How Blacklight Works


 

bl agents1. Deploy

The universal Blacklight agent (Windows, OSX, Linux) is deployed to all assets ad-hoc or via your organization’s existing deployment tools.

 

 

 

 

 

 

bl how scan2

2. Collect

Each Blacklight agent collects changes in configuration state. Blacklight agents can also perform network scans to discover new devices.

 

 

 

 

 

 

 

bl how sync3. Sync

New configuration data discovered by Blacklight agents continuously syncs with your Blacklight Cloud environment.

 

 

 

 

 

 

 

bl how cis

4. Audit

Configuration data is automatically analyzed against CIS, or custom, benchmark standards, producing real-time findings and tickets.

 

 

 

 

 

 

bl how report25. Report

Real-time, filterable reports are accessed via a secure web interface, enabling better compliance reporting and findings remediation.

 

 

 

 

 

 

 

 

 

 

Learn More About Lockpath's Blacklight Platform

Contact Our Sales Team