Platform

Platform Update: Auto Asset Decommissioning

3 min read
Stay ahead of the game
Loading

click here to copy URL

Keep your asset inventory clean, accurate, and actionable; automatically. 

One of the biggest hidden challenges in vulnerability management is asset sprawl.
Devices come and go, users leave organisations, endpoint agents disappear — yet vulnerabilities linked to those assets often remain, creating noise, wasted effort, and misleading risk metrics.

Auto Asset Decommissioning solves this problem by automatically cleaning up stale assets, so security teams can focus on real risk, not dead data.

Why This Matters for Security Teams

In real-world environments, particularly those using endpoint-based scanning, assets do not disappear cleanly.

When a device drops off the network, vulnerabilities tied to it may still appear open, even though the asset no longer exists.

This leads to:

  • Analysts chasing vulnerabilities on devices that are no longer present
  • Inflated asset counts and misleading dashboards
  • Time wasted validating issues that will never be remediated

Auto Asset Decommissioning removes that friction by ensuring the platform reflects only assets that are genuinely active.

How Auto Asset Decommissioning Works

The platform now automatically decommissions assets that have not been tested or checked in within a configurable timeframe, removing the need for manual clean-up.

Security teams can:

  • Enable or disable auto-decommissioning within a tenant with a single toggle
  • Set service-specific inactivity thresholds for areas such as Managed Scanning, Penetration Testing, Red Teaming, Ransomware, and ASM
  • Rely on sensible defaults or tailor thresholds to match operational reality

Once an asset exceeds the defined inactivity period, it is automatically decommissioned.

Clean Inventory Without Losing Control

Decommissioned assets are:

  • Removed from active dashboards and reports
  • Excluded from vulnerability counts and remediation workflows
  • Fully retained in audit logs and historical records
  • Reflected consistently across APIs and reporting outputs

This ensures accuracy without sacrificing traceability.

The Real Benefit: Fewer False Priorities, Better Decisions

By automatically removing assets that no longer exist:

  • Teams stop chasing vulnerabilities that cannot be fixed
  • Asset counts stay realistic and up to date
  • Risk metrics become more meaningful
  • Operational overhead is significantly reduced

For organisations with high asset churn, this brings the platform in line with industry-standard asset hygiene practices, ensuring vulnerability management stays relevant, efficient, and focused on real exposure.

Jon Bellard - Head of Product says...

“Security teams shouldn’t be spending time chasing vulnerabilities on assets that no longer exist. Auto Asset Decommissioning keeps inventories accurate automatically, so teams can focus on real risk and make decisions based on what’s actually in their environment.”

Picture of Jon Bellard
Jon Bellard
Jon Bellard is the Head of Product at Rootshell Security, where he leads the development of innovative cybersecurity solutions. With a strong background in security consulting and technical sales, Jon drives product strategy and client engagement to meet evolving security needs.

Other posts you might like