Security really matters to us!
you might know, that Germans are crazy about cars (no exception to me :-). We get crazy, when we see some scratches on our favorite vehicle! You as an IT administrator should be as paranoid about your IT infrastructure, as the Germans are about cars. Most network discovery tools require administrative or root access to the computers in order to get detailed information about your IT environment. If you don’t know the tool or the vendor. Would you really trust them and enter the crown jewels of your IT environement (e.g. root access credentials) without knowing what the tool is doing with it? Do you really know whether the tool is not connecting “home” and transferring data? Is the tool securing your essential access credentials well enough? What is the tool’s strategy when using the access credentials on your servers on the network? Does it perform read-only operations or is there a risk that it modifies a server’s configuration?
JDisc always wants to be as transparent as possible. Therefore, we created a small security whitepaper that explains how JDisc Discovery secures your information and how JDisc Discovery does everything to minimize the risk of failures when accessing computers on your network.
Feel free to contact us if you have further questions about JDisc Discovery’s security concepts…