Security Data Building Blocks
- Devices Accessed by External IPs
- Devices Possibly Containing PII That Have Public IPs
- Devices Using Commonly Exploited Ports
- Devices with Mismatch Between Prod and Non-Prod Environments
- Devices with No OSs
- Devices with OS but No Software
- Devices with Prohibited Software (as designated by customer)
- Network Information for IPs Without Attached Devices