majority is using a third party tool in case you want to indicate which tool you're currently using um you or third party solution just use the Q&A function and then some of you are not aware uh some of you are using manual spreadsheet or a custom homr solution or very very little actually 3% of you is not monitoring security to coverage proactively as of today then I believe we can keep going with the second poll which should be right after that one right deac um yeah so so uh uh this should be probably after we do some demos and the audience sees some more uh of this functionality there'll be in a better position to kind of respond and and love the responses by the way and this is exactly aligned with what we how we see that customers are struggling with third party solutions that are operationally complex because they are operating in silos or they not aware Flying Blind or they're using manual kind of uh you know modes and this is where this solusion can uh uh help so what we're going to do today is actually run through five scenarios and um uh these scenar I'm sorry right now let me go back here right now these scenarios will take you through uh uh experiences that we've built into the security posture control product it'll help you kind of you know identify tool coverage gaps uh where are you not running Crouch strike for example it'll help you monitor uh for toxic combinations uh are there missing uh you know EDR tools uh but also those same assets carrying critical vulnerabilities the combination of those two uh is going to be highly toxic for me because they represent an elevated level of risk uh how do I monitor assets against internal security standards if you want all of your let's say windows assets uh to be running a specific version of a certain tool or be scanned uh every X number of days you know how would you go create a policy uh uh to match your internal security uh rigor uh the fourth is typical kind of a a scenario where when you have a zero day vulnerability hit you and you want to know hey am I kind of you know running a certain software a certain library on a given endpoint and it's just not being discovered by my scanner sources uh because they've not been looking for it or they not have yet signatur to look for it how will you kind of you know get to the picture of your actual uh risk and then finally you'll also say how we can feed all of that Intelligence coming from 1 to four to prioritize your vulnerabilities in the vulnerability response module so so if you're all excited to see these F scenarios I'm going to J Jump into the demo all right I've brought up my uh screen here uh can you all see my uh security posture control workspace I'm assuming yes um so uh this is a brand new kind of you know workspace uh that we've built uh that provides you with Rich understanding of your asset inventory along with the security posture so in the overview section you can see the converged inventory of all of your assets right you now that you're managing uh in your organization and here uh let's say I'm am a member of the security team or a SEO uh or could be an IT team that's kind of you know helping my security team taking a look at this and I get a comprehensive view of uh all assets in my environment right now the monitoring sources of those assets coming from uh service graph connectors um where are those assets operating in uh if they in cloud or or on Prem and many of this is coming uh courtesy of the service graph connectors that you've already activated uh for your environment so here you can see the list of service graph connectors there are many sh shared um a few here uh and if I were to group this by uh the types of service gra connectors that's lending to that visibility you can see here the various categories vulnerability assessment uh softwares config patch management tools endpoint management uh tools uh Cloud providers networking and an uh application performance monitoring tool and the list goes on and this list is continuously expanding as we work with many of our technology Partners uh to bring V uh visibility into assets that they monitor and discover into uh the cmdb going back to the uh security posture control workspace you'll also see the second section which is key insights on security posture and typically the 101 use cases around hey uh am I running endpoint protection on all of the devices uh that are capable of uh receiving them this is where customers are using a third party solution or spreadsheets or or Flying Blind and you now have a way to kind of you know figure this out and this is possible through uh many of the kind of you know policies outof the Box policies that we ship that operate on top of the intelligence from these assets uh as an example you can see here one policy that says hey show me all assets missing endpoint protection so let's dig into this particular policy um and here you can see how this policy has been constructed on looking at all Hardware asset classes looking at where an asset source is reported by um uh or is not reported by an endpoint protection Tool uh but is reported by other asset sources right now like active directory for example or endpoint management for example so so this is kind of honing in on that specific Gap and you can now you know click on The View findings button to go and say hey show me all those assets that are actually missing Ino protection and this will take you to pretty much a comprehensive list of assets that do not have endpoint protection running so if I were to kind of you know pick one record which represents