We provide continuous integrated IT Discovery and Monitoring.
- Discovery cannot set off security alarms
- Monitoring is integrated with discovery and scalable almost w/o limit
- Extensible discovery includes servers, services, switches, packages, checksums, containers, and system settings
- We provide security audits, alerts, visualizations, and risk scores
We find systems you've forgotten about (which are likely to be used in intrusions) and services you're not monitoring, which add risk. The discovery produces an always-up-to-date CMDB which provides a detailed graph model of your infrastructure. We discover what systems are running licensed software so you can minimize your risk and cost.
Architecture is fully-distributed - minimizing impact on servers and networks.
Commercial Use
Modify
Distribute
Place Warranty
Use Patent Claims
Sub-License
Hold Liable
Distribute Original
Disclose Source
Include Copyright
State Changes
Include License
Include Install Instructions
These details are provided for information only. No information here is legal advice and should not be used as such.
There are no reported vulnerabilities
30 Day SummaryOct 20 2024 — Nov 19 2024
|
12 Month SummaryNov 19 2023 — Nov 19 2024
|