Browse Definitions :
Definition

agentless

Agentless, in computing, refers to operations where no service, daemon or process (AKA an agent) needs to run in the background on the machine the action is being performed on.

In reality, all computer tasks require related programs to run and these programs could be considered agents. However, operations can generally be performed on a controlling machine that may use an agent, while its target is agentless in that it need not install or run new software related to the task itself. This capacity can save time required for managing agents on numerous target machines, especially in large enterprises. That said, even some software called agentless may use built-in services in an operating system, and they may require configuring. So the term agentless can be a bit misleading.

Agentless software generally requires the creation of a user account on the target machine or machines  to facilitate access to the data on the account related to the desired operation. Agentless programs directly access the files, often remotely, via this user account. So the created profile must have the necessary access to these files and the software must store the login credentials to access the profile.  This access may be facilitated through a number of different Internet communication standards (e.g., FTP, CIFS/SMB, TELNET, SSH).

 Generally most home, SOHO, and SMB don’t need to narrow their choices between agent-based and agentless solutions. Most single computers and small networks have no need for agentless software. In enterprises, there may be considerations like tight security for trade secrets and the logistics of managing agents on thousands of machines. In the end, it comes down to deciding what works best for the particular company. Some may consider the risk of stored login credentials too great a risk even when encrypted.

This was last updated in November 2014

Continue Reading About agentless

SearchNetworking
SearchSecurity
  • man in the browser (MitB)

    Man in the browser (MitB) is a security attack where the perpetrator installs a Trojan horse on the victim's computer that is ...

  • Patch Tuesday

    Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system ...

  • parameter tampering

    Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's ...

SearchCIO
  • e-business (electronic business)

    E-business (electronic business) is the conduct of business processes on the internet.

  • business resilience

    Business resilience is the ability an organization has to quickly adapt to disruptions while maintaining continuous business ...

  • chief procurement officer (CPO)

    The chief procurement officer, or CPO, leads an organization's procurement department and oversees the acquisitions of goods and ...

SearchHRSoftware
SearchCustomerExperience
  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

  • clickstream data (clickstream analytics)

    Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about...

  • neuromarketing

    Neuromarketing is the study of how people's brains respond to advertising and other brand-related messages by scientifically ...

Close