High Fidelity Discovery 2.0

Direct Query Manager Provides Accuracy, Speed, and Rich Attributes

Accuracy Matters

The Viakoo Direct Query Manager (DQM) provides comprehensive and easy-to-deploy agentless discovery designed for Cyber-Physical Systems.  Applications, devices, and the networks they communicate on are reported with high accuracy and rich attribute data.   DQM is based on a proven architecture with over 2 billion hours of real-life usage. Below are the key elements of how Viakoo gathers and analyzes data, provides insights into CPS assets, vulnerabilities, and operations in order to perform vulnerability remediation. In addition, Viakoo DQM provides flexible options for deployment and span of control.

Agentless Application-Based Discovery

While Viakoo Direct Query Manager can discovery any type of digitally connected IoT/OT/ICS device, understanding the difference between Loosely Coupled and Tightly Coupled is critical. Loosely Coupled Devices are related but individual things, like printers, headsets, or monitors. Tightly Coupled Devices are collections of things that work together as a team to achieve a specific business outcome.

Viakoo DQM discovers and analyzes the applications that manage their related Tightly Coupled Devices and the networks they communicate on – providing highly accurate data on the entire cyber-physical system, verifying interoperability, and creating and tracking an audit trail for all system elements.

Rich Attributes

The first thing CISOs need to do is understand the risk for their most important IoT systems. Viakoo interoperates with leading asset discovery solutions, enriching network-based discovery with additional information from Viakoo so you have a more comprehensive view of IoT devices. 

The Viakoo Action Platform then goes a level deeper to evaluate the firmware, password and 802.1x/TLS certificate status for IoT devices.  Vulnerable devices can then be updated, quickly reducing IoT cyber risk through vulnerability remediation.

Device-Based Visibility into Applications, Networks, and Accurate Details

Finding devices is one thing, delivering accurate and detailed insight into them them is quite another. This is where the Viakoo Direct Query Manager shines.

Instead of inference-based discovery solutions that use network traffic to sense if a device is there, DQM directly coordinates across multiple data sources and applications to give you a complete and high fidelity asset inventory.  Viakoo Action Platform uses this data to provide centralized 1 click vulnerability remediation for firmware, password and 802.1x/TLS certificates. This way, you can move to compliant posture almost instantly after devices are discovered..

Software-Only Deployment 

Viakoo DQM is fast and easy to deploy, with lightweight software actors doing the hard work.  No data entry required or hardware helps shorten the time to insight.  Viakoo’s user interface takes a compliance-based approach, highlighting which devices are out of compliance and need attention.  Firmware, passwords and certificates can be managed and updated from the Viakoo Action Platform interface.   Unlike other agentless asset discovery solutions, Viakoo DQM get you to actionable insights fast.

Span of Control

Distributed IOT, OT, and ICS devices and applications can be difficult to visualize and manage.   Viakoo makes this quick and simple with graphical user interface, complete logs of all device and application details, and customized reporting to meet your organization’s requirements.

Patented Technology

Until now, it was just too expensive to manually track and remediate cyber vulnerabilities across thousands of devices in 100s of locations.  For the first time, Viakoo Action Platform centralizes and automates the discovery, remediation and compliance of security for IoT devices.  In the past, this work would require manual processes on top of coordinating  and configuring 10s to 100s of device management systems.  Viakoo Action Platform dramatically reduces the costs associated with IoT device security and makes the impossible not only affordable to enterprises, but so cost effective that CISO can finally close IoT device security risks at an ROI far higher than almost any other security project.