White paper

Using Network Maps and Inventories for Security Compliance

Infrastructure Management

Today’s IT budget is tight. Determining how to meet growing demands for IT services and features while controlling spending is a challenge. Interestingly, many organizations have widely deployed tools that can be used for more than one purpose. Administrators and technologists often have the tools at their fingertips to deliver on demands while keeping budgets flat and minimizing their own efforts.

 

A great technology to leverage in this area is performance monitoring data. It can often be used to create logical network maps, inventories, security analysis, and compliance reports. With little additional work, you can probably take your existing performance monitoring solution and get much more value out of it by using it to meet a critical security need.