Axonius Logo
  • Get StartedGet Started

Glossary

    Showing 4 Items

    CAASM

    Learn which assets introduce the most risk. The Axonius Platform provides actionable data about each asset, including...

    ...

    CMDB

    A configuration management database (CMDB) is a database that contains all of the relevant information about the software.

    ...

    CYBER ATTACK

    A cyber attack is an attempt to gain unauthorized access to a computer system or network. The purpose of a cyber attack is to disrupt, disable, destroy, or maliciously control a computer system or ...

    Cloud Asset Compliance

    Cloud asset compliance is the process of monitoring and managing cloud assets to ensure that they comply with organizational

    ...
    See Axonius in action

    See Axonius in action

    Discover what’s achievable with a product demo, or talk to an Axonius representative.

    • Request a demo
    • Speak with Sales
    • Get StartedGet Started
    New to Axonius?
    • About our PlatformAbout our Platform
    • AdaptersAdapters
    • Customer StoriesCustomer Stories
    • Federal SystemsFederal Systems
    Use Cases
    • Automate Evidence CollectionAutomate Evidence Collection
    • Accelerate Incident ResponseAccelerate Incident Response
    • Reduce IT LicensingReduce IT Licensing
    • Combat Shadow ITCombat Shadow IT
    • Mitigate Threat ExposureMitigate Threat Exposure
    • Manage & Optimize AssetsManage & Optimize Assets
    Learn
    • EventsEvents
    • BlogBlog
    • Resource CenterResource Center
    • DocumentationDocumentation
    Company
    • Who We AreWho We Are
    • NewsroomNewsroom
    • Trust & SecurityTrust & Security
    • PartnersPartners
    • CareersCareers
    • Contact UsContact Us
    The actionability platform for intelligent action

    Copyright © 2025 Axonius. All rights reserved.

    • Privacy PolicyPrivacy Policy
    • Terms and ConditionsTerms and Conditions
    • Cookies SettingsCookies Settings
    ricardo