I'm senior software and security architect and am currently doing social media marketing for JDisc
What has network discovery and data quality to do with systems thinking? If you’re wondering now what is systems thinking and anyhow what is the author talking about? Then take the time and read on. We would delve today into a slightly philosophical contemplation about relations in the large and in the small. Network discovery…
IT Service Management (ITSM) needs reliable and current data, be it for service monitoring, IT documentation or help desk systems. Therefore a reliable current network discovery with very good-quality is absolutely necessary. Like monitoring systems, a network discovery system needs privileged access to the monitored systems in the environment to fulfill its important function. Agent-less…
JDisc Discovery has a new upload API using the importManager mutation in GraphQL. While the most common operation is to query data that has been discovered in a previous discovery run via a GraphQL query, the upload API mutation currently allows to add devices to the inventory from the outside of the JDisc server. Other…
i-doit is a CMDB solution with many add-ons for use cases such as IT service management, IT documentation, IT asset management and Information security management system (ISMS). Since many years, JDisc and i-doit have a close partnership to provide the capabilities of JDisc Discovery to i-doit customers. Both applications are best-of-class solutions in their space…
The concept of a bill of material comes originally from manufacturing where you have a plan of the piece of hardware on which you list all parts needed to construct and build the asset. A software bill of materials (SBOM) is the same just for software, a list of all components that make up a…
Did you know that JDisc Discovery has a API for programmatic access of all the discovery data and functionality? In this article we want to introduce this programming interface and have a deeper look at the how to use it with various programming languages. Most often application have today RESTful APIs, that follow the REST…
The quality of data one gets out of a discovery process is extremely important for everything one does with that data. Bad data means bad decisions and acceptance for systems making use of the data. Examples we saw in the articles and videos on CMDB integration and security process and operations were always stressing this…
In this second blog post on the role of discovery for security, we will focus on operational security (OpSec), that is the security activities in the phase when the product or system is in operation and use. We assume, that all supporting assets of the system have been deployed and secured as planned in the…
Beyond integration into CMDB, there are many other areas, where discovery can be of immense value. One such pretty unknown area is It security.Discovery as part of ITIL asset management is also a foundation building block for security. In this first part of two videos regarding security use cases for discovery, we look at how…
We start a new series of videos on our JDisc Youtube channel on different use cases, where discovery plays an integral role. These videos should serve as a source of inspiration of how important it is to know what you got in an IT environment, the so called IT asset management. We begin with a…