Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

Agent or Agentless approach?

Some say, that both agent and agentless approach in IT security has its own advantages and disadvantages.

In general, agents as small pieces of software are often seen as efficient and reliable way of gathering lots of data from a system they are installed on while agentless approach relies on industry standards to provide information about monitored environments.

As a security officer you don’t control one single system such as database cluster or an email server, but whole diverse environment containing lots of different systems changing continuously as admins do upgrades and install new systems to suit business needs. You have to rely on industry standards, management protocols to be able to monitor and secure every kind of a system, from a network switch to complex banking transaction system.

Installing an agent means, that you take the responsibility…

for its maintenance, troubleshooting, connectivity issues not mentioning, that such agent has to work on high privileges to be able to gather data. All this costs valuable time which means is less efficient from your perspective. On some systems you’re simply not able to install any kind of an agent, because vendor does not allow you to do so. Such situation occurs obviously on routers, access points or other parts of critical infrastructure, but also think on cloud services which become more and more popular. Since there is no place for an agent there, such approach fails completely.

“Allow all” vs. security policies

Since agents have to support variety of systems, they are not always standardized in a way, which allows you to build security policies to protect access or privileges, so you often end up with “allow all” model which is far from being secure. Using a standardized management protocol is a key to success here. Last but not least, using an agent means simply paying a tax in a form on additional CPU, memory and often disk I/O utilization on monitored system, so it is better to have those resources free for business related tasks.

Using agentless approach in cybersecurity means, that you’re in control of the environment rather than only monitor it.

You focus on actions taken by system administrators or automated, launched periodically by various daemons and other software. You can focus on processes, following procedures and IT governance. This also means, that your security policy or AI assisted behavioral analytic can even prevent unwanted action to be taken! So agents are bad, right? Not exactly. For monitoring, they’re still exceptionally good in some cases, but if you consider security seriously, move towards agentless solutions as soon as possible.

Are you interested in a demo of Fudo Security solution?

Visit our website and schedule it here.