a finding you can see here that hey this has been reported by the extra hop service graph uh connector by the data doc service graph connector but was not reported by crowd strike so you're having an asset in your environment that doesn't have protection and represents a risk to your Enterprise this is where this finding can then be kind of you assigned to kind of you know teams or can be automated with service now's uh capabilities workflow capabilities to go and fix it right now so it's not just visibility it's also the ability to actually uh act on it going back back to uh the uh uh the insights you can also see toxic combinations here this is the second scenario where you can now see that hey there are assets with critical vulnerabilities and this is because vulnerability response Aggregates vulnerability information on those assets and we can now see that hey there are 287 assets that are actually uh Missing an endpoint protection so so this is a a case of high risk because now you have an asset with the critical vulnerability discovered by rapid 7 one of the popular vulnerability scanners out there um but um missing uh Crow strike uh as a uh as a tool right you know so here you go right you know you're you're not seeing this being reported by several other sources but detected by your vulnerability scanner which is typically the canary in the uh cool mine um if I were to go back to uh the uh uh the policy uh section uh for example example here you can create your custom policies um so let me kind of you know create a custom policy on a hardware uh asset where I say hey let's say this is reported uh by active directory uh for example uh but um or you know and you know specifically on cmdb assets uh that are running um Windows 10 let's say uh I'm going to say is running Windows 10 right now and it does not have is not reported by let's say crowd strike for example so you can say this and say hey where um you can actually do additional kind of you know uh property here to actually go look for things that are of interest to you right you now so so this is a custom policy that you can build uh to only look at specific uh kind of you know assets based on criteria that you can uh Define and here right now here's a rich set of kind of properties that you can actually go look for uh based on uh cmdb uh data um and if I were to kind kind of you know create this policy you can also create a custom view for this policy because you created the policy but you need visibility uh for this policy which is where you can actually draw your own custom insights for your custom policies and show them on uh the dashboard right now an example here is uh AWS Windows Server missing uh Crouch R right now so this policy if you were to go in um and look at AWS Windows article which was one of the assets that Tre was showing on which Discovery was performed the same asset that was discovered now we are able to kind of you know say that hey this was reported by service graph connector but has not been reported by these other uh sources so so that's how you would create a custom policy and then you would also be able to kind of you know go create a custom Insight uh on this particular policy and the creating of the custom Insight is is pretty simple right you know you can create a new insight uh you can create a comparison chart you can say hey I want to run this on any machine that doesn't have EDR and you can say no crowd strike for example and you would be able to kind of you know quickly report on this and you would be able to throw this into the uh custom insights widget as simple as that now let's go back to the policies uh for uh for a second and take a look at other policy types that are acting on deep information in the asset where Shri shared you the so whatever we've done so far is the outside in view when Shri shared the inside view where we are now able to look into those assets right now so let's look at one example of that supporting the zero day vulnerability use case right now so I'm going to uh look for oh that looks like I just typed software right now so here you go right now I have a policy where uh I'm specifically looking for any software that found by Discovery but not found by qualus right now and if I were to go into this policy this policy was constructed on the software asset type instead of Hardware where I'm saying that hey this was reported by service now itom Discovery but was not reported by uh qualis and if I were to go back into the custom insights widget I can see I've already created a custom insights for those software that was not discovered by qualis you know and if I were to go look at this finding and let's say I'm looking for a specific software package that is typically prone to vulnerabilities which is op SSL right you know and if I look at op SSL I can now see that hey op SSL was not discovered on one of the Assets Now which is that asset right now I can go in into that software package and see the specific asset on which it was not discovered likely a case where walis did not scan that asset or qual did not have the signature and it can happen right now in any signature based uh you know product that's out in the market or products that needs to yet add intelligence into it not necessarily qual it could happen with any any vendor tool out there right you now but this is how you would get to find those gaps that represents risk because somewhere a zero vulnerability is lurking that you are Flying Blind on and to the last scenario where all these insights are great how does this feed into my