RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Code of security: Inventory

Product
Developers: Code of Security
Date of the premiere of the system: September, 2010
Last Release Date: the product is removed from sale
Technology: ITSM - Management systems for IT service

Content

On September 1, 2010 the software product "The code of security went on sale: Inventory" from the Russian developer program and the hardware ensuring safety of information systems, Kod bezopasnosti (Informzashita Group) companies.

"Code of Security: Inventory" – the product intended for collecting, processing and systematization of information about program and the hardware installed on the computers and servers in the local area network functioning running operating systems of the Windows family.

Thanks to new product capabilities among which an automatic installer, the master for fast start and the new interface, system administrators will be exempted from routine work and will be able to execute collection of information about software and the equipment in network in the automated mode. The automatic installer significantly facilitates installation "the Code of Security: Inventory", the master for fast start accelerates process of acquaintance to a product, and the new graphical interface of the menu and text blocks does the program even more convenient for administrators.

Code of Security: Inventory (version 1.6)

"Code of Security: Inventory" (version 1.6) there took place inspection control in FSTEC of Russia and confirmed the compliance to requirements of regulating documents for the fourth level of absence control of not declared opportunities (NDV 4).

According to Code of Security company, the new version of a product became easier to use and has the improved interface. The packet of reports on the basis of requirements of the ISO/EIC 19770-1 standard became one of the major innovations: "Reports on changes in structure program and the hardware in network". The service "The report to order" which gives the chance to order development of any new report necessary for the organization via the product website is also available to users of a product. In process of readiness the new report can be downloaded from the website of a product and to set by means of a configurator.

Also in the new version of a product possibilities of "black" and "white" lists are expanded. In particular, creation of "the white list software" allows to enter the maximum allowed number of installations of one version of a product that allows to adjust accounting of license copies of software and/or OS. Users can create rules by input of the name, the producer, version number, language, serial number of software and/or OS.

In the certified version the master of 'fast start' became available. Also in the new version the master "Is added inspect the "My computer" intended for fast inventory of the local computer on which the product is started.

Besides, in reports filters for an exception not of the necessary software and the equipment appeared. In addition in functionality the feature for determination and filtering of devices of virtual machines of VMware and Microsoft Hyper-V is added.

Use of the software product "Code of Security: Inventory" will help company management and system administrators the nobility where and what software is set in the organization. On the basis of this information it is possible to understand with ease for what software it is worth prolonging licenses, i.e. more effectively to plan the budget. Information security specialists will be able timely to obtain information on software and changes in configurations of computers and also by means of "the black list of software" to trace the employees using the software prohibited by security policy.

All users who purchased earlier versions "Code of Security: Inventory 1.0", have an opportunity of free updating to version 1.6. For this purpose it is necessary to address to sales department of Code of Security company by email: sales@securitycode.ru

Code of Security: Inventory (version 2.0)

In the second version the possibility of maintaining the passport of the computer is implemented. Now the administrator will be able to record the list permitted program and the hardware for a single computer or group of computers and also to create reports "About compliance of the computer to the passport", "The most widespread software", "The computers which are not corresponding to the passport", etc.

Opportunity for fixing of workstations to divisions of the company is implemented that it is especially important for the companies with the distributed branch network. For example, the organizations which have remote branches will be able to keep centralized accounting program and the hardware used in branches of the company.

Except standard scanning methods of the register and WMI (Windows Management Instrumentation) solution "Code of Security: Inventory" 2.0 allows to scan the hard drive of the remote workstation for identification of distribution kits or disk images with licensed production, portable-programs, multimedia.

Important addition in the second version "the Code of Security: Inventory" is also existence of software library and a possibility of its replenishment. The network administrator receives the convenient management tool which allows to recognize the software and to integrate programs for categories and for producers.

In September, 2011 the Code of Security company reported that the new version of a product "Code of Security: Inventory" underwent inspection control in FSTEC of Russia in confirmation to the certificate (No. 2098) issued earlier on compliance to requirements for the 4th level of absence control of NDV.

