![Intelligent IT asset inventory](/_next/image?url=%2Fuploads%2Fversio_logo_5de846039f.png&w=3840&q=75)
Versio.io is a software platform that provides a central inventory of resources and configurations for business and IT, and detects and processes their changes. The solution works on the basis of a configuration database (CMDB), which creates and updates itself. Based on its analysis, added values such as compliance reporting, cost allocation, security audits or business process monitoring are obtained.
Learn moreIntelligent IT asset inventory
Smart and easy inventory, cyber security and IT management. Versio.io is software that inventories the entire IT landscape and identity access structure of your company. Based on the digital twin created in the platform, any changes are detected and can be assessed for cyber security and IT management. We can see the status of each element on a timeline showing a chronological record of the changes made. This allows us to check, as well as restore, the state before modification from a selected moment in the past. Resources and configurations can be dependent on each other. The Versio.io topology service automatically creates maps of such dependencies. Furthermore, it allows them to be compared at different points in time. All business-important elements of systems, at any level of the organisation, can be captured - archived, with a topology of relationships and stored in a central repository.
Key benefits
Automation and Reporting - resource mapping based on the Versio.io OneImporter solution - an agent application that detects and monitors server changes continuously. Possibility to automate the deployment of the tool. Sending information about the occurrence of modifications registered in our environment through preferred information channels.
Integration - leveraging data already available, downloaded and inventoried through ready-to-use integrations with Versio.io. Tracking of configuration changes to cloud platforms, monitoring solutions (including Dynatrace), business applications and others, communicated via open APIs.
Rule verification - ensuring that the configuration complies with the requirements set internally by the organisation and externally by regulators. Record of violations with indication of affected elements.
Main features
Inventory of resources and configurations
Create a complete picture of your real IT landscape and organisation in the form of a digital twin.
Managing compliance with policies and regulations
Audit-proof verification of compliance with internal and regulatory policies.
Cloud and data centre control
Control the technology stack and monitor batch job processes and service availability.
Change monitoring
Detect changes in IT and identity access and monitor the execution of Change Requests.
Product life cycle and vulnerability
Verify that all products and technologies used are up-to-date and safe.
Risk management
Monitor, manage and control all breaches of Versio.io solutions.
Main use cases
Digital twin
Through agents and remote access, the necessary data is automatically collected to inventory servers, networks, systems in the cloud, local data centre, workstations or mainframes. From multiple independent data sources, an overall picture of the IT landscape and organisation is created - a fully automated and continuous inventory of the full stack in real time.
Topology and relations
Topology detection recognises relations between resources and configurations, even if they come from different data sources. Topology visualisation identifies hidden relations in, for example, system architectures, network diagrams or database schemas.
Access to change history
Configuration historicisation allows the current state of the environment and its dependencies to be compared with the historical state. Changes such as additions, deletions or modifications to objects and their configurations are stored.
Reporting
It takes seconds to build a report with a list of servers and their parameters, the certificates used and their expiry dates or the encryption algorithms used. Documentation is done for verification of compliance with standards or for audit purposes.
Real-time tracking of changes
The configuration of resources is verified continuously and any changes detected are noted. The current configuration, after the change and the parameters before the change are made available. Changes throughout the environment are presented in a timeline.
History of change
You can track the entire history of changes to the configuration of your resources and their topology. Changes from the last day, week, month or year are available in terms of adding new settings, modifying existing ones or deleting them. You can compare the status of a resource at any two points in time.
Verification of the impact of the change
Detected changes are analysed in terms of their impact on defined compliance or security policies. Alerts are generated and notifications are sent in the event of rule violations.
Commissioning and monitoring changes
If you need to make a change, such as updating the operating system, you can define the need for the change and track the progress of its implementation. The implementation of the change is always verified against the actual state - you are assured of the actual implementation of the task.