Our guard dog knows exactly who is in his territory.
Now you too can keep track of all IT assets in your network at all times.
Over 10.000+ secured systems by hidden champions, SMEs and our partners.
Enginsight is the most comprehensive and simple security solution for all sizes of companies , Made in Germany.
With Enginsight you are always one step ahead
Define responsibilities and fulfill documentation obligations – simply on the side.
Define responsibilitiesand thus realize the basics of a well-organized IT security strategy. Save time by being effectively assisted with documentation requirements.
Declare war on shadow ITand create a regular and complete IT inventory. Avoid vulnerabilities without additional effort and always keep an overview.
Set the foundation for successful auditsand certificationsin addition to their daily work. In this way, you increase the trustin your company in the long term and enhance your reputation with business partners.
QSil AG, quartz glass manufacturer
Inventorization made easy
Through permanent monitoring, you have an overview of all relevant information of your IT landscape at all times.
Keep an eye on all assets in your IT landscape at all times. Up-to-date and valid data helps you to detect weak points in time and to master audits. Rely on a combination of monitoring and security tool to take your IT to the next level.
Would you like to know a little more? Then you are exactly right here! Find out what Enginsight does for you in detail when it comes to IT inventory in a completely automated way.
The installation of the Watchdog software component in the network enables permanent monitoring of the network traffic according to its participants. With regular active network scans, the Watchdog also provokes network connections and thus finds IP addresses that have not generated any network traffic on their own.
Automatically, Enginsight attempts to categorize the detected assets. In addition, the user is free to enter further data on the asset for documentation purposes (e.g. description, location, responsibility). The assets can also be grouped via tags. To establish the distinction between official and potential shadow IT, assets can be marked as appraised. To use the data externally, the lists can be exported.
- Scan network fully automated
- Interactive Asset Map
- Complete network inventory
The installation of the Pulsar agent on servers and clients realizes an agent-based inventory. Thus, assets outside the network can also be included in the inventory. In addition, the inventory via the agent allows more information to be retrieved automatically.
System information provided by the mainboard is available as device information, such as model designations and serial numbers. Here, too, the data can be expanded (e.g. description, location, responsibility) and the assets can be grouped via tags. Also included is a software inventory with a total overview of all software. This opens the possibility to search all servers and clients specifically for software with a search command or to export lists with installed software.
- Platform independent: Linux & Windows
- Inventory also outside the network
- Retrieve detailed data automatically
- Software inventory included
Team members can be defined as responsible persons for each asset. On the one hand, the responsibilities fulfill important documentation requirements, and on the other hand, they form the basis of Enginsight’s alarm system. In the event of safety-relevant incidents or deviations from normal operation, the right people are always informed.
- Define responsibilities for all assets
- Fulfill documentation requirements
- Assign alarms to responsible persons
The inventory is the ideal basis for a security audit of the entire IT infrastructure. Therefore, the IP addresses detected via the network-based asset inventory can be selected as target systems for the automated penetration test. Servers and clients inventoried with Agent are automatically monitored for security issues. For example, the software inventory provides the basis for a scan for software with security vulnerabilities (CVE check).
- Use asset inventory for automated pentesting
- Security monitoring of server and clients