/*
Customise Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorised as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

Performance cookies are used to understand and analyse the key performance indexes of the website which helps in delivering a better user experience for the visitors.

Advertisement cookies are used to provide visitors with customised advertisements based on the pages you visited previously and to analyse the effectiveness of the ad campaigns.

/*]]>*/

Agent

February 8, 2018

Agent

You are here:
< Back

cyber risk assessment insurance cybersecurity best practices define rmm authentication TPRM ecosystem flaw hypothesis methodology high assurance guard 3rd party third-party CISOIn cybersecurity, an “agent” refers to some form of software installed on a device or server to perform some security related task(s). These agents can monitor system activity, scan for vulnerabilities, enforce security policies, and take actions like applying patches or rebooting systems. They act as a local security presence, providing detailed, real-time insights into the security of a device.

Used In A Sentence
“Man, ever since Carla put that agent on everyone’s mobile phone we’ve seen a record number of tickets. Jeez, Carla, test it first, would ya?”
Here are some different topics that involve cybersecurity agents;
  • Agent-Based Security:

    This approach uses software agents installed directly on endpoints to monitor system operations, file usage, processes, and network connections. 

  • What they do:

    Agents collect security-related data, including system metrics, security events, and application logs. They can also enforce security policies, like blocking unauthorized access or applying security updates. 

  • Benefits:

    Agent-based security provides real-time monitoring and control, allowing for immediate responses to security threats. 

  • Considerations:

    Despite being effective, agent-based security can have performance impacts on the device. This is due to the additional processing required. It also requires installation and management on each device. 

  • Agentless vs. Agent-Based:

    Agentless security, in contrast, uses network and cloud tools to monitor devices without installing software agents. This approach focuses on scalability and simplicity but may have limitations in real-time monitoring and detail. Here’s more on the topic from Palo Alto Networks

  • Example:
    Network Access Control (NAC) solutions can be agent-based or agentless. Agent-based NAC requires users to install agent software on their devices to communicate information about the device to the NAC software. Agentless NAC solutions scan the device without installing agents. 

Definitions of cybersecurity agent

A program acting on behalf of a person or organization.
SOURCE: SP 800-95

NIST Definition  A program acting on behalf of a person or organization.

Sources: NIST SP 800-95 from Web Services Glossary – W3C Working Group Note 11 February 2004

  A host-based IPS program that monitors and analyzes activity and performs preventive actions; OR a program or plug-in that enables an SSL VPN to access non-Web-based applications and services.
>Sources: NIST SP 800-113

  A host-based intrusion prevention system program that monitors and analyzes activity and performs preventive actions; OR a program or plug-in that enables an SSL VPN to access non-Web-based applications and services.
>Sources: NIST SP 1800-21B from NIST SP 800-113