{"id":10846,"date":"2022-06-03T11:30:08","date_gmt":"2022-06-03T09:30:08","guid":{"rendered":"https:\/\/enginsight.com\/feature-overview\/it-inventorization\/"},"modified":"2024-04-26T08:22:32","modified_gmt":"2024-04-26T06:22:32","slug":"it-inventorization","status":"publish","type":"page","link":"https:\/\/enginsight.com\/en\/it-inventorization\/","title":{"rendered":"IT inventory"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"10846\" class=\"elementor elementor-10846 elementor-10421\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2157644e elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"2157644e\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5db4d330\" data-id=\"5db4d330\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section data-gradient='{\"angle\":-45,\"colors\":[{\"_id\":\"81bc933\",\"premium_gradient_colors\":\"#283AB8\"},{\"_id\":\"3ebcf24\",\"premium_gradient_colors\":\"#8D379E\"},{\"_id\":\"64cb559\",\"premium_gradient_colors\":\"#F13484\"},{\"_id\":\"88a4e48\",\"premium_gradient_colors\":\"#FF605D\"}]}' class=\"elementor-section elementor-inner-section elementor-element elementor-element-5d92078c premium-gradient-yes elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5d92078c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-42b1a0ea\" data-id=\"42b1a0ea\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-57a97d99 premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"57a97d99\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">IT-ASSET MANAGEMENT SOLUTION (ITAM) <\/span><span class=\"premium-dual-header-second-header \">IT inventory<\/span><\/h1> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a19ce4c elementor-widget elementor-widget-text-editor\" data-id=\"7a19ce4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Keep track of all IT assets on your network at all times.<br>Automated inventory including vulnerability detection in one platform.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4355d3db elementor-align-left elementor-mobile-align-left elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-global elementor-global-25309 elementor-global-23749 elementor-widget-button\" data-id=\"4355d3db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/enginsight.com\/en\/demo\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Request demo<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-24bb2897 elementor-align-right elementor-mobile-align-left elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget elementor-widget-global elementor-global-25311 elementor-global-23752 elementor-widget-button\" data-id=\"24bb2897\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/app.enginsight.com\/#\/signup\" id=\"ngs-top-registrieren\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Start now for free<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4df3bd7c\" data-id=\"4df3bd7c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7dee7be7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7dee7be7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-70a70aff\" data-id=\"70a70aff\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5a24d87f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5a24d87f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-15ef020d\" data-id=\"15ef020d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-38404d23 elementor-widget elementor-widget-heading\" data-id=\"38404d23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Designed for Windows, Linux and macOS<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-31d60bcb\" data-id=\"31d60bcb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1f86bf13 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"1f86bf13\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Enginsight is the all-in-one cybersecurity platform from Germany that analyzes your security posture, detects threats and prevents attacks automatically <strong>&#x2013; as SaaS and on-premises.<\/strong><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-4da2f843\" data-id=\"4da2f843\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5c47c7ff elementor-widget elementor-widget-image\" data-id=\"5c47c7ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/made-in-germany-enginsight-1-q0quox5caqcf4tmqfjum7o1lb6c6kr8877smn0rsh4.png\" title=\"made-in-germany-enginsight\" alt=\"made-in-germany-enginsight\" loading=\"lazy\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-b198f94 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b198f94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-78ebc963 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"78ebc963\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-4e90575c\" data-id=\"4e90575c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-111a600d elementor-widget elementor-widget-image-carousel\" data-id=\"111a600d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"slides_to_show\":\"4\",\"navigation\":\"none\",\"lazyload\":\"yes\",\"pause_on_hover\":\"no\",\"pause_on_interaction\":\"no\",\"autoplay_speed\":0,\"speed\":10000,\"autoplay\":\"yes\",\"infinite\":\"yes\"}' data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/ZapfCreation-sw-1-q094tsonfus5sokb027hqfs8bt79dwl2xaszo56134.png\" alt=\"ZapfCreation-sw\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/G-DATA-Logo-TIGS-2017-RGB-pwdtje60w4w3cy3jjnmft7c5795ouezzvrw57b1szk.jpg\" alt=\"G DATA Logo\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/tuev-WEISS-plwfonhj0gjdp9oryhqccjr5a360tgnrhd4s5yrmdc.png\" alt=\"t&#xFC;v WEISS\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/Logo_Teilnehmer_Web-200x83xc-pct68u26be1yvetevoin98h7fcwr2zqt3rxdx18nwg.png\" alt=\"Allianz_fuer_Cybersicherheit_Enginsight\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/402px-Logo_TSG_Hoffenheim.svg-q9cihbab4cxicz309g1m8gy9j7r3dtqitqbg6prncw.png\" alt=\"Logo der TSG Hoffenheim\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/schaefer-holding-logo-2-q4y2lklcscaz3kij4pnp9qm9gj79gm72wdfu1n1s74.jpg\" alt=\"schaefer-holding--logo\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/TuevIT-q9cjpvst6jxyvccd07lryq23jy2nd5obybxae1ombk.png\" alt=\"TuevIT\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/Bildungsministerium-q0947e74k045393rtdllb3aqn7mbxlnduf2dwqdtds.jpg\" alt=\"Bildungsministerium\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"9 