Discovery Components
Device Inventory
The Nanitor Device Inventory contains essential real-time information about your organization’s assets in a flexible, searchable and filterable format. Check the status of your assets or a given asset and view information such as compliance scores, issues detected, missing patches, user accounts, software, open ports, or recent activity.
Key benefits
01
All your assets in one place
See information about all of your assets in one sortable list: servers, workstations, databases, network devices, or other assets. Quickly filter on assets with: outstanding issues, out-of-date Nanitor sensors, end-of-life operating systems, and more. Ensure every asset is checking in as it should.
02
Security status on every asset
View detailed information on your assets, their current status and history, and any issues that affect them. Benchmark scores, patch status, users, installed software, ports and networking, and an activity log of security-related events affecting this asset are easily accessible.
03
Detect unexpected assets
Find and tease out unmonitored assets connected to your organization’s network (rogue), assets that have stopped checking in but remain on the network (stale), or assets that continue to check in via the Nanitor sensor after being decommissioned (ghost).
04
Manage and organize assets
Through Nanitor’s interface, assets can be labeled manually or automatically in the system based on customized rules, marked as decommissioned to raise an issue on any subsequent check in. Sensor upgrades can be requested, without logging in to each individual asset.
Every asset with access to company data can be a liability if not monitored for security issues
Attackers can slip into the system through a security vulnerability on just one machine. Keeping track of every asset currently or formerly in use at an organization is an ever-growing task, and without thorough monitoring, something can easily slip through the cracks.
Maintaining a complete overview of all relevant assets and potential security problems affecting them is vital to securing your organization against threats.

Flexible organization of assets
Set up automatic rules to label your assets based on hostname patterns, subnets, platforms, or OUs, or apply labels manually where necessary.
Rate the importance of different asset labels or individual assets on the Confidentiality Integrity Availability scale, according to your organization’s needs and priorities. Many features can be enabled or disabled for particular asset labels for maximum flexibility.
Analyzing your assets in real time
Nanitor’s Discovery Engine collects a wealth of information on each of your assets that could impact security: benchmarks scores, installed and missing patches, user accounts, software, open ports, subnets, and more. The complete overview of the status of your assets is easily accessible through the Nanitor interface, with filtering, searching and sorting capabilities. Security issues are raised as soon as they are discovered, and are viewable for each asset individually or prioritized across the entire organization, to be reviewed and remediated by your security team.
By enabling Network Discovery, Nanitor can discover devices on the network even if they have not installed the Nanitor sensor or been registered with the Nanitor Collector. Assets are flagged if they are unmonitored (rogue), have gone inactive (inactive), are still found on the network but no longer checking in (stale), or are decommissioned but still checking in (ghost).