Communication is Key

Communication with prospects, partners, and customers is one of the most important pillars JDisc relies on. But not only the personal contact and the associated service are relevant here. JDisc nowadays also relies on diverse and modern communication channels, which we would like to introduce in more detail.  Classically, customers and interested parties have the[...]
Read More

Data Quality in Discovery and Systems Thinking

What has network discovery and data quality to do with systems thinking? If you’re wondering now what is systems thinking and anyhow what is the author talking about? Then take the time and read on. We would delve today into a slightly philosophical contemplation about relations in the large and in the small. Network discovery[...]
Read More

The last Step to secure Network Discovery

IT Service Management (ITSM) needs reliable and current data, be it for service monitoring, IT documentation or help desk systems. Therefore a reliable current network discovery with very good-quality is absolutely necessary. Like monitoring systems, a network discovery system needs privileged access to the monitored systems in the environment to fulfill its important function. Agent-less[...]
Read More

LOG4J – Linux & Windows Script to identify log4j Vulnerability

Dear JDisc friends, find the German translation from our long-term partner i-doit: https://www.i-doit.com/en/blog/jdisc-and-i-doit-it-service-management-with-discovery-and-cmdb/ I think everyone is busy figuring out if any applications are affected by the log4j security issue. While this may be easy for commercial applications, the vulnerability can be difficult to find for custom applications that are hosted in your data centers.[...]
Read More

Microsoft LAPS Support

Dear JDisc friends, we understand that storing your crown jewels (administrative accounts and passwords) in products like JDisc Discovery is not something that IT security departments really like. There is always the conflict between being as secure as possible and getting current inventory information (which often requires administrative accounts). Therefore, we implemented on request from[...]
Read More

JDisc Discovery integrates with Thycotic’s SecretServer

Dear JDisc users, just recently, we have added support for the CyberArk solution for managing accounts and passwords within your enterprise. Due to customer requests, we have integrated the Thycotic second password management tool. Your passwords are no longer stored within JDisc Discovery’s database but stay in the Thycotic SecretServer. JDisc Discovery only requests the[...]
Read More

SH(adow)IT happens!

Nowadays, many employees and professionals develop their own solutions for business processes. In most cases, information technology systems are installed or integrated on their own without being officially controlled and approved by the IT department. Both individual employees and entire departments can use so-called shadow IT. IT systems used secretly include software and hardware. Examples[...]
Read More

Use-Cases for Upload API

JDisc Discovery has a new upload API using the importManager mutation in GraphQL. While the most common operation is to query data that has been discovered in a previous discovery run via a GraphQL query, the upload API mutation currently allows to add devices to the inventory from the outside of the JDisc server. Other[...]
Read More

New Feature: Antivirus Software Discovery

Dear JDisc friends, based on several customer enhancement requests, we have extended our Security Add-On to scan the list of installed Antivirus software together with its enabled state and its updated state. The updated state defines whether the Antivirus definition files are up-to-date. This new feature offers a good overview over the Antivirus software used[...]
Read More