{"id":33714,"date":"2026-05-13T00:00:08","date_gmt":"2026-05-12T22:00:08","guid":{"rendered":"https:\/\/www.proactivanet.com\/?p=33714"},"modified":"2026-05-11T10:40:44","modified_gmt":"2026-05-11T08:40:44","slug":"cybersecurity-incibe","status":"publish","type":"post","link":"https:\/\/www.proactivanet.com\/en\/blog\/proactivanet-en\/cybersecurity-incibe\/","title":{"rendered":"Cybersecurity in IT asset management: The new frontier in enterprise control"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">In today's technology landscape, cybersecurity <\/span><b>cybersecurity in IT Asset Management<\/b><span style=\"font-weight: 400;\"> has gone from being a secondary function to becoming the core of operational resilience. The lack of visibility over connected devices - a phenomenon known as <\/span><i><span style=\"font-weight: 400;\">Shadow IT<\/span><\/i><span style=\"font-weight: 400;\">- is today one of the greatest vulnerabilities for organizations. Without a real-time and contextualized inventory, the protection of corporate data is simply impossible.<\/span><\/p>\n<p><b>In summary:<\/b><span style=\"font-weight: 400;\"> The convergence of ITAM and cybersecurity allows companies to detect intrusions, proactively manage vulnerabilities and comply with strict regulations. Thanks to the support of <\/span><b>INCIBE<\/b><span style=\"font-weight: 400;\">Proactivanet has developed CyberITAM to offer 360\u00b0 visibility over the entire infrastructure.<\/span><\/p>\n<h3><b>Definition: What is CyberITAM?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">It is an advanced platform that unifies Asset Management (ITAM) with Cybersecurity. It aims to provide full control over hardware, software and cloud services, automatically identifying unknown equipment and analyzing risks using Artificial Intelligence.<\/span><\/p>\n<h2><b>Key points of Proactivanet CyberITAM and INCIBE<\/b><\/h2>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>DEITREAL Project:<\/b><span style=\"font-weight: 400;\"> Development of technology for the detection of intrusive equipment in real time by passive monitoring (Sniffer).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>CAASM Project:<\/b><span style=\"font-weight: 400;\"> Automated attack surface management to identify and remediate vulnerabilities (CVEs).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Shadow IT visibility:<\/b><span style=\"font-weight: 400;\"> Comprehensive control of unauthorized devices that bypass traditional systems.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Regulatory Compliance:<\/b><span style=\"font-weight: 400;\"> Automatic generation of evidences for standards such as the <\/span><b>ENS<\/b><span style=\"font-weight: 400;\">, <\/span><b>ISO 27001<\/b><span style=\"font-weight: 400;\">NIS2 and DORA.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Automated Response:<\/b><span style=\"font-weight: 400;\"> Orchestration of alerts and remediation based on Machine Learning models.<\/span><\/li>\n<\/ul>\n<h2><b>Intrusion Detection and Shadow IT Control<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The <\/span><b>cybersecurity in IT asset management<\/b><span style=\"font-weight: 400;\"> cannot rely on manual scans. Through the project <\/span><b>DEITREAL<\/b><span style=\"font-weight: 400;\"> (co-funded by INCIBE), Proactivanet implements a \"passive listening\" system on the network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unlike intrusive scans, this technology detects the presence of any unknown asset the instant it is connected, automatically comparing it to the <\/span><b>CMDB<\/b><span style=\"font-weight: 400;\">. If the equipment is not registered, an immediate alert is triggered to the security officers.<\/span><\/p>\n<h2><b>2. Vulnerability and Early Warning Management (CAASM)<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Not all vulnerabilities have the same impact. CyberITAM's differential value lies in its ability to contextualize risk:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Identification:<\/b><span style=\"font-weight: 400;\"> Daily cross-referencing of your inventory with official databases (NIST, MITRE).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Prioritization:<\/b><span style=\"font-weight: 400;\"> The system uses AI to determine which vulnerability is critical based on the importance of the affected service.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Remediation:<\/b><span style=\"font-weight: 400;\"> Automation of the deployment of security patches and updates.