Average Ratings 27 Ratings
Average Ratings 0 Ratings
Description
JDisc Discovery is a powerful IT asset management and network discovery tool, designed to provide organizations with clear, real-time insights into their entire IT environment. By automatically scanning the network, it identifies and catalogs devices, from physical servers and workstations to virtual machines and network appliances, giving users a detailed inventory of their assets. The tool captures essential data such as hardware specifications, installed software, system configurations, and interdependencies among devices.
A key advantage of JDisc Discovery is its agentless architecture. Rather than requiring installation on each device, it uses multiple protocols (like SNMP, SSH, WMI) to gather information, ensuring quick deployment and compatibility across various operating systems, including Windows, Linux, and Unix. This makes it ideal for diverse and dynamic IT ecosystems, enabling efficient and non-intrusive data collection.
Description
Lynis Enterprise specializes in security scanning for Linux, macOS, and Unix operating systems, enabling users to quickly identify and resolve issues so they can redirect their attention to their core business and projects. This targeted approach is relatively uncommon in an industry saturated with diverse services and software solutions, as we concentrate specifically on Linux and Unix security. The main goal of Lynis is to conduct thorough health checks of systems, which also aids in identifying vulnerabilities and weaknesses in configuration management. As a robust software solution, Lynis Enterprise facilitates security auditing, compliance testing, and the implementation of system hardening measures. With Lynis at its core, this software is tailored for use in environments that utilize Linux, macOS, or other Unix-like systems. Furthermore, Lynis provides valuable insights that empower organizations to enhance their overall security posture effectively.
API Access
Has API
API Access
Has API
Integrations
CyberArk Secure Cloud Access
Delinea Secret Server
Netdata
Password Depot
ServiceNow
Integrations
CyberArk Secure Cloud Access
Delinea Secret Server
Netdata
Password Depot
ServiceNow
Pricing Details
$100.00/one-time
Free Trial
Free Version
Pricing Details
$90 per year
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
JDisc
Founded
2009
Country
Germany
Website
www.jdisc.com
Vendor Details
Company Name
CISOfy
Founded
2013
Country
Netherlands
Website
cisofy.com
Product Features
CMDB
Change Management
Configuration Management
Data Visualization
Device Auto Discovery
IT Asset Management
Impact Management
License Management
Performance Management
Relationship Mapping
Configuration Management
Access Control / Permissions
Application Deployment
Automated Provisioning
Infrastructure Automation
Node Management
Orchestration
Reporting Analytics / Visualization
Task Management
IT Asset Management
Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
IT Service Management
Inventory Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management
IT Management
Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring
IT Service
Contract Management
IT Asset Management
Incident Management
Knowledge Management
Release Management
Self Service Portal
Service Catalog
Service Reporting
Ticket Management
Network Mapping
Color Codes / Icons
Compliance Management
Device Auto Discovery
Hierarchical Mapping
Location-Based Mapping
Map Exporting
On-Demand Mapping
Reporting/Analytics
Self-Updating Maps
Web Traffic Reporting
Product Features
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning