How Fieldmark XAV works
Deploy our on-premises agent to poll your cloud and internal platforms. Get unified visibility across your entire security stack without installing anything on endpoints.
What we show you
Source-verified insights your single-platform tools can't provide
Correlated device inventory
Every device across your entire environment, correlated by identity. See the status of each expected service—EDR, RMM, MDM—for every device in one unified view. No more jumping between platforms to piece together coverage.
Coverage gaps you couldn't see before
Surface gaps that a single-perspective RMM or MDM couldn't detect. When your EDR reports a device but your RMM doesn't, you know immediately. No more relying on one tool's view of the world.
Source-verified compliance posture
Don't trust a single tool's report. Our dashboards pull directly from each platform's API, giving you a source-verified view of your security and compliance posture. See exactly what each tool reports, side by side.
Rich historical database
Every poll, every check-in, every status change—stored and queryable. Track how coverage evolved over time, identify patterns in agent failures, and prove compliance for audits with source-backed historical data.
How we get there
The architecture that makes cross-platform visibility possible
1. Deploy the Agent
Install our agent in your on-premises environment. It queries your cloud and internal platforms on a recurring basis via their native APIs—no endpoint agents needed.
2. Correlate Devices
Device data flows to Fieldmark XAV's cloud where our correlation engine matches devices by hostname across all your integrations, providing a unified view of your security coverage.
3. Act on Insights
View every device, every agent, every gap in one unified dashboard. Access coverage metrics, identify stale agents, and track remediation progress—all updated on a recurring basis from your integrations.
What data we collect
Everything your integrations provide
Fieldmark XAV collects all device data available from your integrations' device list APIs. This includes hostnames, IP addresses, MAC addresses, agent versions, check-in timestamps, device types, user assignments, operating systems, and any other metadata exposed by the platform.
What are integrations? Integrations are security and management platforms you've connected to Fieldmark XAV—like your EDR, RMM, and MDM solutions. Each integration is polled on a recurring basis, and we pull the complete device inventory it provides.
How device correlation works
Hostname-based matching
Fieldmark XAV correlates devices across your integrations using hostname as the primary identifier. When a device appears with the same hostname across multiple platforms—like CrowdStrike, Intune, and Active Directory—we correlate them as the same device. Hostname is the only data point consistently available across all platforms.
Coverage gap detection
Fieldmark XAV identifies devices based on agent status thresholds you define. Configure what "stale" means for your environment, set coverage requirements, and get a unified view of which devices need attention.
Security & Privacy
Encrypted connections
All communication between your on-prem poller and Fieldmark XAV's cloud uses secure WebSocket (WSS) connections. Your device data is encrypted in transit, and we never store sensitive credentials—only the metadata your integrations provide.
Credential security
When you add an integration, you provide API keys or authentication tokens through our dashboard. These credentials are encrypted and stored locally on your agent—never in our cloud. You maintain full control, and can revoke access anytime.
On-premises deployment
The poller runs entirely within your network and makes outbound API calls to your integrations. It only sends aggregated device metadata to our cloud—no raw logs, no file contents, no user data leaves your environment.
Metadata only
Fieldmark XAV collects device identity and agent status—nothing more. We don't access your files, emails, documents, or browsing history. Only the metadata needed to verify security coverage is collected and stored.
Start finding gaps in 20 minutes
7 days free with unlimited usage. No credit card required. See every coverage gap across your entire environment.