Know your assets

Having an inventory is only useful if you truly understand your assets. Sifting through the data, getting context on machines you’re investigating, and looking at machines and services from different vantage points is critical for situational awareness.

Try Rumble now Get a demo
Know your assets

“ With Rumble, we can tag assets, so the team knows who to contact when an event occurs and quickly be able to identify the location of an asset. Before we had Rumble, we would have to email teams asking them if they have the device or chase people down on Slack.“

Ed Messina | Assistant Chief Information Security Officer | Monash University

Key benefits

Get answers about any asset, anywhere on your network

Easily search your inventory

Slice and dice your asset inventory based on services and detailed attributes with out-of-the-box and custom queries. Spend less time searching and more time on asset lifecycle management, IP address management, and understanding your true network topology. Find assets with specific traits, such as all Ubiquiti IP cameras, Microsoft SQL servers sorted by version, or TLS on non-standard ports.

Easily search your inventory
Work with systems, not IP addresses

Work with systems, not IP addresses

As machines move across networks and get new DHCP leases, it can be difficult to keep track of assets. Rumble identifies devices by MAC address, GUIDs, and combinations of other unique identifiers to avoid duplicate entries as IP addresses change.

Review historical trending and compare snapshots

See historical asset graphs on your Rumble Dashboard to understand how types of devices, services or products are trending. Reconstruct network events by viewing recent scan data for changes to IPs and services. Compare the results of two site scans, such as two points in time or internal/external scans to understand what may have caused an outage after a network change, or to reconstruct the timeline of an attack.

Review historical trending and compare snapshots

View your external network perimeter

View your external network perimeter

While Rumble is primarily used for internal networks, the explorer can also scan external perimeters to show exposed devices and services. Identify what isn’t appropriately blocked by the firewall. Integrate with Censys to add external scan data.

Identify bridged devices

Spot devices that bridge networks, such as a laptop with a WiFi, Ethernet and iWAN cards, even if you are only scanning one of the network interfaces. Understanding network bridges will help you troubleshoot routing issues and identify network segmentation violations.

Identify bridged devices
Track asset ownership

Track asset ownership

Tag asset ownership so you can respond to incidents and tickets faster. To streamline and accelerate tagging, you can set up automatic tagging of asset owners. For example, you can auto-tag the database team as the owner if a device is running an Oracle database.

Share insights with your team

Collaborate in Rumble through tags and comments. Manage visibility of different organizations through role-based access control (RBAC). Export search results you want to share with others.

Share insights with your team

Do you know about the devices, services and configurations that put your systems at risk?

Do you know about the devices, services and configurations that put your systems at risk?

Rumble can help you with regular security hygiene, which is critical for maintaining a stable and secure network.

Learn more

Get a free Rumble edition

Scan your network and build your asset inventory in minutes.