How to integrate Password Manager AceBit with JDisc Discovery

Dear JDisc users, due to customers requests, we have integrated a new password manager called AceBIT  Password Depot. Generally, password managers are essential tools in the digital age, offering a secure and convenient way to manage the growing number of passwords required for online accounts. As the volume and complexity of online services increase, so[...]
Read More

How to Scan CloudFoundry Instances with JDisc Discovery!

Dear JDisc friends, JDisc Discovery is a lan scanner and we have supported Kubernetes scans for some time. Now, we have added CloudFoundry, the second platform as a service technology, to our discovery. CloudFoundry is an open-source Platform-as-a-Service (PaaS) that enables organizations to build, deploy, and scale applications efficiently across multiple cloud environments. Initially developed[...]
Read More

New Remote Desktop Services Client Access License Discovery

What are Client Access Licenses (CALs)? Client Access Licenses (CALs) are a licensing model used by software vendors, especially for server software like Microsoft Windows Remote Desktop, to regulate how users and devices access their servers. Essentially, CALs provide authorization for users or devices to connect to and utilize the server software’s services. CAL servers[...]
Read More

How to define Custom Attributes for our Network Discovery

Dear JDisc friends, Custom attributes allow users to extend device discovery with custom properties and attach them to devices. This feature is supported in our client for quite some time. In release 5176, we have redesigned and implemented this feature in the new Web UI. We  have published a video to explain the basic concepts[...]
Read More

Network Discovery Software: How Manage Access Credentials

Dear JDisc users, Network Discovery Software like JDisc Discovery requires access credentials to get excellent and complete inventory information. Configuring access credentials can be difficult and, in some cases, dangerous if not used properly. JDisc Discovery uses a variety of protocols and APIs to obtain information, and all of them require credentials. Furthermore, there are different[...]
Read More

Network Documentation: Why Supportability is so important!

Dear JDisc users, do you feel like the guy in the image when talking to support hotlines? Are you playing ticket ping pong with the support engineer who is permanently asking for new log files or further information? This troubleshooting process can be very time-consuming and frustrating on both sides. At JDisc, we have always[...]
Read More

Do you know all your Dishwashers?

Dear JDisc friends, we are constantly adding new protocols to improve device detection. The upcoming version (5106) will add two new main protocols to discover IoT devices: mDNS (Multicast DNS) UPnP (Universal Plug and Play) What is mDNS and UPnP? Home automation and IoT devices often support the mDNS and UPnP protocols to publish their[...]
Read More

Do you know all your Dishwashers?

Dear JDisc friends, we are constantly adding new protocols to improve device detection. The upcoming version (5106) will add two new main protocols to discover IoT devices: mDNS (Multicast DNS) UPnP (Universal Plug and Play) What is mDNS and UPnP? Home automation and IoT devices often support the mDNS and UPnP protocols to publish their[...]
Read More

JDisc Discovery integrates with Thycotic’s SecretServer

Dear JDisc users, just recently, we have added support for the CyberArk solution for managing accounts and passwords within your enterprise. Due to customer requests, we have integrated the Thycotic second password management tool. Your passwords are no longer stored within JDisc Discovery’s database but stay in the Thycotic SecretServer. JDisc Discovery only requests the[...]
Read More

CyberArk certifies JDisc

Dear JDisc friends, We are proud to announce that we have been certified by CyberArk! CyberArk is the global leader in Identity Security. Organizations use CyberArk to manage and secure the human and machine identities in their environment, many of which will have some form of privileged access. Part of securing these identities involves automatically[...]
Read More