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/lvv-orvd89v9ad0zrxv9vpg3t9im4r5jf672cjj4auvx8g.jpg\" alt=\"lvv\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"10 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/langeoog-orvdagtp8g12v6ol2nkrmplc14cddqwinebwm3mups.jpg\" alt=\"Langeoog\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"11 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/hanseyachts-orvd9rg23x2c5ppg6ulu9dzvzptglx3rjwpsnmohds.jpg\" alt=\"hanseyachts\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17e150e4 elementor-widget elementor-widget-spacer\" data-id=\"17e150e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a60d964 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a60d964\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f868109\" data-id=\"f868109\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-764c125 premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"764c125\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">Automatic detection and unlimited IP inventory <\/span><span class=\"premium-dual-header-second-header \">IT asset inventory made easy<\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d02132b elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"d02132b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b161791 elementor-widget elementor-widget-text-editor\" data-id=\"5b161791\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-element elementor-element-5b161791 elementor-widget elementor-widget-text-editor\" data-id=\"5b161791\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p>Through permanent monitoring, you have an overview of all relevant information of your IT landscape at all times. <\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-dd1da2f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dd1da2f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-180e3c2\" data-id=\"180e3c2\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0708bf0 premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"0708bf0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">Assetmanagement <\/span><span class=\"premium-dual-header-second-header \">Inventory of all assets in the network<\/span><\/h3> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aea0f6f elementor-widget elementor-widget-text-editor\" data-id=\"aea0f6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Whether switch, printer, client or server &#x2013; all devices with an IP address can be inventoried completely automatically with Enginsight. This effectively prevents IT systems from flying under the radar.  <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c4b1802 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"c4b1802\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Permanent monitoring of network traffic<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Audit-proof asset inventory<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Ideal basis for security audits<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Live detection of new devices in the network<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4ee05c4\" data-id=\"4ee05c4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6ee81ff0 elementor-widget elementor-widget-image\" data-id=\"6ee81ff0\" data-element_type=\"widget\" data-e-type=\"widget\" alt=\"Schwachstellen und Sicherheitsl&#xFC;cken im Dashboard anzeigen\" title=\"Schwachstellen und Sicherheitsl&#xFC;cken im Dashboard anzeigen\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/enginsight.com\/wp-content\/uploads\/2022\/04\/IT-Inventarisierung_Asset_Map.png\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"IT-Inventarisierung_Asset_Map\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTA0MjQsInVybCI6Imh0dHBzOlwvXC9lbmdpbnNpZ2h0LmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyMlwvMDRcL0lULUludmVudGFyaXNpZXJ1bmdfQXNzZXRfTWFwLnBuZyJ9\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"459\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2022\/04\/IT-Inventarisierung_Asset_Map.png\" class=\"attachment-large size-large wp-image-10424\" alt=\"\"\/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-97c4d84 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"97c4d84\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9bfde9e elementor-hidden-mobile\" data-id=\"9bfde9e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52cca47 elementor-widget elementor-widget-image\" data-id=\"52cca47\" data-element_type=\"widget\" data-e-type=\"widget\" alt=\"CVE Schwachstellen finden und fixen\" title=\"CVE Schwachstellen finden und fixen\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/enginsight.com\/wp-content\/uploads\/2022\/04\/IT-Inventarisierung_Geraeteinformationen.png\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"IT-Inventarisierung_Geraeteinformationen\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTA0MjYsInVybCI6Imh0dHBzOlwvXC9lbmdpbnNpZ2h0LmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyMlwvMDRcL0lULUludmVudGFyaXNpZXJ1bmdfR2VyYWV0ZWluZm9ybWF0aW9uZW4ucG5nIn0%3D\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"459\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2022\/04\/IT-Inventarisierung_Geraeteinformationen.png\" class=\"attachment-large size-large wp-image-10426\" alt=\"\"\/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-224b10f\" data-id=\"224b10f\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1b2fcad premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"1b2fcad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">Monitoring with insight <\/span><span class=\"premium-dual-header-second-header \">Device information<\/span><\/h3> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a6b7f8 elementor-widget elementor-widget-text-editor\" data-id=\"4a6b7f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Retrieve in-depth information about all servers and clients by installing an agent on them. This way you enrich your inventory with valuable information and take it to the next level. <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-152eaa5 