Listing Thumbnail

    Axonius Asset Cloud

     Info
    Deployed on AWS
    Axonius transforms asset intelligence into intelligent action. Preemptively tackle hard-to-spot threat exposures, misconfigurations, and operational inefficiencies across your entire technology footprint, from AWS cloud resources to networks, SaaS applications, and physical devices - all in one place.

    Overview

    With the Axonius Asset Cloud, customers preemptively tackle hard to spot threat exposures, misconfigurations, and operational challenges across their entire technology footprint, all in one place backed by a comprehensive asset data model.

    The Axonius Asset Cloud streamlines the end to end lifecycle of all assets through our market leading Adapter Network. We build a complete, accurate, and always up to date model of your entire attack surface, directing focus to the most critical actions with the right context to make smart data driven decisions right sized to your capacity.

    With a single platform covering AWS resources, cyber assets, software assets, SaaS applications, identities, infrastructure, and more, Axonius equips Security, IT, and GRC teams with total visibility and sharp actionability to continuously optimize mission-critical risk, performance, and cost measures, measures that every Board cares about.

    Highlights

    • Secure and Optimize Assets - Axonius models your total attack surface to surface insights into the security posture, compliance state, and relationships of all your digital assets, and provides built-in automations to update asset state and posture to quickly and scalably close identified gaps.
    • Unify Vulnerability Management - Axonius brings much needed context and awareness to the vulnerability ecosystem by enriching asset data to better pinpoint threat exposure reach and exploit paths, with seamless automation to continuously verify closure and coverage.
    • Manage IT Operations Efficiency - Axonius is a force-multiplier for IT operations and strategy teams. True visibility across AWS and other tech platforms, powered by the Axonius Asset Cloud, empowers Shadow IT detection and remediation, ensures complete audit coverage for compliance efforts, and helps teams right-size licensing and software posture to accelerate business growth.

    Details

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Axonius Asset Cloud

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (2)

     Info
    Dimension
    Description
    Cost/12 months
    AXS_500_Complete
    500 assets: unlimited queries, adapters, and enforcements
    $90,625.00
    Axonius SM: 700 Users
    700 Unique SaaS Users; Unlimited SaaS Applications and Platform Users
    $88,000.00

    Vendor refund policy

    No refunds

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Axonius offers standard support and issue response for all customers during regular business hours. Contact our support team at support@axonius.com . Detailed support articles can also be found on our customer community and documentation sites.

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    50
    In Network Infrastructure, IT Business Management
    Top
    50
    In Device Management, Device Security
    Top
    10
    In Application Development, Continuous Integration and Continuous Delivery, Security

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    7 reviews
    Insufficient data
    7 reviews
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Asset Discovery and Mapping
    Comprehensive asset data model that builds a complete and accurate representation of entire technology infrastructure across cloud, network, SaaS, and physical devices
    Vulnerability Management
    Advanced vulnerability ecosystem enrichment with contextual asset data to identify threat exposure and potential exploit paths
    Security Posture Analysis
    Automated insights generation for security configuration, compliance state, and digital asset relationships with built-in remediation capabilities
    Multi-Platform Integration
    Unified platform supporting asset intelligence across AWS resources, cyber assets, software, SaaS applications, identities, and infrastructure
    Automated Threat Detection
    Continuous monitoring and verification system for identifying security gaps, misconfigurations, and operational inefficiencies across technology footprint
    Asset Discovery
    Comprehensive discovery and identification of all asset types including IT, IoT, cloud, virtual, managed and unmanaged assets
    AI-Powered Threat Intelligence
    Leverages artificial intelligence for early warning threat detection, anticipating potential security risks and enabling preemptive action
    Cyber Exposure Management
    Real-time monitoring and management of cyber asset risks with continuous vulnerability assessment and prioritization
    Multi-Domain Security Coverage
    Integrated security capabilities across OT, IoT, ICS, medical devices, and enterprise networks with comprehensive visibility
    Adaptive Threat Neutralization
    Dynamic threat detection and mitigation using advanced intelligence techniques including dark web monitoring, dynamic honeypots, and attack surface modeling
    Cloud Infrastructure Scanning
    "Performs comprehensive assessment across entire cloud infrastructure using 100% API-based approach with rapid deployment"
    Risk Correlation Mechanism
    "Correlates multiple security signals to trace potential infiltration vectors and identify complex attack paths"
    Multi-Cloud Support
    "Provides unified security coverage across diverse cloud environments and resource types"
    Policy Interaction Modeling
    "Analyzes overlapping cloud policies, configurations, and compensating controls to predict complex security interactions"
    Graph-Based Visualization
    "Generates comprehensive cloud security mapping using graph database to reveal interconnected security issues and risk relationships"

