Netzwerk Inventarisierung: Übersicht mit Charts!

Hallo JDisc Freunde, Eine akkurate Netzwerk Inventarisierung ist die Basis für effizientes IT Management. Mit den in JDisc Discovery integrierten Berichten und Ihren eigenen Berichten haben Sie bereits ein sehr gutes Verständnis Ihrer IT-Landschaft erreicht. Aber ist das genug? Um Ihnen in dieser Richtung zu helfen, haben wir gerade in unserer neuen Web UI das[...]
Read More

Communication is Key

Communication with prospects, partners, and customers is one of the most important pillars JDisc relies on. But not only the personal contact and the associated service are relevant here. JDisc nowadays also relies on diverse and modern communication channels, which we would like to introduce in more detail.  Classically, customers and interested parties have the[...]
Read More

Data Quality in Discovery and Systems Thinking

What has network discovery and data quality to do with systems thinking? If you’re wondering now what is systems thinking and anyhow what is the author talking about? Then take the time and read on. We would delve today into a slightly philosophical contemplation about relations in the large and in the small. Network discovery[...]
Read More

Sichere Netzwerk Dokumentation mit PAM Lösungen

secure
Das IT Service Management (ITSM) benötigt zuverlässige und aktuelle Daten, sei es für die Serviceüberwachung, die IT-Dokumentation oder für Helpdesk-Systeme. Daher ist eine zuverlässige und aktuelle Netzwerkerkennung mit sehr guter Qualität absolut notwendig. Wie Überwachungssysteme benötigt auch ein Network Discovery System privilegierten Zugriff auf die überwachten Systeme in der Umgebung, um seine wichtige Funktion zu[...]
Read More

LOG4J – Linux & Windows Script to identify log4j Vulnerability

Dear JDisc friends, find the German translation from our long-term partner i-doit: https://www.i-doit.com/en/blog/jdisc-and-i-doit-it-service-management-with-discovery-and-cmdb/ I think everyone is busy figuring out if any applications are affected by the log4j security issue. While this may be easy for commercial applications, the vulnerability can be difficult to find for custom applications that are hosted in your data centers.[...]
Read More

Microsoft LAPS Support

Dear JDisc friends, we understand that storing your crown jewels (administrative accounts and passwords) in products like JDisc Discovery is not something that IT security departments really like. There is always the conflict between being as secure as possible and getting current inventory information (which often requires administrative accounts). Therefore, we implemented on request from[...]
Read More

JDisc Discovery integrates with Thycotic’s SecretServer

Dear JDisc users, just recently, we have added support for the CyberArk solution for managing accounts and passwords within your enterprise. Due to customer requests, we have integrated the Thycotic second password management tool. Your passwords are no longer stored within JDisc Discovery’s database but stay in the Thycotic SecretServer. JDisc Discovery only requests the[...]
Read More

SH(adow)IT happens!

Nowadays, many employees and professionals develop their own solutions for business processes. In most cases, information technology systems are installed or integrated on their own without being officially controlled and approved by the IT department. Both individual employees and entire departments can use so-called shadow IT. IT systems used secretly include software and hardware. Examples[...]
Read More

Use-Cases for Upload API

api use case
JDisc Discovery has a new upload API using the importManager mutation in GraphQL. While the most common operation is to query data that has been discovered in a previous discovery run via a GraphQL query, the upload API mutation currently allows to add devices to the inventory from the outside of the JDisc server. Other[...]
Read More