Related Products
|
||||||
About
The Nmap project tries to defy the stereotype of some open source software being poorly documented by providing a comprehensive set of documentation for installing and using Nmap. This page links to official Insecure.Org documentation and generous contributions from other parties. Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open-source utility used by millions of people for network discovery, administration, and security auditing. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. Examples and diagrams show actual communication on the wire.
|
About
Open-AudIT is a powerful network discovery and inventory software that intelligently scans an organization’s network and stores the configurations of the discovered devices. This provides immediate access to software licensing, configuration changes, non-authorized devices, capacity utilization, and hardware warranty status reports. Open-AudIT can collect significant amounts of data from large and varying networks that are cataloged and can easily be configured into meaningful reports. It enables users to easily create network discovery profiles for their organization and then run a discovery with a single click or even on an automated schedule. It audits the organization’s network daily without impacting the user experience and intelligently stores the configuration of every discovered component. Open-AudIT tracks and reports on IT asset configuration changes, software licensing, shadow IT, and hardware warranty status.
|
About
WinReporter retrieves detailed information about hardware, software and security settings from Windows systems and automatically generates reports.
|
||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
||||
Audience
Companies searching for a solution to manage and improve their operations
|
Audience
IT compliance officers requiring a solution to manage their network auditing and asset management while ensuring adherence to regulatory standards
|
Audience
IT Professionals and Developers
|
||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
||||
API
Offers API
|
API
Offers API
|
API
Offers API
|
||||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
||||
Reviews/
|
Reviews/
|
Reviews/
|
||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
||||
Company InformationNmap
United States
nmap.org
|
Company InformationFirstWave
Founded: 2001
Australia
firstwave.com/products/network-discovery-and-inventory-software/
|
Company InformationIS Decisions
Founded: 2000
France
www.isdecisions.com/products/winreporter/
|
||||
Alternatives |
Alternatives |
Alternatives |
||||
|
|
|
|||||
|
|
|
|||||
|
|
|
|||||
|
|
|
|
||||
Categories |
Categories |
Categories |
||||
Network Mapping Features
Color Codes / Icons
Compliance Management
Device Auto Discovery
Hierarchical Mapping
Location-Based Mapping
Map Exporting
On-Demand Mapping
Reporting/Analytics
Self-Updating Maps
Web Traffic Reporting
|
Configuration Management Features
Access Control / Permissions
Application Deployment
Automated Provisioning
Infrastructure Automation
Node Management
Orchestration
Reporting Analytics / Visualization
Task Management
|
|||||
Integrations
ArmorCode
Bizzy
Censys
Centraleyezer
Criminal IP
Criminal IP ASM
Cyver
Dradis
Dropzone AI
Hacker Target
|
Integrations
ArmorCode
Bizzy
Censys
Centraleyezer
Criminal IP
Criminal IP ASM
Cyver
Dradis
Dropzone AI
Hacker Target
|
Integrations
ArmorCode
Bizzy
Censys
Centraleyezer
Criminal IP
Criminal IP ASM
Cyver
Dradis
Dropzone AI
Hacker Target
|
||||
|
|
|
|