    Security credentials

     Info
    Validated by AWS Marketplace
    FedRAMP
    GDPR
    HIPAA
    ISO/IEC 27001
    PCI DSS
    SOC 2 Type 2
    No security profile
    No security profile

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.5
    2 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    50%
    50%
    0%
    0%
    0%
    2 AWS reviews
    |
    10 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    reviewer1319712

    Enhance asset visibility by integrating with existing network components

    Reviewed on May 07, 2025
    Review provided by PeerSpot
    ">

    What is our primary use case?

    The general use case for Axonius  is cybersecurity asset management. My company, an IT solution provider, works with Axonius  to offer both asset management and cybersecurity asset management. This provides full visibility of the assets in the network. Axonius integrates with the customer's existing setup, such as Office 365 , Zoom , servers, firewalls, antivirus, email security, and active directories, to give a comprehensive view of the assets they have in their network.

    What is most valuable?

    From a security perspective, Axonius allows users to check for obsolete operating systems, like Windows XP or Windows 7. It highlights vulnerabilities due to unsupported systems, offering insights into network security issues. Axonius' integration with active directories and antivirus servers identifies PCs lacking antivirus solutions, pinpointing potential security vulnerabilities.

    What needs improvement?

    Axonius could improve by increasing their integrations with more technology vendors. There are cases where Axonius doesn't have full compatibility with some newer solutions that have recently appeared in the market. It would be beneficial for Axonius to keep updated on these solutions to enhance asset inventory management. Additionally, having embedded AI within their solutions would also be advantageous.

    For how long have I used the solution?

    I have been working with Axonius for almost one year and a half, and we have a partnership contract with them.

    How are customer service and support?

    The support provided by Axonius is good, but it requires improvement as the company is still growing. They respond when contacted, but during high demand, the quality can be affected. Overall, the knowledge base is good.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    If the customer has prepared all prerequisites properly, Axonius can be deployed within one or two days. The initial setup is quite fast and efficient if all requirements are met beforehand.

    What's my experience with pricing, setup cost, and licensing?

    Axonius is somewhat costly and has a price above average. It provides great value, but obtaining significant discounts can be challenging. As the tools are unique, they have limited direct competition, which can make negotiations for discounts more complex.

    What other advice do I have?

    Overall, I would rate Axonius an eight out of ten. It's a unique tool with great potential and offers excellent asset management capabilities combined with cybersecurity insights. I would rate the overall solution an 8 out of 10.
    Information Technology and Services

    Axonius as an Asset Intelligence solution.

    Reviewed on Oct 16, 2024
    Review provided by G2
    What do you like best about the product?
    Axonius works different compare to other asset management solution. The way it works is like an Asset Management solution with intelligence. You can ingest all available information and play with it.
    What do you dislike about the product?
    Axonius is much dependent to the number of management tools it integrate with (in a form of Adapters). As much as possible you should have different tools such as AD, EPP/EDR, NAC, NGFW, NMS, VA, etc.
    What problems is the product solving and how is that benefiting you?
    Axonius solves the problem in overall asset visibility. It also helps you to identify the unique number of assets in your environment compare to other asset management platform, Axonius correlate, normalize, validate, and deduplicate data. By the help of correlation, you can easily identify rogue devices, devices with no agents, and especially in auditting and compliance check.
    Alexander Bershtansky

    Helps organizations and big companies improve business requirements and control processes

    Reviewed on Aug 22, 2024
    Review provided by PeerSpot
    ">

    What is our primary use case?

    I use the system to collect background data, identify cybersecurity issues, and catch exceptions in systems like NetSuite.

    What is most valuable?

    I like that the tool has a user-friendly interface. It helps organizations and big companies improve business requirements and control processes.

    What needs improvement?

    Adding more detailed descriptions or YouTube videos about specific features would help improve the application.

    For how long have I used the solution?

    I have been using the product for two years. 

    What do I think about the stability of the solution?

    I don't recall any exceptional stability issues, but I assume they've improved with new versions.

    What other advice do I have?

    I rate the product an eight out of ten. 

    KirubakaranJayakumar

    Agentless and can easily integrate with other platforms and provides robust API monitoring capabilities

    Reviewed on Aug 16, 2024
    Review provided by PeerSpot
    ">

    What is our primary use case?

