IT Asset & Security Configuration Management from Belarc

Belarc, located in Maynard, Massachusetts, allows users to simplify and automate the management of all of their desktops, servers, and laptops throughout the world, using a single database and Intranet server.

Belarc's suite of products automatically create an accurate and up-to-date central repository (CMDB), consisting of detailed software, hardware, and security configurations. Belarc's products are used for software license management, configuration management, cyber security status, information assurance audits, IT asset management, and more. Belarc's products are in use on well over fifty million computers and are licensed by over 1,700 customers worldwide.

Belarc’s Products Help Customers Adhere to First 5 CIS Controls™

Almost daily, cities and other entities that offer public services are being hit by ransomware attacks.  These cyber attacks harm and sometimes stop their ability to provide crucial services to the public.

A solution to help prevent these attacks is to implement the First 5 CIS Controls. In particular, managing server and workstation vulnerabilities, controlling the use of administrative privileges, and ensuring devices and applications in use are configured securely all help to improve cyber defense.

Belarc's products help organizations adhere to the principles outlined in the First 5 of the CIS Controls, including:

  1. Inventory and Control of Hardware Assets
  2. Inventory and Control of Software Assets
  3. Controlled Use of Administrative Privileges
  4. Continuous Vulnerability Assessment and Remediation
  5. Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers


BelManage allows users to reduce their software license and maintenance costs, manage their hosts’ configurations, and more. BelManage is based on Belarc’s Cloud architecture, allowing users to simplify and automate the management of all of their desktops, servers, and laptops throughout the world, using a single database and Intranet server, and automatically creates an accurate and up-to-date central repository (CMDB) of software, hardware and security configurations.


The BelSecure Module automatically does a vulnerability assessment of your IT systems, checks security policies, configuration settings, and discovers other information about the host such as anti-virus status, application versions, security patches, user accounts and more. The policy settings are automatically compared with consensus benchmarks from NIST (USGCB and FDCC), which allow IT managers to automatically determine the security status of their IT assets in advance of an attack. All of this vulnerability and configuration data is automatically collected, on a daily basis, in BelSecure’s central repository, or CMDB.

Data Analytics

Belarc’s Data Analytics Module is an add-on module to BelManage which provides optimization of software licensing and maintenance costs along with flexible analysis of your BelManage Cyber Security data. The Data Analytics module allows our customers to automatically create a daily Effective License Position for complex server software from Microsoft, Oracle, and IBM along with desktop and cloud software from Adobe, Microsoft, ESRI, Autodesk, and many others.

Purchasing Belarc Through CIS CyberMarket

Through CIS CyberMarket, all Multi-State Information Sharing & Analysis Center (MS-ISAC) members, as well as other state, local, territorial, and tribal (SLTT) governments, associated nonprofits, and public educational and healthcare institutions, can purchase Belarc’s products at their GSA Schedule 70 reduced rates. For questions, product, or pricing information, please contact or call the CIS CyberMarket team at 518-880-0770.

For additional product documentation, whitepapers, case studies, videos, etc., please visit:

CIS CyberMarket logo

Have a question?

Need pricing details?

Contact us: 518 880 0699