JDisc Discovery integrates with Thycotic’s SecretServer

Dear JDisc users, just recently, we have added support for the CyberArk solution for managing accounts and passwords within your enterprise. Due to customer requests, we have integrated the Thycotic second password management tool. Your passwords are no longer stored within JDisc Discovery’s database but stay in the Thycotic SecretServer. JDisc Discovery only requests the…

SH(adow)IT happens!

Nowadays, many employees and professionals develop their own solutions for business processes. In most cases, information technology systems are installed or integrated on their own without being officially controlled and approved by the IT department. Both individual employees and entire departments can use so-called shadow IT. IT systems used secretly include software and hardware. Examples…

New Feature: Antivirus Software Discovery

Dear JDisc friends, based on several customer enhancement requests, we have extended our Security Add-On to scan the list of installed Antivirus software together with its enabled state and its updated state. The updated state defines whether the Antivirus definition files are up-to-date. This new feature offers a good overview over the Antivirus software used…

Data quality for discovery

Data Quality in Discovery

The quality of data one gets out of a discovery process is extremely important for everything one does with that data. Bad data means bad decisions and acceptance for systems making use of the data. Examples we saw in the articles and videos on CMDB integration and security process and operations were always stressing this…