    We use it for reporting, noncompliance reporting, and identifying gaps. We use it for API monitoring within our company.

    And we also use it as a CMDB. Our security team, people within the SOC team, and people within other IT departments use it as a CMDB. We have integrated Axonius with a few of our solutions, so it has good inventory mapping. It provides information like installed software, running services, file shares, patches, and more. We have integrated it with many different solutions that we use internally.

    We refer to Axonius as a CMDB, but the tool was actually onboarded for KPI monitoring and to alert against noncompliances. For example, if a device is running with an out-of-date agent or if a device is missing an agent it is supposed to have, Axonius helps us find unauthorized software installations within corporate devices. We use it for various KPI metrics and send out automated alerts to the relevant IT personnel to address and fix those noncompliances.

    Right now, we use it mainly as a CMDB, but the tool was onboarded for KPI monitoring and metrics.

    What is most valuable?

    It's the agentless solution. It doesn't rely on specific agents. We integrate Axonius with APIs, which are called adapters or connectors. Essentially, it's API connectivity between different platforms. Getting Axonius up and running only takes a few days. If you have a server or solution, you create firewall rules to integrate with other platforms. This way, Axonius can communicate and collect data from them without needing much infrastructure. It sits on a device and collects data from multiple environments and sources, aggregating everything into a single console.

    It also creates multiple dashboards. Axonius provides preconfigured dashboards that can be customized to your needs. What I like is that everything is in one solution, and you don't need agents running on every process to collect information. Other platforms like ServiceNow rely on agents installed on assets, but Axonius doesn’t.

    Axonius is agentless and can easily integrate with other platforms. It uses API access accounts with other security solutions. They support a lot of different solutions. When we first started using Axonius, they supported around 400 IT solutions. Now, I think they support more than 600 or 700. I've lost count.

    When we started working with them, Axonius was a small company with just a few engineers, but now they’ve grown into a large enterprise. They’ve been great at fixing issues and customizing solutions for clients. They maintain all of that really well.

    It is a good solution; it lets you customize the solution based on customer requirements. They can even create custom adapters. For example, if you have a legacy platform or a new solution that doesn’t have official support yet, Axonius can deliver quick fixes by developing custom adapters. I’ve worked with them when we needed to integrate a solution that wasn't in their supported integrations. They gathered the requirements, asked us what data we wanted to pull, and quickly delivered a custom adapter. They also added that adapter to their product timeline, ensuring it would become an official integration in future releases.

    In that sense, Axonius has been fantastic at delivering these solutions. We’ve had no issues with them.

    What needs improvement?

    Axonius can improve on delivering compliance-related features, like PCI DSS, and different dashboards that work with various compliances. For example, if a company follows ISO, they can create a dashboard that shows the gaps within that compliance framework. They have started delivering some of these features, but the tool still needs to mature for companies that heavily rely on certain standards, like payment compliances or cloud security guidelines.

    In those cases, the tool might need further development. However, I haven’t had specific issues because they are really good at fixing things. Whenever we report or escalate something, they are quick in providing solutions.

    I think they are very flexible in terms of working with them. But at the same time, they are customizing the solution too much based on client requirements. This might cause issues in the future because if they keep customizing the solution for every single client’s requirement, they might face difficulties in future releases. Integrating every customer’s options within the platform might be challenging to handle.

    That might be a risk they are taking. But we have had good communication with them, and overall, it’s been positive.

    For how long have I used the solution?

    I have been using it since 2021, so it has been three years. It’s been cruising through so far fine. We didn’t have any issues with the platform. 

    During that time, they didn’t have the SaaS options. Now they have started offering SaaS models. We used on-premise deployment, which is hosted within our company data center. But, it’s been going good.

    What do I think about the stability of the solution?

    I would rate the overall stability a ten out of ten. But Axonius has a few things they need to integrate. They need to move forward to get more mature in the current IT world. So I’d like to give it an eight out of ten. In terms of working with them and the company’s flexibility, I’ll give ten out of ten for getting things done, customizing solutions, or providing quick fixes for issues we face. For all of that, I’ll give ten out of ten.

    What do I think about the scalability of the solution?

    All IT people who work on maintaining assets, ordering new assets, and compliance managers will be looking into it. IT directors and anyone who works with IT, but not the end users. End users don’t have access to the platform, but anyone who works in IT and manages the platforms and infrastructure, as well as compliance people who want to monitor KPI metrics and view reports, use it. So, there are 500 to 700 users within my organization.

    How are customer service and support?