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"152eaa5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Retrieve device information<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Carry out safety analyses<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/enginsight.com\/de\/it-monitoring\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"> Central IT monitoring software<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Software Inventory<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d776cf1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d776cf1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9bf7bab\" data-id=\"9bf7bab\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-42a1455 premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"42a1455\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">Automation &amp; Workflows <\/span><span class=\"premium-dual-header-second-header \">Automate software inventory<\/span><\/h3> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef68fb4 elementor-widget elementor-widget-text-editor\" data-id=\"ef68fb4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-db0810c elementor-widget elementor-widget-text-editor\" data-id=\"db0810c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-element elementor-element-db0810c elementor-widget elementor-widget-text-editor\" data-id=\"db0810c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p>Automate your software inventory and get an overview of which software is installed on which servers and clients. Search the inventory for specific software and set an alert on new and remote installations. <\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61022f5 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"61022f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Search entire IT infrastructure for software<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Export software lists<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Detect outdated versions<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Classification of all network devices<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4f67ab8\" data-id=\"4f67ab8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-257ede47 elementor-widget elementor-widget-image\" data-id=\"257ede47\" data-element_type=\"widget\" data-e-type=\"widget\" alt=\"Schwachstellen und Sicherheitsl&#xFC;cken im Dashboard anzeigen\" title=\"Schwachstellen und Sicherheitsl&#xFC;cken im Dashboard anzeigen\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/enginsight.com\/wp-content\/uploads\/2022\/04\/IT-Inventarisierung_Softwareinventar.png\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"IT-Inventarisierung_Softwareinventar\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTA0MjgsInVybCI6Imh0dHBzOlwvXC9lbmdpbnNpZ2h0LmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyMlwvMDRcL0lULUludmVudGFyaXNpZXJ1bmdfU29mdHdhcmVpbnZlbnRhci5wbmcifQ%3D%3D\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"459\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2022\/04\/IT-Inventarisierung_Softwareinventar.png\" class=\"attachment-large size-large wp-image-10428\" alt=\"\"\/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-742f34c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"742f34c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-681f3b0\" data-id=\"681f3b0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7041534 premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"7041534\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">IT Asset Management Solution (ITAM) <\/span><span class=\"premium-dual-header-second-header \">Technical details<\/span><\/h4> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79d4241a elementor-widget elementor-widget-text-editor\" data-id=\"79d4241a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Would you like to know a little more? Then you are exactly right here! Find out what Enginsight does for you in detail when it comes to IT inventory in a completely automated way.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5701e3ec elementor-widget elementor-widget-toggle\" data-id=\"5701e3ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1451\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1451\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Agentless network inventory<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1451\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1451\"><p>The installation of the Watchdog software component in the network enables permanent monitoring of the network traffic according to its participants. With regular active network scans, the Watchdog also provokes network connections and thus finds IP addresses that have not generated any network traffic on their own. <\/p>\n<p>Automatically, Enginsight attempts to categorize the detected assets. In addition, the user is free to enter further data on the asset for documentation purposes (e.g. description, location, responsibility). The assets can also be grouped via tags. To establish the distinction between official and potential shadow IT, assets can be marked as appraised. To use the data externally, the lists can be exported.    <\/p>\n<ul>\n<li>Scan network fully automated<\/li>\n<li>Interactive Asset Map<\/li>\n<li>Complete network inventory<\/li>\n<\/ul>\n<p><a href=\"https:\/\/enginsight.com\/de\/blog\/it-inventarisierung\/\">Further information: How do I create an effective IT inventory of my assets?<\/a><\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1452\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1452\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Agent based inventory<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1452\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1452\"><p>The installation of the Pulsar agent on servers and clients realizes an agent-based inventory. Thus, assets outside the network can also be included in the inventory. In addition, the inventory via the agent allows more information to be retrieved automatically.  <\/p>\n<p>System information provided by the mainboard is available as device information, such as model designations and serial numbers. Here, too, the data can be expanded (e.g. description, location, responsibility) and the assets can be grouped via tags. Also included is a software inventory with a total overview of all software. This opens the possibility to search all servers and clients specifically for software with a search command or to export lists with installed software.   <\/p>\n<ul>\n<li>Platform independent: Linux &amp; Windows<\/li>\n<li>Inventory also outside the network<\/li>\n<li>Retrieve detailed data automatically<\/li>\n<li>Software inventory included<\/li>\n<\/ul>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1453\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1453\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Define responsibilities<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1453\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1453\"><p>Team members can be defined as responsible persons for each asset. On the one hand, the responsibilities fulfill important documentation requirements, and on the other hand, they form the basis of Enginsight&#x2019;s alert system. In the event of safety-relevant incidents or deviations from normal operation, the right people are always informed.  <\/p>\n<ul>\n<li>Define responsibilities for all assets<\/li>\n<li>Fulfill documentation requirements<\/li>\n<li>Assign alert to responsible persons<\/li>\n<\/ul>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1454\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1454\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Inventory as a template for security audit<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1454\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1454\"><p>The inventory is the ideal basis for a security audit of the entire IT infrastructure. Therefore, the IP addresses detected via the network-based asset inventory can be selected as target systems for the automated penetration test. Servers and clients inventoried with Agent are automatically monitored for security issues. For example, the software inventory provides the basis for a scan for software with security vulnerabilities (CVE check).   <\/p>\n<ul>\n<li>Use asset inventory for automated pentesting<\/li>\n<li>Security monitoring of server and clients<\/li>\n<li>CVE scan<\/li>\n<\/ul>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-34ea7832 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"34ea7832\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-34d90cb3\" data-id=\"34d90cb3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c82ff2d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c82ff2d\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5f3c09d3\" data-id=\"5f3c09d3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10dc9961 elementor-widget elementor-widget-image\" data-id=\"10dc9961\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"795\" height=\"1024\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-795x1024.png\" class=\"attachment-large size-large wp-image-21750\" alt=\"\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-795x1024.png 795w, https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-233x300.png 233w, https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-768x989.png 768w, https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-1193x1536.png 1193w, https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-1590x2048.png 1590w\" sizes=\"(max-width: 795px) 100vw, 795px\"\/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Mario Jandeck, CEO Enginsight GmbH<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-395459e9\" data-id=\"395459e9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5ff4e167 elementor-widget elementor-widget-heading\" data-id=\"5ff4e167\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">FAQ about IT inventory<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22258f4 elementor-widget elementor-widget-toggle\" data-id=\"22258f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-3581\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-3581\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">What are the benefits of IT inventory?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-3581\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-3581\"><p>The inventory of the company&#x2019;s own IT brings many advantages and facilitates the daily administration routine. It helps to&#x2026; <\/p>\n<ul>\n<li><strong>to improve IT asset management.<\/strong><br>The inventory of IT represents the first step of an IT asset management (ITAM). The goal of ITAM is to reduce costs and risks while increasing productivity. <\/li>\n<li><strong>Combating shadow IT.<\/strong><br>In addition to the official IT infrastructure introduced by the IT department, companies often use IT systems that run under the radar. They are introduced by employees or departments without the knowledge of IT. <a href=\"https:\/\/enginsight.com\/de\/blog\/schatten-it-1-was-sie-ist-und-warum-sie-zunimmt\/\">Shadow IT<\/a> is on the rise and entails a rat&#x2019;s tail of problems.  A well-implemented IT inventory prevents the emergence of shadow IT.<\/li>\n<li><strong>Increase IT security<br><\/strong> What has not been systematically recorded is difficult to control. An overview of the existing IT systems therefore also helps to increase the security of the IT landscape. <\/li>\n<li><strong>prepare an IT audit.<br><\/strong> An inventory of the entire IT infrastructure is the perfect prerequisite for a comprehensive security audit. In the audit, all information technology systems are subjected to a risk and vulnerability analysis. <\/li>\n<li><strong>Enable certifications <br><\/strong>An IT inventory is a requirement of many certifications (e.g. ISO 27001). Certifications increase the trustworthiness of companies and are often a requirement for the establishment of business relationships. <\/li>\n<\/ul>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-3582\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-3582\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">What are hybrid inventory methods?