Belarc

Last updated
Belarc Inc.
TypePrivate
Industry Computer software
Founded1996
Headquarters Maynard, Massachusetts, U.S.
Key people
Gary Newman, President
Sumin Tchen, Chairman
ProductsBelManage
Data Analytics module
BelSecure
Belarc Advisor
Website belarc.com

Belarc Inc. is an American software company. The company's products are used for software license management, configuration management, cyber security status, information assurance audits, IT asset management, and more.

Contents

Products by Belarc are in use on well over fifty million computers and are licensed by numerous customers, including: AIA/Asia, Catholic Relief Services, Federal Aviation Administration, NASA, Oakland County Michigan, Railinc, Travelers, U.S. Air Force, U.S. Army, U.S. Bureau of Land Management, U.S. Navy, Unilever, WebMD/Emdeon.

BelManage

BelManage automatically creates an accurate and up-to-date central repository CMDB, consisting of detailed software, hardware, and security configurations.

Data Analytics

Belarc's Data Analytics Module is an add-on module to BelManage which provides optimization of software licensing and maintenance costs along with flexible analysis of your BelManage Cyber Security data.

Belarc Advisor

The Belarc Advisor is a free download licensed for personal use only. The Belarc Advisor builds a detailed profile of installed software and hardware, missing security patches, anti-virus status, and NIST SCAP security configurations (USGCB, FDCC) and displays the results in a Web browser. All of the profile information is kept private on the user's computer and is not sent to any web server. [1] There are over 500,000 downloads of the Belarc Advisor every month.[ citation needed ]

The report is divided into a number of sections. The summary report lists details of the computer's hardware, local user and system accounts, a map of the local area network, lists of software licence keys and installed Hotfixes, and an inventory of the installed software with an indication of when each piece of software was last used.

The Security Benchmark Score report, on a separate page, is generated only for Windows 7, Vista, and XP Pro, but not for Windows 10. It details the computer's compliance with US Government Configuration Baseline benchmarks, developed by the United States Department of Defense and National Institute of Standards and Technology. The benchmarks are grouped into general categories. The status of compliance with each benchmark, and the overall compliance per category, are shown. Administrators of commercial versions of Windows can use the Group Policy Editing tool - which can be configured to display USGCB benchmarks - to resolve many of these non-compliances.

History

Belarc was founded in 1997 by Gary Newman and Sumin Tchen. Jack Goldman, the creator of Xerox's Palo Alto Research Center (Xerox PARC), was an early director of the company. [2] Belarc is owned by its founders and employees.[ citation needed ]

Related Research Articles

<span class="mw-page-title-main">Spyware</span> Malware that collects and transmits user information without their knowledge

Spyware is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user by violating their privacy, endangering their device's security, or other means. This behaviour may be present in malware and in legitimate software. Websites may engage in spyware behaviours like web tracking. Hardware devices may also be affected.

<span class="mw-page-title-main">Configuration management</span> Process for maintaining consistency of a product attributes with its design

Configuration management (CM) is a systems engineering process for establishing and maintaining consistency of a product's performance, functional, and physical attributes with its requirements, design, and operational information throughout its life. The CM process is widely used by military engineering organizations to manage changes throughout the system lifecycle of complex systems, such as weapon systems, military vehicles, and information systems. Outside the military, the CM process is also used with IT service management as defined by ITIL, and with other domain models in the civil engineering and other industrial engineering segments such as roads, bridges, canals, dams, and buildings.

Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning that is distinct from the field of confidential computing. With Trusted Computing, the computer will consistently behave in expected ways, and those behaviors will be enforced by computer hardware and software. Enforcing this behavior is achieved by loading the hardware with a unique encryption key that is inaccessible to the rest of the system and the owner.

<span class="mw-page-title-main">Xerox Star</span> Early GUI-based computer workstation from Xerox

The Xerox Star workstation, officially named Xerox 8010 Information System, is the first commercial personal computer to incorporate technologies that have since become standard in personal computers, including a bitmapped display, a window-based graphical user interface, icons, folders, mouse (two-button), Ethernet networking, file servers, print servers, and e-mail.

<span class="mw-page-title-main">Web hosting service</span> Service for hosting websites

A web hosting service is a type of Internet hosting service that hosts websites for clients, i.e. it offers the facilities required for them to create and maintain a site and makes it accessible on the World Wide Web. Companies providing web hosting services are sometimes called web hosts.

