Resources
- Nanitor Service Center: Customer Service, report a bug, suggest a new feature or make an improvement, licensing and billing questions - go to our service desk.
- Common questions and support documentation - read more.
- Video materials - check our YouTube channel.
- Articles - more on our blog.
- Newsletter - Sign up here.
- Frameworks - read more:

Active scanning versus passive discovery
In our view the real-time and continuous monitoring capabilities of the agent-based approach is crucial in today’s fast paced cybersecurity environment. Swift detection of vulnerabilities and misconfigurations enable companies to quickly act on and mitigate threats before they are exploited. The Nanitor agent functions beyond potential network restrictions that ensures full and comprehensive coverage of the customers assets.

Log4Shell, prepare for anything!
Log4Shell worst-case scenario
This has been a worst case scenario for cybersecurity professionals. A new vulnerability in Log4j (CVE-2021–44228) impacts most companies as they rely on services that use this Java library for their day-to-day operations.
Detect and remove vulnerability
Log4Fix
The experts at Nanitor have created a program that detects and removes the JndiLookup class (CVE-2021–44228) from the classpath (war/jar/ear files).
Cybersecurity strategy
How does Nanitor support your cybersecurity strategy
To enforce an effective cybersecurity policy, company executives need a crisp and concise view of their cybersecurity landscape. An incomplete view of cybersecurity issues results in the inability of the executives to adequately support their IT Ops / SecOps teams who are tasked with enforcing your cybersecurity technical policy and regulatory compliance. Without visibility, your cybersecurity strategy is at risk.
Administrative Privileges for System Administrators
Proper Use of Administrative Privileges for System Administrators in Windows Domains
One of the weaknesses in Active Directory and Windows environments that has been widely discussed but often overlooked in practice is the handling of System Administrator users and passwords. The short story is: For a compromised computer, we can essentially assume that an attacker can steal password credentials and hashes which is sufficient to remotely control other machines (pass the hash weakness in Windows).
Oracle databases under control with Nanitor
Get cybersecurity of your Oracle databases under control with Nanitor
Oracle databases like most other things come out of the box with default configuration, for example there are default passwords in place and sample users and databases if you have not been careful in the installation process.