ResorsIT Products Overview, Platform and Apps

TL;DR

ResorsIT is available in two forms:

  • A SaaS version for DNS configuration management and IPv4/IPv6 address assignment. Details are available here.

  • An IT software platform (which includes the DNS and IP address management features) plus the ability to provision web-based applications and maintain user permissions, and integrate a robust set of open-source applications as cost-saving alternatives to pricey commercial products. These open-source options cover a wide range of capabilities that most IT departments need, including: Single Sign-on, identity governance, network modelling, intrusion detection, network monitoring, document management, ticketing, workflow automation, remote access/control and many more to come. We accomplish this with our own architecture, resource model (users, devices, etc.) and agent framework. If you already have a solution for some of these items, great! We can seemlessly integrate with many existing environments to deliver the provisioning and functional capabilities you need. Read on if you want details!

The Full ResorsIT Platform

We built a cloud-native IT Operations and Resource Management platform that leverages cloud computing’s capabilities and flexibility. It uses microservices and containerization technologies for package management and orchestration tools for container management, deployment and scaling. We also provide the options of cloud-hosted or on-prem! More details are on the architecture page.

Listed below are standard and add-on applications offering a wide range of functionality, with the benefits of open-source (read our Insight articles on that!) without the hassle of having to make everything work together.

Standard Apps In ResorsIT

The following applications are included in all ResorsIT systems. Note: IF you already have a solution for some of these areas, no worries! We can adapt the configuration to your environment. For example, if you already have an SSO/MFA system, you can continue to use it, and we will hook into it.

Check out our current list of Standard Apps. We expect the list to expand, and possibly change, over time as we seek the best solution set for our customers.

ResorsIT logo

DNS management. Sync with DNS providers; Audit logs (SaaS version) or versioning and rollback (Platform version); identification of changes; reporting. Get more details here.

IPv4 and IPv6 configuration. Visual subnet management with hierarchical organization; Automatic conflict detection and prevention; IPv4 and IPv6 with intelligent allocation; VLAN tracking and live subnet management. Get more details here.

Software Provisioning. Automated Software Installation; Configuration Management; User Data Import & Management; Logging; Rollback & Recovery. Get more details here.

authentik logo

Authentik is an open source identity provider that prioritizes security and control of your most sensitive data. Get more details here.

MidPoint logo

MidPoint is an identity governance and administration (IGA) engine that manages the full identity lifecycle. It provides automated provisioning, role-based access control, reconciliation and compliance auditing across all connected systems.

389 Directory Server logo

389 Directory Server is an enterprise-grade LDAP directory server for infrastructure and legacy systems that cannot use OIDC/SAML. It provides full LDAPv3 with multi-master replication, serving as the user/group directory for Linux, email servers, VPN, and network devices.

Cedar logo

Cedar is an authorization policy engine for fine-grained resource permissions. It uses a readable policy syntax with formal verification for compliance, combining RBAC and ABAC in a single policy language.

Dashy logo

Dashy is a highly customizable, easy to use dashboard.

traefik proxy logo

Traefik is a cloud-native application proxy used to manage the ingress Process.

Stirling PDF logo

Stirling is a web-based PDF manipulation tool using Docker.

OpenSearch logo

ResorsIT utilizes multiple components from the OpenSearch Software Foundation including the Search Engine which is used to analyze security data for threat detection, and Dashboards which provides a fully integrated solution for visually exploring, discovering, and querying observability data.

ActivePieces logo

ActivePieces is a workflow automation engine with a visual drag-and-drop builder. It provides 200+ pre-built connectors, webhook and schedule triggers for event-driven automation, and multi-tenant isolation for customer-specific workflows.

Additional Apps Available In ResorsIT

The following applications are available as Add-Ons to ResorsIT. A summary of each app is below, along with a link to a detailed page.

netbox logo

NetBox is the source of truth for everything on your network, from physical components like power systems and cabling to virtual assets like IP addresses and VLANs. Get more details here.

Mayan EDMS logo

Mayan EDMS is an enterprise document management system with OCR, full-text search, workflow engine for document approval and routing, and fine-grained access control. Get more details here.

Wazuh logo

Wazah is an open-source security monitoring platform designed to help organizations detect and respond to security threats in real-time. Get more details here.

Suricata logo

Suricata is a high performance, open source network analysis and threat detection software. Get more details here.

OTOBO logo

OTOBO is an ITSM-grade ticketing and help desk system with ticket management, customer portal, email-to-ticket conversion, knowledge base, and SLA management. Get more details here.

MeshCentral logo

MeshCentral provides web-based remote desktop and terminal access with no client install required for the operator. It supports multi-platform agents, file transfer, and device grouping with access control. Get more details here.

Want Something Else?

Check out our list of candidate apps here

ResorsIT Platform - Version Info

The ResorsIT Platform is currently in Operational Beta


Platform Early Access Now Available!

Access to the beta of ResorsIT Platform is now available! If you are an early adopter that likes to work with new applications and would like to join us on this journey, please Contact Us to discuss.


Regarding The ResorsIT Platform, You Might Be Thinking...

'These are open-source applications, so "Why not just get these applications and run them myself?" '

The answer is You certainly could!

In order to create your own ResorsIT-type environment, here's a summary of the things you'll need to develop or perform:

  • configure secured storage between applications and internal secrets
  • design and build authorization system to manage roles and privileges
  • develop database migration tools
  • deploy reverse proxy/ingress management
  • choose and deploy SSO and de-provisioning management
  • work out domain management
  • design and deploy certificate management
  • document and develop facility management
  • choose and deploy software inventory system
  • choose UI library tools
  • deploy web server
  • deploy web content management
  • develop asset management
  • choose and deploy a password strength evaluator
  • create workflow building and monitoring tools
  • automate updates of the base images
  • install needed utilities on each VM or server
  • set the rules for passwords on each VM or server
  • harden the ssh on each VM or server
  • install log monitoring for the applications and servers
  • configure the TLS rules for any proxes and web servers
  • close unneeded ports on servers
  • update applications as needed
  • manage ssh keys for I.T. staff on VMs and servers
  • set up SSO for the application
  • Implement service discovery mechanisms for microservices
  • Set up API gateway for routing and load balancing
  • Develop rate limiting and throttling for APIs
  • Configure auto-scaling policies for containers
  • Integrate CI/CD pipelines using tools like GitHub Actions or GitLab CI/CD
  • Design data backup and recovery strategies
  • Develop user onboarding and offboarding processes
  • Set up network policies in Kubernetes for security
  • Configure helm charts for application deployments
  • Integrate intrusion detection systems like Snort
  • Deploy network monitoring tools such as TIGA,Nagios, or Zabbix
  • Implement resource quotas and limits in clusters
  • Set up tracing with tools like Jaeger
  • Configure alerting systems for metrics anomalies
  • Develop integration tests for microservices
  • Develop audit logging for compliance
  • Configure firewall rules for containers
  • Implement secrets management with OpenBAO or similar
  • Develop user interface for dashboard and admin panels
  • Set up email notifications for system events
  • Deploy ticketing system
  • Configure load balancers for high availability
  • Develop performance benchmarking tools
  • Set up disaster recovery plans for the platform

Oh, and all of the above needs to work together, securely, in a containerized, cloud-native environment.

Statue in Tuileries garden in Paris

On second thought maybe it’s worth checking out ResorsIT!