Skip to main content

inventory

asset formation and management tool

the inventory module

allows users to create a unified database of users and assets, including servers, workstations, network devices, information systems, and objects in a cluster infrastructure. It ensures that the asset database is kept up to date.

key features

integration of data from various sources

The Inventory module automatically collects and updates the asset database using information from various sources such as Active Directory, CMDB, IPAM, SCCM, SCOM, Tufin, FireEye, Qualys, and others. It also resolves conflicts and prioritizes field values obtained from different sources, performs asset list deduplication, and provides other functions.

asset card

The Inventory module generates an asset card containing up-to-date information based on data from various sources. The reference data stores complete information with values for all important fields of the object (asset or user) obtained from each inventory information source.

The module interface allows for convenient navigation through assets and identifies those for which data is received in a timely manner, as well as those with issues in periodic information updates.

For assets, digital fingerprints (fingerprint) are created based on mathematical models, allowing for automatic monitoring of their status, analysis of changes, and elimination of asset duplication (deduplication process).

SAF eco system

The greatest impact and benefits of the Inventory module are realized when used in conjunction with other SAF modules.

For example, the Inventory module plays a crucial role in incident investigation by providing a centralized repository of information and facilitating efficient analysis. It helps investigators gather evidence, identify the scope of the incident, and take appropriate actions to mitigate future risks.

Investigating security incidents or IT incidents using the inventory and Incident Manager module, you can obtain up-to-date and detailed information about all the objects and users involved in the incident in a unified interface.

Contact Us

Please type your full name.
Invalid Input
Invalid email address.
Invalid Input
Invalid Input

We use cookies on our website. Some of them are essential for the operation of the site, while others help us to improve this site and the user experience (tracking cookies). You can decide for yourself whether you want to allow cookies or not. Please note that if you reject them, you may not be able to use all the functionalities of the site.