Access Analyzer: The who, what, and why of access path analysis

By |2017-11-13T15:49:33-07:00July 13th, 2015|Security Policy Management, Vulnerability & Threat Management|

Network security engineers have to understand who has access to what on their network, and why. In enterprise-scale networks, such path analysis can be a huge challenge. Simple tools like Traceroute are often used, but it has its own operational issues—namely, you have to be on the same machine you’re analyzing. This asset-centric method of [...]