Asset Tracking Solution

|What is IT Asset Management? | Benefits | Features & Capabilities | Best Practices |

What is IT Asset Management (ITAM)?

IT asset management refers to a set of business practices involved in identifying, discovering, procuring, managing, monitoring and disposing IT assets. It entails having a centralized view of all the assets present in a network along with software and hardware details. Having a thorough asset management process in place will empower you to make data-backed, strategic decisions about acquiring new assets, which will lead to cutting unnecessary expenses.

IT Asset management for heterogenous networks

What are IT Assets?

The term "IT asset" refers to the hardware, software and digital assets that are purchased, created, managed and used by an IT enterprise. Hardware assets include devices such as laptops, desktops, keyboards, printers, etc. Software assets include all the software applications/executables that are installed on devices within an organization. Digital assets include documents, pictures, videos or in general, data in any form that has been paid for, produced or is being managed by an enterprise.

What are the benefits of IT Asset Management?

Enterprises now-a-days can have anywhere between 1000 to 100,000+ devices in their networks and it goes without saying that a centralized and automated IT asset management software is required to track and manage these assets. IT asset management not only allows you to do that, but it also gives you the visibility and insights required to strategize and make informed IT asset procurement decisions while mitigating risk in the most cost-efficient way possible.

IT Asset Management using Desktop Central

Software Inventory Report

Using Desktop Central, you can manage both hardware and software assets from a single console, seamlessly. With Desktop Central's mobile app, you can manage the assets in your network anywhere, anytime, from your mobile phone. Here is a complete list of features offered by Desktop Central for a comprehensive IT asset management:

Periodic Asset Scans

In today's fast-paced world, devices are replaced or upgraded within the blink of an eye, at an alarming frequency. It is your job as an IT Administrator to keep track of all these changes/additions and ensure that only authorized devices are connected to your network. Desktop Central scans your network periodically to fetch software and hardware inventory details and detect any changes in your network. You can perform asset scanning in Desktop Central in the following ways:

    Software Inventory Report
  1. On-Demand Asset Scan
    You can initiate an asset scan anytime, anywhere and once it is completed, a detailed report will be sent to the configured mail id.
  2. Scheduled Asset Scan
    An asset scan can be scheduled to take place at a configurable time and frequency and it will be initiated automatically according to the details specified. The report will be sent to the mail id mentioned in the configuration.

Hardware Warranty Management

Keeping track of hardware warranty can help you save unnecessary maintenance costs. Desktop Central automatically detects warranty details for Dell, Lenovo, Toshiba and HP devices and has pre-configured reports for computers with about-to-expire warranty and computers for which the warranty has expired already.

Real Time Inventory Alerts

Software Inventory Report

You can set up real-time notifications for whenever a new software is installed, a hardware component is added/removed, software is under licensed or is being used after license expiry, commercial software is installed/uninstalled, disk space on a computer falls below a specified percentage, and more in just a few clicks.

Geo Fencing

Geo-Fencing, as the name suggests, lets IT administrators restrict the usage of corporate devices to certain regions such as office premises etc. This is done by creating virtual fences called geo-fence, based on real-world geographical region. Geo-fencing can be ideally used in enterprises with stringent compliance standards which require corporate devices containing sensitive data to remain within the organization's premises at all times. Desktop Central lets you define security policies based on the virtual perimeter created as a geofence, ensuring there is no unauthorized corporate data access.

Software Metering

You can cut down on significant expenses by monitoring the usage of commercial software, and ensuring that you're using the licenses efficiently. With Desktop Central, you can view detailed reports and determine whether the software usage justifies the cost, which helps you make informed procurement decisions.

Software License Management

Software Inventory Report

Ensuring you're license compliant at all times can help you steer clear of hefty non-compliance fines during a software audit. Desktop Central makes this process a whole lot easier by detecting your compliance status automatically. When a software is found to be under licensed, you can either add more licenses or uninstall the software from required number of computers using Desktop Central's mobile app.

Software and Hardware Inventory

Staying up-to-date and informed about the assets present in your network empowers you to make data-backed decisions about acquiring new assets, which will lead to cutting unnecessary expenses. Desktop Central offers in-depth reports on both software and hardware assets alongwith all the relevant metrics, and this information is easily accesible from your mobile phone, using Desktop Central's mobile app.

Integration with Help-Desk Software

Desktop Central integrates with several ITSM tools to enable smooth ticket resolution:

  1. ServiceDesk Plus
  2. Jira
  3. Zendesk
  4. Spiceworks
  5. ServiceNow

Asset data from Desktop Central is posted regularly to these tools and this can be configured according to your requirements.

Security Certificate Management

Desktop Central facilitates the management of security certificates across your network. You can add, store and distribute these certificates effortlessly. You can also view reports on computers with/without certificates, computers with expired certificates, certificates that are about to expire, and much more. These reports give you insights and enable you to take proactive security measures to prevent your network from attacks.

File Scanning

Software Inventory Report

Gain visibility on the type of files present in your network by setting up rules and scheduling scans. You can set up file scan rules(audio, video, documents, etc) and determine how much space is being occupied by these files. If required, you can notify users to delete unnecessary files on computers with low free disk space.

Prohibit Software and Block Executables

As a system administrator, you need to ensure that none of the computers have any prohibited software installed on them. Using Desktop Central, you can prohibit software and add an auto uninstall policy within a few clicks. You also have the option to notify the user and request them to uninstall the software on their own. In some cases, malicious software doesn't need to be installed on the computer and can be run from an external drive. To prevent the usage of such applications, you can block these executables. This will prevent the application from being executed which will in turn prevent attacks/data breaches.


In BYOD environments, containerization lets you manage only the corporate data while having zero control over the personal data. This is possible due to the creation of a logical container which isolates the corporate data and personal data despite co-existing in the same device. You can also configure policies to ensure secure access to corporate data and/or to ensure devices adhere to certain organizational security standards.

IT Asset Management - Best Practices

Because of the sheer number of assets in enterprises, IT asset management can be intimidating. Here are a few best practices you can weave into your existing asset management strategy to ensure optimum results:

  1. Keep redefining and evolving your strategy. IT asset management is not a destination, it's a process and needs to be treated as such.
  2. Set up real time notifications for any hardware/software changes within your network, so that you can detect anomalies and remediate right away.
  3. Before renewing the license for a commercial software, analyse the usage statistics thoroughly to ensure that you buy only what is required.
  4. Enable real-time alerts for:
    • When the license status is under-compliant
    • When a commercial software is installed/uninstalled within your network
    • When the license for a commercial software is about to expire
  5. Enable geo-fencing for endpoints with sensitive data to ensure that such endpoints remain within the enterprise's premises at all times.