Manage Access Credentials in JDisc Discovery

Dear JDisc users, JDisc Discovery requires access credentials to get excellent and complete inventory information. Configuring access credentials can be difficult and, in some cases, dangerous if not used properly. JDisc Discovery uses a variety of protocols and APIs to obtain information, and all of them require credentials. Furthermore, there are different locations where to[...]
Read More

Why Supportability is so important to us

Dear JDisc users, do you feel like the guy in the image when talking to support hotlines? Are you playing ticket ping pong with the support engineer who is permanently asking for new log files or further information? This troubleshooting process can be very time-consuming and frustrating on both sides. At JDisc, we have always[...]
Read More

oVirt Support Added

Dear JDisc friends, We are continuously improving our scanning capabilities. Starting with build 5130, we will support Red Hat’s oVirt virtualization management software (starting with version 4). oVirt is similar to VMware’s VCenter. oVirt lets you define virtual datacenters, clusters and assign physical servers to the clusters. The support also includes Oracle’s Virtualization Management software[...]
Read More

Verify Passwords

In order to scan devices properly, JDisc Discovery users need to configure access credentials. For security reasons, we do not display the passwords in clear text (neither in the UI nor in the logs). But how do you verify that you made no mistake when you entered the password? Misconfigured passwords lead to an access[...]
Read More

Pending Updates

Dear JDisc friends, upon a customer request, we have implemented a new feature to collect the list of pending updates on Windows and Linux computers. Three weeks ago, we added this feature for Linux and with build 5086 we finalized the data collection for Windows computers. We hope that this data helps to keep your[...]
Read More

Microsoft LAPS Support

Dear JDisc friends, we understand that storing your crown jewels (administrative accounts and passwords) in products like JDisc Discovery is not something that IT security departments really like. There is always the conflict between being as secure as possible and getting current inventory information (which often requires administrative accounts). Therefore, we implemented on request from[...]
Read More

JDisc Discovery integrates with Thycotic’s SecretServer

Dear JDisc users, just recently, we have added support for the CyberArk solution for managing accounts and passwords within your enterprise. Due to customer requests, we have integrated the Thycotic second password management tool. Your passwords are no longer stored within JDisc Discovery’s database but stay in the Thycotic SecretServer. JDisc Discovery only requests the[...]
Read More

CyberArk certifies JDisc

Dear JDisc friends, We are proud to announce that we have been certified by CyberArk! CyberArk is the global leader in Identity Security. Organizations use CyberArk to manage and secure the human and machine identities in their environment, many of which will have some form of privileged access. Part of securing these identities involves automatically[...]
Read More

Misconfigured Subnet Masks

Dear JDisc friends, since its beginnings, JDisc Discovery collects network interface configuration information such as IP addresses and subnet masks. When everything is properly configured, and the subnet masks are correctly set on the interfaces, then everything is fine. But what happens when that is not the case? So let’s assume your company has two[...]
Read More