    They’re really great people to work with. Every customer has a dedicated technical account manager. We usually have weekly calls with them to check on everything. When we onboarded the platform, we had regular calls, and they were always available. That was a great experience working with them.

    How was the initial setup?

    Since it’s an OVA package, it’s a virtualization package that you can just deploy on your VMware, ESXi, or whatever virtualization solution that your company internally uses. It’s just, like, import it, and then they’ll provide you with a license key. If you do a POC, they’ll provide you with a license key for a month so you can try it out and see how the product is going. Once you’re happy, they can provide you with a proper license for however many years you are going to sign the contract with them.

    But, the initial setup is pretty straightforward. It’s not like you need to change a lot of things in your environment. It runs in a standalone installation. They also provide a cluster-based solution. If your IT presence is across the globe and you have huge latency that you want to reduce, you can have multiple instances in your different data centers and then aggregate that information in a centralized cluster and show it in a single dashboard. They started offering this around the same time we began working with them.

    In terms of onboarding, it only takes a couple of days. It's mostly dependent on your organization's RFCs, change requests, and approval processes. There aren't a lot of configurations needed. You just need to open a few firewall ports for product updates.

    The product runs on a Debian-based operating system, and you can scale it based on your requirements. If you're trying to pull 50,000 assets, the requirements will be a bit different. You'll need something like 8 cores, 16 or 32 gigs of RAM, and probably 5 terabytes of storage to store the data.

    One of the good features of the product is snapshots. You can go back to specific dates and check the inventory status at that time. Axonius has an option to take daily snapshots within the product.

    Axonius collects data from other platforms, and you can configure it to take snapshots at specific times. It keeps the snapshots for as long as you want, impacting your storage. You can keep the snapshots for ten years and still go back to a specific date to check how many assets you had, how many were identified for a specific noncompliance, and when it was fixed. You can check all of those details going back to a specific point in time and still get that information.

    Lots of other products, like CMDB products or cyber asset management products, don’t have that functionality. Other platforms give you live data but don’t provide an option to go back and check how it was ten months or a year ago. Axonius gives you historical information and keeps it as long as you want. You can configure it to store the data for one year or ten years based on your storage capacity.

    That’s one of the good features we heavily rely on internally.

    What's my experience with pricing, setup cost, and licensing?

    Axonius is quite a bit cheaper compared to other solutions. And the amount of value they provide is really huge compared to other vendors. So, it’s based on the actual requirement and how you want to use the product within your IT department. 

    You can get insights within the platform and see how you can integrate Axonius with your current setup. You can make a decision to go with the POC or something like testing. But I don’t think they provide a free download option. You need to request access to a test engine and then get the software.

    Which other solutions did I evaluate?

    Probably, if you have other solutions like ServiceNow, because a lot of companies already have ServiceNow, you might not find much value in moving to Axonius. Whatever Axonius provides, ServiceNow also provides it. So, you need to assess what you’re planning to use it for and check the features that Axonius provides. 

    See whether you want to move platforms. They have a few unique features within the platform. But if a company already has a proper CMDB or an asset management solution, you should review your current internal solutions and see the benefit of moving toward Axonius. It might be a financial decision or just a couple of features that Axonius provides additionally on top of the CMDB.

    What other advice do I have?

    At this stage, I would rate it an eight out of ten. The product needs to mature a little bit more in terms of following up on compliances.

    Axonius is a US-based company. We had a few difficulties in getting the legal documents signed when we started working with them. If they had an EU presence, our legal department might have directly worked with them, and it would have been much easier. But since they are completely US-based, we had to sign a lot of data processing agreements and deal with transferring data between the EU and US. The legal department had a few hiccups, and it took some time to go through all those processes.

    In the future, if they have a regional headquarters in the EU or where there is no data transfer from the EU region to other regions, it would be much easier for companies to start working with them quickly. In the initial days, we had to sign a lot of contracts because when we started working with them, we had to provide some sample data, and they had to sign a lot of DPA (Data Processing Agreements) between both companies and the legal team. It was a back-and-forth conversation, editing that legal agreement, and putting it in place between both companies.

    We had a few issues in getting the single agreement signed in the initial days. But apart from that, no issues.

    It’s pretty much company-focused decision to choose a solution. If you don’t have any solution for CMDB, I think it’s good to go with Axonius because they have good integration. They support a lot of different tools. Within their platform, you have a separate section per adapter where they’ve mentioned probably 600 to 700 IT solutions that they can integrate and work with. You can also check within the description what kind of use cases you can get from that integration. For example, if you have some kind of vulnerability management solution or MECM or a BitLocker administration tool, Axonius will give you information on what kind of data it will pull from the individual sources. You can create reports, check BitLocker statuses, and see what kind of encryption has been applied and how it is maintained.