<span class="mw-page-title-main">Internet Information Services</span> Extensible web server software by Microsoft

Internet Information Services is an extensible web server created by Microsoft for use with the Windows NT family. IIS supports HTTP, HTTP/2, HTTPS, FTP, FTPS, SMTP and NNTP. It has been an integral part of the Windows NT family since Windows NT 4.0, though it may be absent from some editions, and is not active by default.

<span class="mw-page-title-main">CUPS</span> Computer printing system

CUPS is a modular printing system for Unix-like computer operating systems which allows a computer to act as a print server. A computer running CUPS is a host that can accept print jobs from client computers, process them, and send them to the appropriate printer.

Microsoft Servers is a discontinued brand that encompasses Microsoft software products for server computers. This includes the Windows Server editions of the Microsoft Windows operating system, as well as products targeted at the wider business market. Microsoft has since replaced this brand with Microsoft Azure, Microsoft 365 and Windows 365.

<span class="mw-page-title-main">Windows Server Update Services</span> Update distribution system for Windows Server

Windows Server Update Services (WSUS), previously known as Software Update Services (SUS), is a computer program and network service developed by Microsoft Corporation that enables administrators to manage the distribution of updates and hotfixes released for Microsoft products to computers in a corporate environment. WSUS downloads these updates from the Microsoft Update website and then distributes them to computers on a network. WSUS is an integral component of Windows Server.

Systems management refers to enterprise-wide administration of distributed systems including computer systems. Systems management is strongly influenced by network management initiatives in telecommunications. The application performance management (APM) technologies are now a subset of Systems management. Maximum productivity can be achieved more efficiently through event correlation, system automation and predictive analysis which is now all part of APM.

<span class="mw-page-title-main">Trusted Platform Module</span> Standard for secure cryptoprocessors

Trusted Platform Module is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys. The term can also refer to a chip conforming to the standard.

A system profiler is a program that can provide detailed information about the software installed and hardware attached to a computer. Typically workstations and personal computers have had system profilers as a common feature since the mid-1990s.

<span class="mw-page-title-main">Metasploit</span> Computer security testing tool

The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. It is owned by Boston, Massachusetts-based security company Rapid7.

<span class="mw-page-title-main">Pandora FMS</span> Software for monitoring computer networks

Pandora FMS is software for monitoring computer networks. Pandora FMS allows monitoring in a visual way the status and performance of several parameters from different operating systems, servers, applications and hardware systems such as firewalls, proxies, databases, web servers or routers.

<span class="mw-page-title-main">VMware ESXi</span> Enterprise-class, type-1 hypervisor for deploying and serving virtual computers

VMware ESXi is an enterprise-class, type-1 hypervisor developed by VMware for deploying and serving virtual computers. As a type-1 hypervisor, ESXi is not a software application that is installed on an operating system (OS); instead, it includes and integrates vital OS components, such as a kernel.


This is a comparison of notable free and open-source configuration management software, suitable for tasks like server configuration, orchestration and infrastructure as code typically performed by a system administrator.

<span class="mw-page-title-main">Computer appliance</span> Dedicated computer system

A computer appliance is a computer system with a combination of hardware, software, or firmware that is specifically designed to provide a particular computing resource. Such devices became known as appliances because of the similarity in role or management to a home appliance, which are generally closed and sealed, and are not serviceable by the user or owner. The hardware and software are delivered as an integrated product and may even be pre-configured before delivery to a customer, to provide a turn-key solution for a particular application. Unlike general purpose computers, appliances are generally not designed to allow the customers to change the software and the underlying operating system, or to flexibly reconfigure the hardware.

<span class="mw-page-title-main">Opsi</span> Software distribution and management system for Microsoft Windows clients

Opsi is a software distribution and management system for Microsoft Windows clients, based on Linux servers. Opsi is developed and maintained by uib GmbH from Mainz, Germany. The main parts of Opsi are open-source licensed under the GNU Affero General Public License.

<span class="mw-page-title-main">Lansweeper</span>

Lansweeper is an IT asset management solution that gathers hardware and software information of computers and other devices on a computer network for management, compliance and audit purposes.

References

  1. "Belarc Advisor".
  2. Belarc Press Release: Creator of Xerox PARC joins Belarc Board