Device Security Integration with SolarWinds Platform
Focus
Focus
What's New in the NetSec Platform

Device Security Integration with SolarWinds Platform

Table of Contents

Device Security Integration with SolarWinds Platform

Integrate Device Security with SolarWinds Platform to learn device details about network subnets and physical locations of IoT/OT devices.
In some environments, the placement of the firewalls makes it hard to discover and identify all network subnets and devices through passive traffic monitoring. The SolarWinds Platform integration enables Device Security to import network subnet information and track physical locations of IoT and OT devices. Device Security learns about subnets and devices from the SolarWinds Platform IP Address Management (IPAM) and User Device Tracking (UDT) capabilities. With the information learned from SolarWinds, you can identify your network subnets in Device Security and identify physical device locations, assisting in investigating and isolating risky devices in your network.
When you configure the integration to learn IPAM information from your SolarWinds infrastructure, Device Security imports subnet configurations, VLAN identifiers, and subnet descriptions. This helps you reuse established subnet definitions within Device Security without manual configuration.
When integrating with SolarWinds UDT, Device Security discovers individual device details, such as specific switch and port connections, switch names, port numbers, VLAN assignments, and wireless access point information. This network location data helps you identify where devices are physically connected in your network infrastructure and provides crucial context for device identification and security assessment.
The integration provides improved context in enterprise environments, where understanding device network connections is important for security monitoring and operational troubleshooting. You can create queries based on device network location, group assets by their physical network placement, and configure alerts for when devices change network locations. These capabilities assist in compliance tracking and identifying unauthorized device movement patterns within your network.