    It will give you those use cases as well, showing what you can get out of that particular integration between Axonius and whatever solution you are looking for. You can list down all the solutions you use internally within your company and then check the Axonius portal or website to see what use cases you can integrate with the platform. You can at least get an idea before you even try to speak with the Axonius team and start working with them yourself to see the benefits of utilizing the platform.

    We don't use it to the fullest. We just use it for a few pieces because we have other solutions for that. But they have a lot of different features within the platform. We are not actually replacing everything. We just use a few bits and pieces, like enforcement center actions, CMDB, and a few other features within the platform.

    reviewer2516586

    Offers good updates and patches to users

    Reviewed on Jul 19, 2024
    Review from a verified AWS customer
    ">

    What is our primary use case?

    In my company, we did a production pilot in my environment where I work to evaluate the tool's capabilities, and our use case was looking for unmanaged endpoints, like workstations that may have fallen out of management by their management server, like McAfee, Tanium, SCCM, or similar things.

    How has it helped my organization?


    What is most valuable?

    The tool's query wizard isn't bad. Suppose you have ever used or even talked to anybody about other products that use vendor-specific queries, like Splunk, which is supposed to be one of the harder ones to use and master. Compared to Splunk, Axonius has made the tool a little more user-friendly where it is a little easier to use, and that is really the bread and butter of the product because that is where you get all your reporting from on your assets to make determinations on what you are looking for, like security or and if you wanted to use it for asset management, you could. As it pulls so much data, there are other options in the query that you could choose from depending on what information you were trying to obtain about your environment.

    What needs improvement?

    There was an issue with the tool, and sometimes, the biggest problem was that there was a need to determine if one machine was the same machine. Sometimes, you would have to go into the interface, and Axonius realized that after which it offered tools that you can run, erase, or remove certain assets that didn't duplicate to have them rediscovered again or to see if that may help or aid. Sometimes, when you redeploy servers or make changes to servers, Axonius may pick that up as another entity when it's really not, and then you could have multiple records for the same server, in which case that can be confusing when you are trying to run reports and queries to get information. Axonius hasn't really been around that long. I think it's only about five years old. It was originally an Israeli company. I believe the tool was developed in Israel. I work as a government contractor. We use it in the government, and the tool had to actually stand up as a federal government agency relationship management here in the United States to be able to even use it to meet the requirements of the government because it is a foreign company. In the beginning, it was a little slow going because the tool was still getting established to be able to have the government as a customer of the US government. Axonius has continually improved that product throughout the process. When my company started to use the tool, it was in its infancy, and it was a virtual appliance. Axonius evidently had two different appliances at a time. I don't know if it has them today because it has been a little while now. Axonius had one tool for the private sector and then one for the government with more hardened security features that met certain what they call STIGs or security baselines that the government operates under. Axonius would try to give you a hardened or pre-hardened appliance, which was good. In such a case, they know as well if you want to apply certain security parameters to their servers to meet requirements. The tool is usually aware of what will cause an issue, and the product works with you pretty well.

    For how long have I used the solution?

    I have been using Axonius for two years.

    What do I think about the stability of the solution?

    Basically, what the tool does is that the more endpoints you have to manage, the more you scale the platform up. For instance, the tool has benchmarks; if you go out to their website, it lists how many assets you are going to manage and what kind of server resources you would need to configure. For instance, if you are going to do all our stuff in VMware, you can go to the VMware shop. All these servers are basically virtual appliances, and if you are familiar with the ones that are pre-configured with the OS and the app, and if you import those into your VMware environment, then you can have the option to configure how many front-end CPUs you are going to use and how much memory you are going to allocate to the virtual machines. The core node itself usually gets the beefiest or the most resources because it hosts the database. It initiates a lot of all of the fetches or queries that you run against your database. You set all that up in advance based on the number of endpoints you think you are going to be managing. You can scale it up afterward, so if you end up having more environments that you wanna add to it that you didn't initially plan for, then you can go in and change the resources on the server, like add a few more CPUs or more memory. The tool has it all broken down on its website as far as the scale that you would need is based on the number of endpoints that you want to manage, and even the licensing is based on it. Everything is based on how many endpoints you want to manage.

    What do I think about the scalability of the solution?

