We’re excited to share that Softinventive Lab now has an official presence on Reddit.
We decided to start by creating our first subreddit dedicated to our most popular product, Total Network Inventory. You can find us at r/NetworkInventory, where we will be posting updates, answering questions, gathering feedback, and discussing everything related to TNI, IT asset management, and system auditing.
Our goal is to create a space where system administrators, IT professionals, and anyone interested in our products can talk directly with our team. Your insights and suggestions help us improve Total Network Inventory, and Reddit is …
Hello friends! Today we present you a new version of the beloved Total Network Inventory, which has been helping administrators for 16 years already!

TNI 6 introduces two main innovations: collection of hardware sensor statistics and transition to 64-bit architecture.
TNI 6 has now the ability to collect data from the hardware components of your equipment without loading the scanned system. This is now possible thanks to the expanded implementation of the resident agents to scan remote devices.

All equipment status data, such as processor temperature, storage usage, …
As companies become more digitized and reliant on complex information technology systems, having a comprehensive inventory of all hardware and software assets is crucial for security. IT inventory provides visibility into every component on a network: workstations, servers, routers, applications, etc. Therefore, vulnerabilities and risks can be identified and addressed proactively.
Inventory solutions automatically scan the network to create a complete database of all connected endpoints, assets, software in use, open ports, user accounts, configurations, and more.
Armed with this information, security teams can identify outdated software requiring patches, suspicious applications that …
Understanding what devices and users are connected to your corporate network is critical for maintaining security. Network scanning provides visibility into everything in your infrastructure to enable better protection and management. This article explores the concepts of scanning enterprise computer networks.
This is a process in which a network scanning tool is used to identify active devices on a network. This includes servers, workstations, and other network devices. The primary purpose of this scan is to manage, maintain, and secure the network by identifying what devices are running on it and how they are configured. This …
Keeping the software on computers on the network up-to-date is extremely important for several reasons. By installing the latest updates and patches that software vendors release, you can benefit from improved security, new features, better performance, and ensured compatibility with other tools and devices.
One of the primary reasons for a software update for a computer is to patch security flaws. Developers regularly discover vulnerabilities that can be exploited by hackers or bad actors. These vulnerabilities can range from minor bugs to critical security holes that could allow unauthorized access to the …
On December 10, a critical vulnerability was discovered in the Log4j component from the Apache Software Foundation, rated at a maximum of 10 on the CVSS scale.
The Log4j component (also known as Log4Shell and LogJam) is a Java-based logging package used by developers to log errors. At the moment, it is already known that the CVE-2021-44228 vulnerability affected a large number of software, including some services of the largest tech companies such as Amazon, Apple, Cisco, Google, Microsoft, Steam and IBM. The Dutch Cybersecurity Center has created a regularly updated doc on GitHub listing the affected applications.
With …