How to integrate Password Manager AceBit with JDisc Discovery

Dear JDisc users, due to customers requests, we have integrated a new password manager called AceBIT  Password Depot. Generally, password managers are essential tools in the digital age, offering a secure and convenient way to manage the growing number of passwords required for online accounts. As the volume and complexity of online services increase, so[...]
Read More

How to Scan CloudFoundry Instances with JDisc Discovery!

Dear JDisc friends, JDisc Discovery is a lan scanner and we have supported Kubernetes scans for some time. Now, we added CloudFoundry, the second platform as a service technology, to our discovery. CloudFoundry is an open-source Platform-as-a-Service (PaaS) that enables organizations to build, deploy, and scale applications efficiently across multiple cloud environments. Initially developed by[...]
Read More

New Remote Desktop Services Client Access License Discovery

What are Client Access Licenses (CALs)? Client Access Licenses (CALs) are a licensing model used by software vendors, especially for server software like Microsoft Windows Remote Desktop, to regulate how users and devices access their servers. Essentially, CALs provide authorization for users or devices to connect to and utilize the server software’s services. CAL servers[...]
Read More

Web UI – Custom Attributes

Dear JDisc friends, Custom attributes allow users to extend device discovery with custom properties and attach them to devices. This feature is supported in our client for quite some time. In release 5176, we have redesigned and implemented this feature in the new Web UI. We  have published a video to explain the basic concepts[...]
Read More

Manage Access Credentials in JDisc Discovery

Dear JDisc users, JDisc Discovery requires access credentials to get excellent and complete inventory information. Configuring access credentials can be difficult and, in some cases, dangerous if not used properly. JDisc Discovery uses a variety of protocols and APIs to obtain information, and all of them require credentials. Furthermore, there are different locations where to[...]
Read More

Why Supportability is so important to us

Dear JDisc users, do you feel like the guy in the image when talking to support hotlines? Are you playing ticket ping pong with the support engineer who is permanently asking for new log files or further information? This troubleshooting process can be very time-consuming and frustrating on both sides. At JDisc, we have always[...]
Read More

oVirt Support Added

Dear JDisc friends, We are continuously improving our scanning capabilities. Starting with build 5130, we will support Red Hat’s oVirt virtualization management software (starting with version 4). oVirt is similar to VMware’s VCenter. oVirt lets you define virtual datacenters, clusters and assign physical servers to the clusters. The support also includes Oracle’s Virtualization Management software[...]
Read More

JDisc Discovery integrates with Thycotic’s SecretServer

Dear JDisc users, just recently, we have added support for the CyberArk solution for managing accounts and passwords within your enterprise. Due to customer requests, we have integrated the Thycotic second password management tool. Your passwords are no longer stored within JDisc Discovery’s database but stay in the Thycotic SecretServer. JDisc Discovery only requests the[...]
Read More

CyberArk certifies JDisc

Dear JDisc friends, We are proud to announce that we have been certified by CyberArk! CyberArk is the global leader in Identity Security. Organizations use CyberArk to manage and secure the human and machine identities in their environment, many of which will have some form of privileged access. Part of securing these identities involves automatically[...]
Read More

Misconfigured Subnet Masks

Dear JDisc friends, since its beginnings, JDisc Discovery collects network interface configuration information such as IP addresses and subnet masks. When everything is properly configured, and the subnet masks are correctly set on the interfaces, then everything is fine. But what happens when that is not the case? So let’s assume your company has two[...]
Read More