    My company probably had 60,000 endpoints and about 20,000 or 30,000 users as it integrated with Active Directory. You can get user information, too, even though it is really about assets and endpoints. The tool can gather so much other stuff because it's really pulling all kinds of data to correlate, and that is what it does. It correlates with data. We had multiple Active Directory domains, which had thousands of users, and you can connect it to each individual Active Directory domain so that it can reach into that domain and retrieve. All the read-only stuff, like I was saying before. If you do the read-only implementation, it is a lot safer because it is just read-only. You only need to grant the service account read-only access in a typically read-only role, which is offered by a lot of different solutions. Axonius has a typical read-only role that you can implement on the back-end server for the service account, so it can't go beyond read-only unless you will be taking actions, remediating, and doing automation. When things need to change, you need something greater than read-only for your service accounts to be able to take action.

    How are customer service and support?

    The solution's technical support was good. The tool has a technical account manager and then an engineer. Both of them worked with you, and they were very responsive and quick to help us fix any issues that we had with the tool. At some point in time, I know that the product will mature. When you go to patch the product or upgrade the product, it was being developed when we were using it, so we weren't able to use it yet because it was still under development, and it was, like, a patching server, which is almost like what Microsoft WSUS server is, where you have a server in your environment that you can use potentially, or you could even go across the internet. There are machines that are more air-gapped where they can't talk to the internet directly. You could potentially have a server like in your DMZ, and it could talk to Axonius and pull down patches. Then, your servers inside could talk to that to automate patching, and Axonius was working on it. As it is going to be a year in December, I think the tool is probably up and running, and it might even be using it now. There were different kinds of initiatives that Axonius was working on at the time to improve the product, and now the tool is getting more cloud integration as well. The tool has its Azure and AWS offerings. If you know anything also about the architecture, the main server is called the core server, and it has a database known as MongoDB, which basically collects and stores all the data. We have the other server role. We used a couple of server roles, and one was the core server because you have to have that since it is where the GUI is hosted. When you connect to the GUI, you are actually connecting to the core node. It's presented from the core node, and then they have what they call collectors. You can take those collectors and place them throughout your environment, and what is nice about the collectors is that they only use a single TCP port. You could place the collector in an environment that may collect several different types of data from different assets. In such a case, if you didn't use the collector, you would have to have multiple firewall rules. If you are collecting data from Microsoft servers, like Active Directory and SCCM, DHCP, and certain Microsoft services or Linux services or other products as well, Axonius integrates with a ton of tools. The tool had around 700 adapters that it had developed, and some of them were better than others as far as their maturity and what they gathered because we would go into it, and we would connect one of these adapters thinking that we were going to get all the data. Axonius publishes what you can collect. It is good to go out and look at the adapter and what kind of data it can gather before you use it. It may not give you what you are looking for. We connected to probably ten or twelve different connections or adapters to different products in our environment. We had multiple collectors deployed, and it was nice because you just had to get one firewall rule implemented, as it would collect everything locally in that subnet where all those back-end servers lived. Then, all those ports and protocols were there because it was in a VLAN, and they were already opened anyway, so you didn't need any firewall rules there. The tool saves you time with firewall rules because where I work, firewall rules can be a headache because you have to go through change management and do all this stuff to get them implemented, and that can take time as it all gets scrutinized. It is nice to be able to just have one port open or one TCP port, really, for the collector node, which is the communication from the core node to the collector node to actually pump that data back from the collector to the core node to be put into the database. I rate the support a ten out of ten.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    Gartner classifies Axonius as a CASM tool. I am not familiar with the tool's competitors. I don't know because that is kind of a newer thing and not brand new, but probably within the last two or three years. It is the first time I have heard of it. I know there are other tools that offer a similar capability. Axonius is an attack surface type tool, and what is cool is that when you have a known vulnerability, like, a day zero, and there's no real fix for it just yet or the vendors are working on it, and they may have to have some workarounds, you can run queries against your whole environment to find those assets that may be affected so that you know right away what your security posture would be in the event of a day zero for whatever asset we're talking about. In this case, then you would have a clear picture of the number of assets that I need to perform this workaround until the vendor can come up with a patch. In that instance, it kind of serves as an asset manager because you are looking at it for assets. The confusing thing to people about the product is that it grabs so much data about your environment that you can use it for a multitude of purposes, and asset management, which could definitely be one of them, but they don't market the product as an asset management tool. We used it as a CASM tool.

    How was the initial setup?

