IT asset management refers to all the activities involved in identifying, discovering, managing, monitoring and securing IT assets. Desktop Central periodically scans all the computers in a network and maintains an up-to-date inventory on all the assets within your network. This data can be fetched at any time and you can also set up real-time alerts for any change that is detected in your network's inventory.
Using Desktop Central, you can manage both hardware and software assets from a single console, seamlessly. With Desktop Central's mobile app, you can carry out IT asset management activities anywhere, anytime, from your mobile phone. Here is a complete list of features offered by Desktop Central for a comprehensive IT asset management:
In today's fast-paced world, devices are replaced or upgraded within the blink of an eye, at an alarming frequency. It is your job as an IT Administrator to keep track of all these changes/additions and ensure that only authorized devices are connected to your network. Desktop Central scans your network periodically to fetch software and hardware inventory details and detect any changes in your network. You can perform asset scanning in Desktop Central in the following ways:
Keeping track of hardware warranty can help you save unnecessary maintenance costs. Desktop Central automatically detects warranty details for Dell, Lenovo, Toshiba and HP devices and has pre-configured reports for computers with about-to-expire warranty and computers for which the warranty has expired already.
You can set up real-time notifications for whenever a new software is installed, a hardware component is added/removed, software is under licensed or is being used after license expiry, commercial software is installed/uninstalled, disk space on a computer falls below a specified percentage, and more in just a few clicks.
You can cut down on significant expenses by monitoring the usage of commercial software, and ensuring that you're using the licenses efficiently. With Desktop Central, you can view detailed reports and determine whether the software usage justifies the cost, which helps you make informed procurement decisions.
Ensuring you're license compliant at all times can help you steer clear of hefty non-compliance fines during a software audit. Desktop Central makes this process a whole lot easier by detecting your compliance status automatically. When a software is found to be under licensed, you can either add more licenses or uninstall the software from required number of computers using Desktop Central's mobile app.
Staying up-to-date and informed about the assets present in your network empowers you to make data-backed decisions about acquiring new assets, which will lead to cutting unnecessary expenses. Desktop Central offers in-depth reports on both software and hardware assets alongwith all the relevant metrics, and this information is easily accesible from your mobile phone, using Desktop Central's mobile app.
Desktop Central facilitates the management of security certificates across your network. You can add, store and distribute these certificates effortlessly. You can also view reports on computers with/without certificates, computers with expired certificates, certificates that are about to expire, and much more. These reports give you insights and enable you to take proactive security measures to prevent your network from attacks.
Gain visibility on the type of files present in your network by setting up rules and scheduling scans. You can set up file scan rules(audio, video, documents, etc) and determine how much space is being occupied by these files. If required, you can notify users to delete unnecessary files on computers with low free disk space.
As a system administrator, you need to ensure that none of the computers have any prohibited software installed on them. Using Desktop Central, you can prohibit software and add an auto uninstall policy within a few clicks. You also have the option to notify the user and request them to uninstall the software on their own. In some cases, malicious software doesn't need to be installed on the computer and can be run from an external drive. To prevent the usage of such applications, you can block these executables. This will prevent the application from being executed which will in turn prevent attacks/data breaches.