Asset Inventory Management

IT Asset Inventory Management

The first and the most important part of IT Asset Management (ITAM) is to be able to scan/discover all the assets in your network. Only when you have discovered all the assets can you efficiently monitor and manage them. AssetExplorer gives you a wide range of asset scanning methods to make sure that you get them all.

Asset Management

All the assets in the network are broadly categorized in AssetExplorer as IT Assets, non-IT assets, asset components, software and groups.

Product and vendor details

Software Asset Management Software
AssetExplorer Asset Management helps you create Product Types and list various products under this. You can fill various fields for ease of identification during addition of a product. You can also add the vendor details for a particular product such as vendor name, warranty period, price and much more.

Group assets and manage them easily

Grouping your assets lets you manage the assets and understand the context easily. Static grouping lets you add resources by selecting them as you wish. Dynamic grouping lets you create criteria for adding resources to this group. In the latter, whenever a new resource with that criteria is added to your network, that resource will be automatically placed in the respective group.
Eliminate Security Threats

View software compliance with Flash charts

Software Asset Management Software
Software Asset Management helps you keep track of all your software assets and licenses. You can group the software through various categories such as Software Type, License Type, vendor name etc. The flash charts gives a easy-to-understand view of software compliance in your network. Read more about Software Asset Management in AssetExplorer.

Relationship between your business critical resources

Configuration Management Database (CMDB) lets you configure and monitor the various relationships of every business critical asset in your network. This helps during a change in the network infrastructure or during root cause analysis of a problem. Read more about the CMDB in AssetExplorer here.
Eliminate Security Threats

Asset Scanning and Discovery

If you got it in your network, its got to be on your dashboard! To do that, use the agent scanning method available in AssetExplorer:

Agent scanning

In this method, an agent is installed in the workstation (in the same network or remote location) to be scanned. The first time, agent sends all information about the asset inventory to the AssetExplorer, after which it will send only the changes in the inventory.

More scanning methods:

Windows domain scans

Any assets coming under the Windows domain can be scanned using this method.

Network and network range scans

This method of asset scanning can be used for all IP devices, such as, routers, switches, printers and assets running Linux, Solaris and MAC OS. Enter the Network or the network range and AssetExplorer takes care of rounding up the assets to the dashboard.

Individual asset scan

You can also scan the assets individually by providing the IP address of the asset.

Manual import

When all else fails or if you have a csv file of all your assets and want to import that file, you can just import the file and add all the assets to AssetExplorer.

Related links:

For Easy & Effective Asset Management trusted by