    The product's initial setup phase is pretty straightforward. My company operates in a VMware environment, so we get the pre-configured VMware servers that are offered. We just import those into VMware, the servers, and basically figure them out for our environment with TCP/IP and DNS. NTP and all the normal stuff that you would do for servers to deploy are good for working with, but they don't give you full SSH access. The tool has a menu-driven tool that you can use too, and it has been maturing over time because when the product was first rolled out, and we started using it, we had a lot of interaction with their security and their engineers because they don't want you to go in and have full SSH access because you could cause issues as you won't know what you are doing. You could break their product, and so they limit your access on purpose so that you won't cause any issues. If you need anything that requires more access, then they give you access, after which you have to get with them. They are responsive and help you troubleshoot with Microsoft Teams so that they can see what we are doing. We can have sessions where we can share stuff, and they just tell us what to do. And they'll send us, you know, syntaxes that we need to input, you know, stuff like that. As we have gone along, the menu-driven tool they call the toolbox, or Axonius toolbox, is what you use for, like, day-to-day administration to do the basic back-end server stuff, and that toolbox is actually reachable through SSH access on the back-end servers on the CLI. You don't see that in the user interface where the regular users would be doing queries and using the product as a user. I am talking about administrative stuff here.

    For us, the product's deployment phase was a little challenging because we had to deal with other departments and business units. We were dependent on the tool's team because they had the keys to their kingdom, so we had to work with them to get the product deployed and get it connected to their systems because they had to, in some cases, make a service account for us and configure it to be read-only, give us the password, and then we would input that on our side to be able to connect to their system their back end system. There was change management involved. There were server firewall rules. Typically, we did that collector, which was a server role, and we would implement a collector in the environment, and then we would just the collector in that environment would just fetch the data from those different servers with those pre-configured accounts. Sometimes, they could be domain accounts if whatever solution it was was domain joined. It was able to have a Windows service account if it wasn't a Windows system. Windows systems are pretty much domain-joined, and you could use an Active Directory service account on those systems that we could set up. Then, we would tell them what we made, and then they would add it on their side, and then it would work. There were some hiccups here and there, of course, getting that stuff straightened out. It probably took about six months for us to get everything working just because of the scale of our environment and all the different people that we had to work with. It really becomes a delay because they own those systems.

    What's my experience with pricing, setup cost, and licensing?

    I never heard anybody bulk at it because we have other products, such as security products, as well. The product's price is more in line with or maybe a little lower in price than some of the other tools. It is kind of what I heard mentioned, but I don't know for sure because I didn't really deal in dollars and cents.

    What other advice do I have?

    Axonius is used in our company's daily security operations to manage and secure assets, and it has its own query analyzer. You can run queries against the data that has been retrieved in the database to make assessments of your environment on a daily basis. The tool has what is known as adapters, and those adapters connect to systems within the environment to pull data into a central repository to basically crunch data and deduplicate it down to what is called a master endpoint record, which is a single entity that represents basically one machine across multiple management platforms as a client machine, and then you can do queries against it. The tool pulls in so much data that you could actually use it for other things. The first thing that comes out of anybody's mouth when they hear about the product is that it is an asset management tool, but our use case really wasn't associated with it, and we didn't get it for that. The tool is more secure than some other products. The tool is all about security. We have high-level security audits where someone will randomly come in and evaluate your environment by surprise, so you don't have time to prepare because they want to see what your operating stature is and if you have a normal operating stature. When someone comes in to evaluate our environment, and they look for machines that are not being managed by their servers, and they could actually present a vulnerability, then it can definitely hurt your security score in the end when they are coming in to evaluate your security posture.

    The tool has automated capabilities that can remediate machines. It can. The tool definitely has automation capability, but we didn't use that. We were just basically using it to pull data from our management servers about the clients they manage to make determinations on our endpoints. You won't always know sometimes if your endpoint is functioning or not if you have so many of them. Basically, what it does is that it just connects you to all your management servers that manage those clients, and you can see graphically because, in the interface, it actually shows for the entity in question, like, say, it is just a workstation. It will show each management tool and the icon for that management tool, as well as the vendor's icon next to it, to show you that it is checked in with that server and that it's actually communicating with that server as a client machine to give you an idea if you have any endpoints that aren't being managed from any one of your management servers for your management tools.

