Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Software

Hall 7 / Booth Number 7-529

LOGINventory9

Categories

License management Data protection, data security IT service management Asset management / IT documentation

Key Facts

  • Complete network inventory within a few minutes
  • License management easy and clear
  • IT documentation to keep the overwiev

Product Description

With LOGINventory9 we offer you and your company a premium solution around the topics network inventory, license management and IT documentation.

With LOGINventory you can analyze the complete physical and virtual structure of your network in just a few minutes. LOGINventory only needs to be installed once centrally on a PC or server for collection and analysis. Since LOGINventory works agentless, there is no need to install or run software agents on the client PCs in the network. The performance of the clients to be inventoried is not affected, bandwidth is hardly used, so the network load is low. This is of particular benefit to organizations with multiple sites connected via wide area networks. Using predefined queries and your own analyses, you can flexibly create detailed reports that can be output and used in various file formats.

The entire hardware equipment of computers is inventoried, as well as printers, switches, routers and other IT assets such as mobile devices and Linux and Apple components. The inventory is performed via interfaces such as RPC, WMI, Remote Registry, SSH, SNMP, Exchange ActiveSync, CDP and - depending on the device - various MIBs (Management Information Base). Even the inventory of devices outside the LAN (e.g. laptops and DMZ servers) are no obstacle for LOGINventory. In addition, the tool identifies all installed software. The integrated license management supports you continuously and seamlessly with your SAM strategy, the risks of over- and underlicensing are minimized immediately.

By using LOGINventory, you are legally on the safe side in IT administration, as LOGINventory complies with current legal and data protection regulations such as ISO 19770, BDSG and EU-DSGVO. Download, installation and commissioning are completed in 10 minutes, after which LOGINventory can immediately be used productively in the administration of the existing inventory.

... read more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.