Made for teams that keep IT running

Which part of our technology would you like to explore?

Security

About Image

Security first, every step of the way

Security runs through everything we do which is why we implement industry leading, proven and comprehensive methodologies. Our approach to security is transparent and built to last, earning high praise from industry experts, including a notable endorsement from a prominent CISO who serves as a security advisor for both the Danish government and military.

"Woah...That's good!"

- Most CISOs

Security

Our architecture is built for complete client isolation

When onboarding a new client, we create an entire dedicated data center in Azure.

Azure SQL Database encrypts all traffic both at rest and during transport meaning there is no unencrypted traffic anywhere between our components. However, we give you the opportunity to use your own encryption keys rather than Microsoft’s.

Unique ID (GUID) and serial number

Flexible geographic deployment options for multinational clients

Unique Azure data center with dedicated components

Customizable backup retention (default 7 days, extensible up to years)

Individual serverless functions and resource groups

Geographic backup replication options

Secure key vaults for credential management

Advanced encryption options, including client-managed keys

Dedicated PaaS database with no multi-tenancy risks

Security

Unbroken for 5+ years and counting

Each year Mugato hires leaders in cyber security and asks them to have a go at our system to see if they can expose any vulnerabilities. Using different methodologies such as OWASP and NIST frameworks none of the companies that have investigated us managed to find any holes.

Penetration Test Methodologies:

Annual Tests

OWASP top 10

OWASP Circumvention list

OWASP 4.0 Test Guide

NIST SP 800-115

Installation

Getting started with Mugato

Installing Mugato is a simple process that takes roughly 10 minutes and can be done in an online meeting. Mugato doesn’t come with an out of the box appliance. Instead we ask you to bring a clean virtual server created based on your trusted templates so you don’t need to verify tens of thousands of other files that might come with an out of the box solution.

"After 30 years of deploying custom solutions for enterprises, we made installation the easiest part of the process"

- Michael Frandsen, Founder and CTO @Mugato

Installation

Pre-requisites for a smooth installation

Whether you have thousands of servers all over the world or you’re a small enterprise with 100 servers in the basement, we never deviate from our installation.

About Image

1

Have a server or virtual machine ready

→ 4vcpu and min 8gb of memory
→ Minimum 100gb of storage
→ Running windows
→ Joining it to the domain and latest patch installed

2

SQL Server Express

→ Download Microsoft SQL Server Express
→ No need to install SQL Server Express before the installation meeting (Proof of Value)

3

No access required

→ Mugato needs no permissions before the meeting
→ No remote desktop access needed
→ We will guide you step-by-step during the meeting

Process Line

Installation

During the installation meeting

Beyond the installation that takes less than 15 minutes, here's what to expect.

Actions you'll take during the meeting

→ Download the Mugato setup program from our portal (link will be provided)
→ Enter provided serial number
→ Follow guided installation steps
→ Install SQL Server Express
→ Add credentials to the Mugato collectors through Windows Service Manager

What happens in the backend

→ Encryption hashes and secrets are generated
→ System services are created (collectors, sync, discovery)
→ SQL Express database is created and set up
→ Fingerprint of your connection is established

Installation

Get your full infrastructure blueprint in 2 weeks

While most agent-based solutions take months or years to implement, Mugato allows you to get value 14 days after installation. Mugato’s intelligent process mining algorithms can map out most of your IT environment after running for only a couple of weeks so our clients can consolidate infrastructure, implement micro-segmentation, right-size, reduce IT costs, and de-risk operations.

Runtime

About Image

A unique solution for infrastructure management

Build from 25+ years of solutioning and implementing enterprise infrastructure.

Agentless architecture

→ Does not require agents
→ Runs on a server/virtual machine
→ No network access required
→ Zero touch

Isolated and continuous

→ Continuous process mining
→ Isolated client databases & resource groups
→ Access to API and enriched data

Highly secure

→ Annual penetration tests
→ 3 layers of transport security:
      SSL encryption
       Fingerprint matching
       Token based authentication

Runtime

Mugato compared to industry standard solutions

Feature

Mugato

Other Systems

Agentless Discovery

✅ Zero Agents

❌ Time consuming installation and maintenance of agents

Full Asset Discovery

✅ Zero libraries. All assets being discovered, also rare and custom software

❌ Software that doesn't fit a library doesn't get recognized

Zero Touch

✅ Zero extra workload on your servers

❌ Agents take away computing power from the severs

Automated Dependency Mapping

✅ Yes, with minimum manual effort

❌ Manual effort needed

Works with Minimal Privileges

✅ Yes

❌ Due to agent based installation, account is provisioned on all servers in the infrastructure

Automated Insights & Risk Detection

✅ Yes

❌ Requires Manual Analysis

Real-Time Updates

✅ Yes

❌ Requires manual updates, often outdated

Fast Time to Value (TTV)

✅ 10 min installation and 2 weeks of process mining

❌ Months to install and static output

Plan Generator

✅ Yes, using code to sequence changes & transformation

❌ Requires manual input and meetings

Easy API Integration

✅ No-code integrations

❌ Limited or proprietary REST APIs

Data Collection

Giving you a holistic overview - without intruding

Mugato's intelligent process mining algorithms only collect meta information regarding your enterprises infrastructure which is why it doesn’t require high privilege accounts or access. We don't collect or process any personal or company data - and never will.

About Image

Data Collection

Data security and compliance is why we built Mugato the way we did

Data collection

We don't process any personal or company confidential data at any point. The credentials that our collectors run on don’t allow them to collect any such data on most operating systems. The information gathered is basic meta data about your IT infrastructure such as:

→ file share names
→ domain names
→ cluster names
→ server features
→ networking details
→ performance metrics

1

Process Image

Security and privacy

Our security architecture prioritizes client safety at every level. Security is fundamental to everything we do, which is why we implement the latest & most-proven methodologies. Our transparent approach to security has earned high praise from industry experts. With complete client data isolation at its foundation, our architecture incorporates a multi-layered approach to security.

2

Process Image

AI compliance

Unlike other AI tools that rely on generative approaches, Mugato uses Predictive and Causal AI powered by deterministic meta information from a clients' servers. This ensures trustworthy, fact-based results without statistical guesswork.
Since we only collect meta information and avoids both generative AI and processing of personal or company identifiable data, our solution fully complies with current and publicised data protection and AI regulations.

3

Process Image
border line

Ready To Get Your IT Blueprint?

Book a free sales demo to learn how we can best help you manage your IT transformation projects.

Book a Demo