Asimily is a cybersecurity platform that defends IoT, Industrial IoT and IoMT devices. It provides complete, time-efficient protection for the lifecycle of connected devices. This includes providing Inventory & Visibility, Vulnerability Mitigation, Threat Detection & Incident Response, and Risk Modeling capabilities.
Do You Manage Peer Insights at Asimily?
Access Vendor Portal to update and manage your profile.
Device identification, risk determination, utilization metrics, detailed device data, integrations - specifically with Renovo Live, and ProSecure Product documenation is built into the portal.
Identify IOT devices that are not in use. The ability to run customized reports for my different departments. The integrations with other products I own helps give me a better picture of my vulnerabilities.
We have been most impressed with Threat Detection rules, the ProSecure intel, and the integrations with other 3rd party platforms. Threat Detection custom policies or Actions enable us to automatically tag important devices as well as exclude network ranges that are just cluttering up the vulnerability lists. We subscribe to H-ISAC feeds so periodically receive notices of important issues with various medical devices which we are able to quickly determine the impact to our health systems thorugh ProSecure audits and reports. The Asimily platform's numerous 3rd party integrations has allowed us to connect to other vulnerability scanners, and EDR platform, and Active Directory services which greatly enriches the asset and vulnerability data withn the platform.
The product support documentation is good. I would like content available on the why, not just the how to implement integration for example.
The help guides for some features need updating. When installing new integrations I needed to reach out to get clarification on what to do next.
There is not much to dislike, but if I were to nitpick a little bit, the portal interface can be a bit overwhelming at times since there is so much that it can do. Also, while I understand the need for vendor appliances to be controlled, it can be difficult to assist in troubleshooting those devices when you have zero access to them, not even in read-only mode or a limited capacity.