    When it comes to integrations, the tool uses service accounts to do it, and they have a notion of a read-only service account, which is what we use. Or you can have one that has more authority or rights where it can actually take action. We did a production pilot because we needed real data. Originally, we did a pilot in a lab environment, but those servers in our lab environment don't really have a lot of data that is meaningful to us. We did a production pilot, which was accepted because we used read-only accounts, and all they will do is just pull data, and all the system needs, the management servers need, or all the service account needs is a read-only role on the servers so that it can just read the data and pull that data. It was a safer bet for us because we were just doing the production pilot. We needed real data to evaluate the product and see if it would meet our needs. The accounts were actually just read-only, which was the safe way to go in a production environment. The only thing that you had to worry about was that Axonius advertises that certain systems can take a performance hit when they get when that job runs, and they call it a fetch, and it runs periodically, and you can control that. You are in complete control of what time it fetches. We did it off hours, and we actually worked with the different teams to schedule it because if they had any operations that they ran off hours, we didn't want to interfere with that. We worked within the individual teams that manage those servers, like SCCM's team, McAfee's team, and Tenable's team, to be able to make sure that we were optimizing our fetches around their schedule that was good for that platform.

    The performance issues in the tool have been optimized to a level by Axonius, where the tool can tell by the stream of data what kind of performance they are getting across the wire, like the network. The tool knows the network bandwidth that is being used and things like that, and it will actually adjust that on its own. There are only really a couple of systems that advertise, and one of them was SCCM, which is now MECM. I believe that Microsoft has changed SCCM to MECM. I think it was Tenable because Tenable can have multiple repositories that you can configure for the product to use, and we can schedule those off hours. I just think that certain systems, depending on how much data they are going to fetch, can take a hit depending on how busy they are and stuff like that. In the end, we really didn't have any problems once we worked with the individual teams to polish and schedule the right fetch for the platform because they were SMEs who knew about the product. SMEs have worked with the tool, and we really didn't have any issues in the beginning because we worked with those individual teams where there was some coordination with the tool.

    The tool does have AI initiatives, but we have not yet integrated the product with any AI features. We didn't get the funding to continue our pilot as well. In December, I think it will be a year since the product has been turned off. Users have liked the product, and it is possible that it may receive funding in the future, in which case it could be powered back on and then brought back to life because, basically, they are virtual machines in VMware on-premises. Axonius does have a SaaS offering that you can run on AWS and Azure. We had an on-premise solution, and we managed everything completely. For more infrastructure as a service, we have a little private cloud.

    I would recommend the tool to others because it is kind of unique in what it does. I have never seen another tool do this before where it doesn't talk to any clients itself, so it is agentless. It pulls from your back-end servers and then correlates the data that it receives on those servers to create what I was saying before is what they call a master endpoint record, which represents a single entity across all those servers that may be like a workstation that is being managed that is definitely communicating and getting its updates to its management servers with all you know, and it could be because it is a client with multiple servers. I don't know any other tool that really does that in that fashion where there is no impact on the endpoint itself.

    I have been out of the loop for a little while now, and I haven't been using the tool. There are probably all kinds of new capabilities in the tool that I am not even aware of because when we were on it, I was working on it day to day for, like, a couple of years. So we were pretty up to date on all the new features that were coming out, some of their roadmap items, and where they were going with their product. Now, I have kind of been out of the loop for a little bit. I guess what you would probably think about is whether or not you would use it on-premise or in the cloud environment, depending on what kind of assets you have. As I understand, I think now it can reach back from the cloud through a gateway of some kind that you may have in your environment so that it could potentially get your on-premise stuff and cloud stuff altogether to where you didn't have to have separate installations. The tool does have integrations where you can have multiple sites, and they roll up all their data to a server in the cloud. You could just report right from the cloud on all the assets that were on-premises across your enterprise. The tool has a lot of capability. The product that we had was actually used on Rocky Linux, which is a Red Hat tool. The tool would release patches periodically or a monthly patch that was a security patch that they would give you that you would install for security. The tool would also have updates or upgrades where you could roll out upgrades, which is something that we usually did during the evenings when we had a maintenance window so that the user base wouldn't be using it.

    I am not really a security person. I am more of a virtualization engineer, so I work with VMware stuff and infrastructure and stuff like that. Our security people loved it because it did what the vendor said it would do, as they were able to find workstations and even other devices that weren't being managed. Not only that, it is good to find network devices that you may not be aware of that may be causing you a problem or could be security-related. One of the things with Axonius was that in some environments, it could find these little networks, like a Raspberry Pi or something like that, plugged into the network or something that shouldn't be plugged into the network. It would be able to find these devices where nothing else really could. The tool really kinda does work as they say, and it could help you with your security posture.

    I rate the tool a ten out of ten.

    View all reviews