Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


08:16 PM
Dark Reading
Dark Reading
Products and Releases

Promisec Releases New Clientless Inventory Module

Solution works without a client installed on the endpoints or servers

New York, NY " March 17, 2010: Promisec, Inc. today released a major upgrade to its enterprise-class Clientless Endpoint Management software, Promisec INNERspace version 4.20. The version includes an all-new Inventory Module. Using patented clientless technology, INNERspace is able to investigate and correlate software and hardware data in less than five seconds per machine. The solution works without a client installed on the endpoints or servers. INNERspace provides comprehensive inventory reports within a few hours for most organizations, while competing solutions can take days or weeks.

Inventory has become a strategic need for CIOs in order to make educated decisions regarding purchasing, upgrades and IT changes. Complete, 100% accurate data is a crucial element to make cost-saving and business-critical decisions for enterprises and organizations. Promisec provides corporate Information Security and Technology departments with inventory and visibility with an unprecedented level of accuracy.

"Accurate inventory data translates to cost savings. It's as simple as that," said Hilik Kotler, Promisec EVP Business Development and Co-Founder. "Knowing what assets you have allows you to take appropriate actions. Agent-based and WMI inventory solutions are resource intensive, impacting the network and overloading the PC. Promisec's lightweight clientless technology delivers fast and accurate inventory within minutes or hours. Companies can make decisions quickly, based on a complete data set."

Promisec's Inventory Module includes:

  • Rapid and dynamic 24*7 inventory monitoring with virtually no impact on the endpoints or the network

  • Software compliance

  • License decision-making support

  • Checks and balances

  • Hardware inventory

  • Software inventory

    In addition to the Inventory Module, Promisec INNERspace Version 4.20 includes:

  • Improvements in reports

  • New black list categories in the security module

  • Addition of a single inspection option for compliance (rather than periodic inspections)

  • Dashboard improvements (additional layouts, report generation)

  • New and enhanced Power management module with "wake up" technology, replacing WoL technology About Promisec

    Promisec, Inc. delivers Clientless Endpoint Management (CEM) software solutions that eliminate threats and optimize corporate internal networks with unprecedented visibility and control over the endpoints. Promisec's patented technology allows IT managers to identify and resolve security, compliance and policy issues in a matter of minutes, without making any changes to the network or endpoints.

    Founded in 2004 by former military intelligence experts, Promisec's management team brings broad high-level executive experience in the network security industry.

    Promisec is a privately held company with headquarters in Israel and offices in New York, Tokyo and Paris. Our customers include Forbes Global 2000 companies and other organizations in the manufacturing and service industries as well as government and health care institutions. For more information see www.promisec.com.

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
    Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
    7 Powerful Cybersecurity Skills the Energy Sector Needs Most
    Pam Baker, Contributing Writer,  6/22/2021
    Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
    Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
    Register for Dark Reading Newsletters
    White Papers
    Current Issue
    The State of Cybersecurity Incident Response
    In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
    Flash Poll
    How Enterprises are Developing Secure Applications
    How Enterprises are Developing Secure Applications
    Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2021-06-24
    A potential vulnerability has been identified in HPE OneView Global Dashboard release 2.31 which could lead to a local disclosure of privileged information. HPE has provided an update to OneView Global Dashboard. The issue is resolved in 2.32.
    PUBLISHED: 2021-06-24
    Improper sanitization of path in default RouteNotFoundError view in com.vaadin:flow-server versions 1.0.0 through 1.0.14 (Vaadin 10.0.0 through 10.0.18), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), and 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 1...
    PUBLISHED: 2021-06-24
    URL encoding error in development mode handler in com.vaadin:flow-server versions 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows local user to execute arbitrary JavaScript code by opening crafted URL in browser.
    PUBLISHED: 2021-06-24
    The vgacon subsystem in the Linux kernel before 5.8.10 mishandles software scrollback. There is a vgacon_scrolldelta out-of-bounds read, aka CID-973c096f6a85.
    PUBLISHED: 2021-06-24
    A vulnerability in agent program of HelpU remote control solution could allow an authenticated remote attacker to execute arbitrary commands This vulnerability is due to insufficient input santization when communicating customer process.