Company Website

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 27 Ratings

Total
ease
features
design
support

What is Lynis Enterprise?

Lynis Enterprise focuses on providing security scanning specifically for Linux, macOS, and Unix operating systems, allowing users to swiftly pinpoint and address issues so they can focus on their primary business objectives and initiatives. This specialized focus is a rarity in a market flooded with various services and software offerings, as we prioritize Linux and Unix security exclusively. The primary aim of Lynis is to perform comprehensive health assessments of systems, which is instrumental in uncovering vulnerabilities and shortcomings in configuration management. Acting as a powerful software tool, Lynis Enterprise supports security auditing, compliance evaluation, and the execution of system hardening strategies. Built with Lynis at its foundation, this software is designed for deployment in environments that operate on Linux, macOS, or other Unix-like platforms. Additionally, Lynis offers critical insights that enable organizations to significantly improve their overall security stance, fostering a proactive approach to risk management. Overall, the emphasis on a targeted solution makes Lynis a vital asset for organizations seeking to enhance their cybersecurity frameworks.

What is JDisc Discovery?

JDisc Discovery serves as a robust solution for IT asset management and network discovery, offering organizations valuable, real-time visibility into their complete IT landscape. By conducting automated network scans, it efficiently detects and organizes a variety of devices, which ranges from physical servers and workstations to virtual machines and network appliances, thus providing users with a comprehensive asset inventory. The tool meticulously gathers crucial information, encompassing hardware specifications, installed software, system configurations, and the interrelationships among devices, ensuring thorough documentation of the IT environment. One of the standout features of JDisc Discovery is its agentless design. Instead of requiring software installation on each device, it utilizes multiple protocols such as SNMP, SSH, and WMI to collect data, facilitating rapid deployment and ensuring compatibility across an array of operating systems, including Windows, Linux, and Unix. This adaptability makes it particularly well-suited for varied and evolving IT infrastructures, allowing for effective and unobtrusive data acquisition. Additionally, its user-friendly interface enhances the overall management experience, empowering IT teams to make informed decisions based on accurate and up-to-date information.

Media

Media

Integrations Supported

CyberArk Secure Cloud Access
Delinea Secret Server
Netdata
Password Depot
ServiceNow

Integrations Supported

CyberArk Secure Cloud Access
Delinea Secret Server
Netdata
Password Depot
ServiceNow

API Availability

Has API

API Availability

Has API

Pricing Information

$90 per year
Free Trial Offered?
Free Version

Pricing Information

$100.00/one-time
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

CISOfy

Date Founded

2013

Company Location

Netherlands

Company Website

cisofy.com

Company Facts

Organization Name

JDisc

Date Founded

2009

Company Location

Germany

Company Website

www.jdisc.com

Categories and Features

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Categories and Features

CMDB

Change Management
Configuration Management
Data Visualization
Device Auto Discovery
IT Asset Management
Impact Management
License Management
Performance Management
Relationship Mapping

Configuration Management

Access Control / Permissions
Application Deployment
Automated Provisioning
Infrastructure Automation
Node Management
Orchestration
Reporting Analytics / Visualization
Task Management

IT Asset Management

Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
IT Service Management
Inventory Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management

IT Management

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

IT Service

Contract Management
IT Asset Management
Incident Management
Knowledge Management
Release Management
Self Service Portal
Service Catalog
Service Reporting
Ticket Management

Network Mapping

Color Codes / Icons
Compliance Management
Device Auto Discovery
Hierarchical Mapping
Location-Based Mapping
Map Exporting
On-Demand Mapping
Reporting/Analytics
Self-Updating Maps
Web Traffic Reporting

Popular Alternatives

Popular Alternatives

Device42 Reviews & Ratings

Device42

Device42, A Freshworks Company
OSE Reviews & Ratings

OSE

Open Seas
AdRem NetCrunch Reviews & Ratings

AdRem NetCrunch

AdRem Software
JDeveloper Reviews & Ratings

JDeveloper

Oracle
Auvik Reviews & Ratings

Auvik

Auvik Networks