existing workflow security operations workflows so I'm going to go into the vulnerability uh response uh product here um and I will be looking at a capability that I have to rescore vulnerabilities uh with the product right now so I'm going to go into the admin section of the um vulnerability response product and look at risk score calculators here now this risk score calculators can drive risk scoring of individual vulnerabilities um vulnerability STP to specific assets bump them up or bump them down based on risk that you see common risks could be hey an exploit is present on that vulnerability but what about asset intelligence which is hard to get now this integrated capability also offers asset intelligence into vulnerability risk code calculators now I can go create a calculator where I can say that hey if I have um uh a specific uh condition right you know of a vulnerable software uh being uh present or uh my policy uh that is kind of you know operating on uh you know this particular asset I can actually kind of you know go and create uh a specific rule uh for uh this so so if if I go here and uh and then go into discovered item let's say [Music] um and I'm going to go to a specific violated SPC policy right now and I say where uh there is uh asset missing and point protection right now so I can now say that whenever you find a vulnerability on an asset that is missing and find protection I want you to change the risk score uh to a 99 for example you can also do it the other way around right you know you can say hey asset if it's kind of you know you know perfectly fine it's being scanned for vulnerabilities meaning you you write the opposite of this policy then you can go and say change this to 50 for example right you know so you can do that as well now you have this context of asset intelligence feeding into vulnerability response workflows in real time so it's not somewhere out there you don't have to swivel share to a different console you don't have to export into Excel spreadsheet and then import uh here you get them directly real time uh to drive smart vulnerability response so with that I'm going to go back to very quickly a recap right you know of what I kind of you know walked you through uh here right now or or or it's time for the second poll actually right now John do you want to run the second poll absolutely we're going to do right away so our second poll I am going to launch it now it's focused on and you should be able to see it now how you currently managing remediation of security to uh coverage issues as of today I do that are you doing that manually uh following up with it op steam to install security tools or are you using the itm offering from service now to create a and track incidents for those issues otherwise are you leveraging automatic scripts to install the security agents or uh restart the agents or are using a combination of manual methods and scripts to install the required tools and devices see many answers coming in and by the way uh great job so far from the presenters really great content I see a lot of interaction especially from the attendees which is always good to know and I'm glad to see all this interaction means that there's definitely a lot of interest in this topic now I am going to uh stop I'm going to end the poll and I'm going to share results we can see that the majority of you is using a combination of manual methods and scripts followed by those that are leveraging itm from service now to creating track incidents and uh followed by those that are manually follow up uh with it teams and the the least um popular approach is to use automed scripts to install the security agents and uh restart the agents so thanks for that uh deac do you have further slides to share yeah I'll wrap up here right now so um so essentially kind of you know what you all saw was how we could easily converge asset inventory using service graph connectors for all kinds of asset classes and manage your tool Health right you now and monitor uh your security posture in a real time you saw how uh this enables a a breadth of powerful functionalities around monitoring with outof the Box insights your ability to create custom policies uh keep an eye on in anything um using dashboards driving remediation using of your workflows and being able to easily report of this data using the service now platform and infusing that into your standard vulnerability prioritization workflow so here is a picture of the mental model of how vulnerabilities are prioritized and remediated right you now from inje uh to hand over to uh it for example right now and managing all governance and um uh any remediation activities within that including closing of the loop you're able to do that right now so um uh so that kind of you know concludes uh you know my portion of the presentation uh I'll be super happy to kind of you know do follow-ups with anybody who's interested in the solution uh John I believe we'll have a survey uh at the end of it uh at the end of the the the webinar that'll be sent out to participants so if anybody would like to learn more uh we are here uh to share more details with you absolutely deac we're going to have a survey now in a few moments so when uh you'll exit this webinar you'll be prompted out to fill out a short survey as we said but before that uh don't drop yet because you have a few minutes to ask the presenters and the experts here any questions uh you may have maybe I so sure you were answering a lot of questions in the chat as well and is there anything you would like to bring up for