In the new version of the software product "Code of Security: Inventory" a number of the functions directed to gain of control of the software set in a LAN of the organization and changes in structure of software is implemented. In particular:

  • passport of the computer. The present possibility allows to record a certain set program and the hardware for a single computer or for group of computers;
  • categories of the software (software library) allow to recognize the software and to integrate software in categories. The library can be filled up in the manual mode;
  • support of structural divisions – an opportunity to assign workstations to division with the subsequent creation of reports on program and to the hardware used in division;
  • storage of electronic versions of documents of title and their binding to the specific PC. An opportunity to store the scan copy of documents of title or the link to the place of their storage on the server;
  • collection of information about the registered users allows to define

the employee(s) working behind a certain workstation;

  • scanning of HDD. In addition to standard scanning methods (the register and WMI), the possibility of scanning of the hard drive of the remote workstation for the purpose of identification of the available distribution kits, portable-programs, music, video, etc. is implemented;
  • synchronization with the Active Directory provides an opportunity before carrying out inventory to synchronize the list of computers with the Active Directory object for obtaining information on new computers and users.

In addition to functional advantages which are got by the companies – users "the Code of Security: Inventory" 2.0, the solution differs in the improved graphical interface which does work with the program more convenient for administrators of corporate networks.

Code of Security: Inventory (version 2.1)

The technical release of the new version of this product has additional benefits and is already available to acquisition. Main difference of upgraded version "Code of Security: Inventory" 2.1 is expanded library of the software (S) which contains about 3000 names of products. Using software library the network administrator has an opportunity:

  • it is more better to recognize the used software by reading headings of executable files and their comparison with data of library;
  • integrate programs for categories and producers;
  • to independently fill up software library (rare software, software of own development, etc.) for more complete inventory.

Upgraded version of a product "Code of Security: Inventory" 2.1 also distinguishes the increased performance of work of a product: now inventory of office with the park from 500 computers will take place five times quicker. Using "the Code of Security: Inventory" 2.1 network administrator receives the convenient management tool which allows to keep in the automatic mode account and control of the used software and the equipment, observing license purity in infrastructure of the organization.

Product "Code of Security: Inventory" 2.1 it is available to acquisition since October 27, 2011. Users "Code of Security: Inventory" 2.0 have a possibility of free product update to version 2.1.

Code of Security: Inventory (version 2.2)

On August 20, 2012 version 2.2 "the Code of Security became available to acquisition.

The new version expands possibilities of system administrators in software management, set at workstations of corporate network, and to specialists of cybersecurity – control of their security.

In the new version a number of functions became available:

  • profound scanning of hardware: an opportunity to obtain detailed information on the hardware of computers in network of the company: to the motherboard (version, BIOS, quantity of PCI/PCI-E-slots, etc.), peripheral devices, HDD (serial number), etc.;

  • maintaining history of the connected USB devices: it is possible to trace who and when connected different USB devices (external carriers, WiFi and Bluetooth adapters, etc.);

  • the increased number of reports: the reports demonstrating in the percentage and quantitative relation security of workstations and servers of network different means of protecting are added (the HSTLM, the information security facility from NSD, ME, etc.). It, allows the specialist of cybersecurity to be sure that all computers in network are protected by these or those means. Also reports on USB devices and reports on inappropriate and unidentified content were added;

  • recognition of the renamed executable files: it is applied if in the organization there is a list of the prohibited content and users try to bypass it, changing names and expansions of files of music, video, executable files of games, etc.;

  • migrator: if in the organization the software product "the Code of Security is already installed: Inventory" 2.1, problems with transition to a fresh version will not arise, and all information on software and hardware components collected in version 2.1 will be available to display and the analysis in version 2.2.

The feature for introduction of end dates of licenses in "The white list software" is added, the library of the software and hardware is expanded.

In the nearest future the Code of Security company plans transfer of a product for inspection control in FSTEC of Russia.