Using Asset ID for IT Asset Management (ITAM) with K2

Asset ID in K2 QR code

There are various ways to identify computers uniquely based on hardware properties. In particular, a MAC address or a hardware Serial Number typically are unique across all computers and are readily available in any systems containing computer records. K2 uses these properties as well as others to maintain a unique ID for each computer. However, […]

BSA report on SAM in Cloud Computing

The Cloud

The Software Alliance (a.k.a the “BSA”) has published an interesting paper on the importance of Software Asset Management (SAM) in Cloud Computing. In summary, Cloud computing does not exempt an organization from their need for SAM but rather, the cloud requires its own additional management policies and procedures. Fortunately, usage and entitlement optimization reporting for […]

New Browser definitions added to PRS

New Browser Definitions

We have recently added definitions to our Product Recognition Service for versions 23-25 of Firefox, versions 29-30 of Google Chrome, and version 11 of Internet Explorer. If you have these versions installed at your site, you should automatically receive the new product definitions. However, your Products window may be filtered to hide Ignored products, in […]

Ignored status for Products

Ignored Products

In K2 version 7.1, we added a new Status for Products called “Ignored”. This gives you an easy way to control which Products should be excluded from Audit Products reports. Here we’ll discuss some other aspects of this new Status, and describe why some products from PRS are initially set to Ignored. Ignored and Audit […]

Website Redesigned

We are pleased to announce the launch of our redesigned website. Perhaps you have already noticed it over the past month or so – we hope you like it. This is the 4th major redesign we’ve done. For your amusement, here is a screenshot of the earliest snapshot in the Wayback Machine, from 1997 – […]

New Admin Authentication video

Admin Authentication video

K2 allows you to manually configure multiple administrator accounts, each with customized privileges. Account login names and passwords can be defined internally but many sites have found it convenient to let Active Directory or LDAP manage these account credentials centrally. This enables a KeyServer administrator to use name and password credentials that are already defined […]

Installing the K2 Client on Thin Client (Citrix, RDS) Servers

RDS Icon

This is a followup to Counting K2 Client Licenses for Thin Clients, which covered the issues an Administrator must consider before deploying the K2 client (KeyAccess) to Thin Client Servers. This document covers how the client is actually installed, and what happens after. It assumes a simple three-server farm but applies to a thin client […]

K2 supports Win 8.1 and Mac 10.9

Yesterday we released a new image (2013-10-28), and with this release, all components of K2 fully support the latest OS versions from Microsoft and Apple. Deploy KeyAccess 7.1.0.5 on Windows 8.1 and Server 2012 R2 in order to work around Microsoft’s OS version bug so that 8.1 is reported to KeyAccess instead of 8.0 (see […]