everyone one's interest and I think you're you're on mute free yeah I think we have some issues maybe deack however I just wanted to bring up a couple of idea a couple of questions that we' have seen there um so regarding there there was interest in the uh TLS uh certificate management from the uh three sessions of for all those that are interested in managing discovering and managing their Certificate request certificate fulfillment certificate automation we have the certificate um Inventory management feature which is included with item visibility SK or any SK that includes that one um and that is available for you to cover um all those uh use cases we now support Acme uh protocol so we have expanded our support for our uh certificates and can discover those either via Port based or URL or uh CA uh so from the certificate authorities themselves then we had um a couple of questions on the install software compliance uh maybe deac you see anything you would like to bring up specific so so for few questions that I see from the audience is like with respect to install software data the typical package manager is what like every single inventory data sources will use and service now Discovery also does that but on top of it we have ability to detect a software just from files or the running process fingerprints or by Advanced patterns and there is some uh nice questions around like how to detect like a software that's run from boot and uh there'll be always some kind of an fingerprint that can be uh used and absorbed uh we launched a service called item content services so if you want Deep dive information on this topic reach out to your sales team and ask for one-on-one demos either on spcs or with the itom discovery topic and we'll be happy to show you the product in live and uh know we can have further exploration uh there's also a lot of questions on uh the kubernetes and other uh estate information like the breadth and depth of data that comes with the discovery uh sets the foundational bedro for you to drive those outcomes within the cmtp uh and multisource uh option is super important especially when you are activating the service graph connectors and you set the priority on which of those data sources will be your authorized data source and this can be controlled uh to the class level and even to the attribute level say for example you have both tanium Crow strike secm and you can Define like uh which of those data sources on the end Point devices will have an authority to override the serial numbers for example so you'll be able to know dictate the uh leadership board on know which service graph connector will have the highest precedence in terms of data so those are all the typical topics uh there's some interest in the service mapping and the Machine learning based process fingerprinting yeah we have done some webinars on that topic as well uh service context is super important to drive those critical cyber secur outcomes deep did I miss anything nope you nailed it tree yeah thank you that is amazing so I'm just going to keep sharing my screen for the last two slides can you see my screen now yeah so just one topic like there's like questions on licensing on security parure control whether this is included with the item visibility license it is not uh it is coming under the security workflow so please reach out to your account team as for an one-on-one discussion on this product called security posture control either Deepak or the product managers will be happy to have one-on-one conversation explain the offering and how we can drive that uh cyber security program for you over to you John amazing sh and DPAC you nailed it really uh that was an amazing presentation and uh we already uh are receiving a lot of interest and uh great feedback now just a quick reminder for everyone make sure that you uh scan this C code so you can enroll into the upcoming live on service now webinar sessions if you like today's topic but especially if you don't want to miss out on the uh item visibility in the cloud acceler Academy make sure that you enroll into this so you'll be kept up to date on all our relevant uh Hot Topics uh what's new and uh much more especially I would like you to scan this QR code or access this link that you see right here um so that uh and and I'm going to try to actually paste it here um going to do something I will just try to share it in our chat right away so make sure that you scan that QR code as I was saying so that you won't miss the previous episodes um here here you will see the um previous recordings you will find the preview sessions decks and uh you'll be able to accessing this way to really invaluable resources so just please keep attending these sessions and suggesting especially what would you like us to see uh to show you in the future ones again I really want to thank everyone sh deac and um Rahul that was in the back uh providing his support with really appreciate your efforts uh tremendous topics today and thanks everyone else for attending this is a really a great engaged audience and we can't wait to see you in the next episode um uh we'll definitely wait for you in the upcoming one that is going to be covering our focus on the uh Cloud uh Solutions and you will better understand what do we do there but very likely you'll be already using some of our Solutions uh in the cloud uh as of now so again thanks everyone for attending uh we'll be really looking forward to see you in the next episodes and we wish you a great rest of your day take care
https://www.youtube.com/watch?v=3M1AUQK45S0