<\/span><\/li>\n<\/ol>\n<p><img decoding=\"async\" class=\"alignnone  wp-image-33716\" src=\"https:\/\/www.proactivanet.com\/wp-content\/uploads\/2026\/05\/cibersecurity.jpg\" alt=\"Cybersecurity in IT asset management: The new frontier in enterprise control\" width=\"537\" height=\"293\" srcset=\"https:\/\/www.proactivanet.com\/wp-content\/uploads\/2026\/05\/cibersecurity.jpg 1000w, https:\/\/www.proactivanet.com\/wp-content\/uploads\/2026\/05\/cibersecurity-300x164.jpg 300w, https:\/\/www.proactivanet.com\/wp-content\/uploads\/2026\/05\/cibersecurity-768x419.jpg 768w, https:\/\/www.proactivanet.com\/wp-content\/uploads\/2026\/05\/cibersecurity-640x349.jpg 640w\" sizes=\"(max-width: 537px) 100vw, 537px\" \/><\/p>\n<h2><\/h2>\n<h2><b>3. A Commitment to Innovation and Compliance<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">This technological breakthrough is the result of collaboration within the framework of the <\/span><b>Recovery, Transformation and Resilience Plan, financed by the European Union<\/b><span style=\"font-weight: 400;\">funded by the European Union (<\/span><b>NextGenerationEU<\/b><span style=\"font-weight: 400;\">). By integrating asset management with security, Proactivanet not only helps prevent attacks, but also facilitates auditing, transforming technical data into strategic reports for decision making.<\/span><\/p>\n<p><b>FAQ: Questions about CyberITAM<\/b><\/p>\n<ul>\n<li><b>How does the DEITREAL project help my company? <\/b><span style=\"font-weight: 400;\">It allows you to discover assets that do not have an agent installed (such as IoT devices or personal routers), eliminating blind spots in your network infrastructure.<\/span><\/li>\n<li><b>What is the CAASM approach to asset management? <\/b><span style=\"font-weight: 400;\">It is the management of the attack surface. CyberITAM centralizes vulnerabilities (CVEs) and remediation methods, enabling action to be taken before a flaw is exploited.<\/span><\/li>\n<li><b>Is it compatible with sensitive production environments? <\/b><span style=\"font-weight: 400;\">Yes. By using passive monitoring techniques, CyberITAM does not generate additional traffic or interrupt critical services, ensuring business continuity.<\/span><\/li>\n<\/ul>\n<h3><b>Conclusion<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The <\/span><b>cybersecurity in IT asset management<\/b><span style=\"font-weight: 400;\"> is the foundation of a protected company. With the support of <\/span><a href=\"https:\/\/www.incibe.es\/\" target=\"_blank\" rel=\"noopener\"><b>INCIBE<\/b><\/a><span style=\"font-weight: 400;\"> and the technological power of Proactivanet, your organization can stop reacting to attacks and start preventing them with intelligence and automation.<\/span><\/p>\n<p><b>Do you want to raise your security level?<\/b><a href=\"https:\/\/www.proactivanet.com\/en\/discovery-it-asset-management\/cyberitam\/\"> <span style=\"font-weight: 400;\">Find out more about CyberITAM<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today's technology landscape, cybersecurity cybersecurity in IT Asset Management has...  <\/p>\n<div class=\"read-more mt-4 text-blue text-xs\"><\/div>\n","protected":false},"author":7,"featured_media":33717,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1930,1848],"tags":[],"class_list":["post-33714","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad","category-proactivanet-en"],"acf":{"is_icon":""},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.proactivanet.com\/en\/wp-json\/wp\/v2\/posts\/33714","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.proactivanet.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.proactivanet.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.proactivanet.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.proactivanet.com\/en\/wp-json\/wp\/v2\/comments?post=33714"}],"version-history":[{"count":3,"href":"https:\/\/www.proactivanet.com\/en\/wp-json\/wp\/v2\/posts\/33714\/revisions"}],"predecessor-version":[{"id":33720,"href":"https:\/\/www.proactivanet.com\/en\/wp-json\/wp\/v2\/posts\/33714\/revisions\/33720"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.proactivanet.com\/en\/wp-json\/wp\/v2\/media\/33717"}],"wp:attachment":[{"href":"https:\/\/www.proactivanet.com\/en\/wp-json\/wp\/v2\/media?parent=33714"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.proactivanet.com\/en\/wp-json\/wp\/v2\/categories?post=33714"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.proactivanet.com\/en\/wp-json\/wp\/v2\/tags?post=33714"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}