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-3582\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-3582\"><p>Hybrid processes are recommended in order to utilize the advantages of agentless and agent-based processes and to compensate for disadvantages. Here, network-based inventory is supplemented by agent installation on important assets or assets located outside the network. <\/p>\n<p>On the one hand, network-based IP inventory ensures that no assets go undetected and provides availability monitoring. On the other hand, agents installed on assets enable more information to be captured automatically and include assets located outside the network. <\/p>\n<p><a href=\"https:\/\/enginsight.com\/de\/blog\/it-inventarisierung\/\" target=\"_blank\" rel=\"noopener\">more information you can find on our blog &gt;&gt;<\/a><\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-3583\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-3583\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">What does IT inventory cost with Enginsight?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-3583\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-3583\"><p>All Agentless inventory, persistent monitoring of your network for new devices, and ping, port, SNMP monitoring is available to every Enginsight customer at <strong>no charge<\/strong>.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<script type=\"application\/ld+json\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"What are the benefits of IT inventory?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>The inventory of the company&#8217;s own IT brings many advantages and facilitates the daily administration routine. It helps to&#8230; <\\\/p>\\n<ul>\\n<li><strong>to improve IT asset management.<\\\/strong><br \\\/>The inventory of IT represents the first step of an IT asset management (ITAM). The goal of ITAM is to reduce costs and risks while increasing productivity. <\\\/li>\\n<li><strong>Combating shadow IT.<\\\/strong><br \\\/>In addition to the official IT infrastructure introduced by the IT department, companies often use IT systems that run under the radar. They are introduced by employees or departments without the knowledge of IT. <a href=\\\"https:\\\/\\\/enginsight.com\\\/de\\\/blog\\\/schatten-it-1-was-sie-ist-und-warum-sie-zunimmt\\\/\\\">Shadow IT<\\\/a> is on the rise and entails a rat&#8217;s tail of problems.  A well-implemented IT inventory prevents the emergence of shadow IT.<\\\/li>\\n<li><strong>Increase IT security<br \\\/><\\\/strong> What has not been systematically recorded is difficult to control. An overview of the existing IT systems therefore also helps to increase the security of the IT landscape. <\\\/li>\\n<li><strong>prepare an IT audit.<br \\\/><\\\/strong> An inventory of the entire IT infrastructure is the perfect prerequisite for a comprehensive security audit. In the audit, all information technology systems are subjected to a risk and vulnerability analysis. <\\\/li>\\n<li><strong>Enable certifications <br \\\/><\\\/strong>An IT inventory is a requirement of many certifications (e.g. ISO 27001). Certifications increase the trustworthiness of companies and are often a requirement for the establishment of business relationships. <\\\/li>\\n<\\\/ul>\\n\"}},{\"@type\":\"Question\",\"name\":\"What are hybrid inventory methods?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Hybrid processes are recommended in order to utilize the advantages of agentless and agent-based processes and to compensate for disadvantages. Here, network-based inventory is supplemented by agent installation on important assets or assets located outside the network. <\\\/p>\\n<p>On the one hand, network-based IP inventory ensures that no assets go undetected and provides availability monitoring. On the other hand, agents installed on assets enable more information to be captured automatically and include assets located outside the network. <\\\/p>\\n<p><a href=\\\"https:\\\/\\\/enginsight.com\\\/de\\\/blog\\\/it-inventarisierung\\\/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">more information you can find on our blog &gt;&gt;<\\\/a><\\\/p>\\n\"}},{\"@type\":\"Question\",\"name\":\"What does IT inventory cost with Enginsight?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>All Agentless inventory, persistent monitoring of your network for new devices, and ping, port, SNMP monitoring is available to every Enginsight customer at <strong>no charge<\\\/strong>.<\\\/p>\\n\"}}]}<\/script>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1037fb79 elementor-widget elementor-widget-text-editor\" data-id=\"1037fb79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Enginsight&#x2019;s IT inventory and asset management is part of the Enginsight Cybersecurity Platform. <\/p>\n<p>Would you like to know how you can improve your IT security with Enginsight? We would be happy to analyze your current status and real needs in the area of IT and network security together with you.  <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73e7cdc8 elementor-align-left elementor-mobile-align-left elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-button\" data-id=\"73e7cdc8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/enginsight.com\/de\/demo\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Arrange consultation appointment<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>IT-ASSET MANAGEMENT SOLUTION (ITAM) IT inventory Keep track of all IT assets on your network at all times.Automated inventory including vulnerability detection in one platform. Erstgespr&#xE4;ch vereinbaren Jetzt kostenlos starten Designed for Windows, Linux and macOS Enginsight is the all-in-one cybersecurity platform from Germany that analyzes your security posture, detects threats and prevents attacks automatically [&#x2026;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","_eb_attr":"","footnotes":""},"class_list":["post-10846","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/pages\/10846","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/comments?post=10846"}],"version-history":[{"count":0,"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/pages\/10846\/revisions"}],"wp:attachment":[{"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/media?parent=10846"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}