Main Applications In ResorsIT
The following applications are the most visible ones used by customers within the ResorsIT platform. It is possible these applications may change over time as we seek the best solution set for our customers.

Authentik is an open source identity provider that prioritizes security and control of your most sensitive data. Get more details here.

NetBox is the source of truth for everything on your network, from physical components like power systems and cabling to virtual assets like IP addresses and VLANs. Get more details here.

Wazah is an open-source security monitoring platform designed to help organizations detect and respond to security threats in real-time. Get more details here.
ResorsIT utilizes multiple components from the OpenSearch Software Foundation including the Search Engine which is used to analyze security data for threat detection, and Dashboards provides a fully integrated solution for visually exploring, discovering, and querying observability data.

Suricata is a high performance, open source network analysis and threat detection software. Get more details here.

Uptime Kuma is an easy-to-use self-hosted monitoring tool with a reactive, fast UI/UX. Get more details here.

FreeScout is a lightweight, fast and adaptable ITSM solution. Get more details here.
ResorsIT Current Version
ResorsIT is currently in Pre-Release.
Pre-Release Access Now Available!
Access to the pre-release of ResorsIT is now available! If you are an early adopter that likes to work with new applications and would like to join us on this journey, please Contact Us to discuss.
You Might Be Thinking...
'These are open-source applications, so "Why not just get these applications and run them myself?" '
The answer is You certainly could!
In order to create your own ResorsIT-type environment, here's a summary of the things you'll need to develop or perform:
- configure secured storage between applications and internal secrets
- design and build authorization system to manage roles and privileges
- develop database migration tools
- deploy reverse proxy/ingress management
- choose and deploy SSO and de-provisioning management
- work out domain management
- design and deploy certificate management
- document and develop facility management
- choose and deploy software inventory system
- choose UI library tools
- deploy web server
- deploy web content management
- develop asset management
- choose and deploy a password strength evaluator
- create workflow building and monitoring tools
- automate updates of the base images
- install needed utilities on each VM or server
- set the rules for passwords on each VM or server
- harden the ssh on each VM or server
- install log monitoring for the applications and servers
- configure the TLS rules for any proxes and web servers
- close unneeded ports on servers
- update applications as needed
- manage ssh keys for I.T. staff on VMs and servers
- set up SSO for the application
Oh, and all of the above needs to work together, securely, in a containerized, cloud-native environment.

On second thought maybe it’s worth checking out ResorsIT!