Accurate Inventory Data
Of the many processes used for software identification, the most trusted data source today continues to be the audited programs themselves. K2 uses the unique identifier data embedded in each executable along with selected Registry values for the most accurate audit possible. By avoiding over-dependence on the notoriously unreliable Add/Remove Programs values, K2 is able to deliver accurate audit data for the application executables that are actually installed. Time stamps for “last use” are also maintained directly by the K2 client without depending on the OS’s often unreliable record.
Software Product Recognition
New in version 7.1 - Sassafras is opening doors to the future for software product recognition. Using the Product Recognition Service, KeyServer will automatically identify and download relevent product definitions. The Administrator can augment them by building additional product definitions, to enhance the accuracy and detail of K2’s discovery process. The correct aggregation of programs in software products makes it easier to correlate purchase records, audits for installed software, and facilitates configuration of managed license policies. Sassafras maintains frequent updates to its Product Recognition catalog.
After Discovery, Take Action
KeyAuditor's powerful discovery and recognition tools report all programs, not just those which are already a part of known products. Program attributes and default and customizable filters can then be used to find programs which need product definitions. Defining new products is quick and easy and allows programs to be included in focused audit reports.
Integrated Usage Details
Some IT asset managers only require software inventory data with last usage times, while others wish to include complete software usage histories in detailed reports. K2 satisfies both requirements with seamless integration of inventory, usage tracking, and license compliance. When both KeyServer and KeyAuditor functions are active, K2 integrates licensing and usage data with inventory data to provide a comprehensive, reliable source of information that you need to make intelligent purchasing and deployment decisions.
Essential Hardware Auditing
In addition to K2’s extensive software auditing and recognition capabilities, critical hardware information that is necessary for software deployment planning is also collected. K2 includes computer details like: manufacturer & model, operating system type, version & service pack, CPU type & clock-speed, RAM, disk space/free space, OEM & OS serial numbers, MAC address, and more. K2 also includes customizable fields for asset tag identification.
Click on image to enlarge.
• Inventory baselines may be set and compared over time for a history of changes in software deployment.
• Software usage details are added to audit reports for a more complete picture of IT asset requirements.