Software > Network Management, Communication > Network Administration > JDisc Discovery

JDisc Discovery

Network Inventory solution for heterogeneous networks

Version:  1.1

Compatible with

JDisc Discovery is an agentless network inventory solution that has been developed from scratch with more than 10 years experience in the area of network discovery for medium to large scale networks.

JDisc Discovery provides the information that you need to run your It more effectively. It\'s agent-less discovery technology minimizes the impact on your network and your devices. While a permanent license provides the most value for your It. JDisc also offers short-term licenses at a very competitive price if you need accurate and detailed inventory information only for the duration of a project.

Small businesses use JDisc Discovery without the overhead and complex configuration required by most discovery products. Global corporations benefit from JDisc Discovery\'s flexibility to group devices and to manage access credentials on a very granular level.

With its open database structures and its SQL query viewer, JDisc Discovery can easily integrate into existing Asset Management and CMDB systems.

  • Identifies hardware, software and users on Windows (starting with NT 4.0), IBM AIX, Sun Solaris, Linux,  MAC OS X, and VMware ESX Server
  • No proprietary agents required
  • Supports Microsoft's Active Directory
  • Allows the definition of custom fields
  • Custom reports
  • Normalizes information (e.g. processor names)
  • Installs within 5 minutes, easy to install and use

JDisc's dependency mapping  (which is an add-on to JDisc Discovery) finds TCP/IP connection between computer on your network and displays these graphically as dependency maps or using table based reports.

In addition to finding TCP/IP connections between devices, JDisc Dependency Mapping passively detects open TCP/IP ports on devices in the network enabling simple security audits. For example, devices with open telnet ports can be identified easily and security leaks can be closed quickly.

Target groups:
  • IT Administrators
  • IT Organizations
  • IT Service Provider
  • Outsourcing Provider
  • CMDB Vendors
on request
System requirements:
Compatible Operating Systems (runs with):
Win 10
Win 8
Win 7
Win Server
Mainframe based
Unix based
Linux based
Mac OS
Mobile OSs (supports):
Old Compatible Operating Systems:
Win Vista
Win XP
Overall information of software::
not required
for value
included in price
for value
Contact information::
Herr Thomas Trenz
+49 7034 932953
Links and contact:
Video appointment
Demo version
direct to webpage
direct to webpage
request URL

Search in relative categories:

Business Management (miscellaneous) Inventory Taking, Stock-Taking Network Administration Network Management (Miscellaneous)
Show All Software Categories