icon-bg
icon-bg
icon-bg

Blog

Educational institutions contain volumes of sensitive personal data making them prime targets for cybercriminals seeking to steal valuable information. Advanced monitoring software for schools and universities can better defend their infrastructure through centralized visibility, rapid threat detection, and automated protections. This article explores escalating risks in educational organizations and how the right tools can enable robust cybersecurity even with limited IT resources.

Cybersecurity Threats in the Educational Sector

The educational sector, with its vast repositories of personal and research data, has become a prime target for cybercriminals. The variety and frequency of these cyber threats have escalated, demanding a robust …

Nearly every business enterprise involves office computers, and usually they are connected to a local network. In order to systematize the configuration and accounting of computer hardware and software, it’s necessary to periodically take their inventory. This includes conducting SAM, the process of streamlining the management of the company’s software assets.

In every company, physical assets on the local network are equipped with special software, usually licensed. And licenses, especially for specialized software packages, often cost a lot.

This means that even if such a software package is installed on just one “extra” PC, it can be quite an expensive …

Not everyone knows and uses such a killer feature of Total Network Inventory as table conditions, so today we would like to remind you about it and provide some usage examples, so you can see how it can make your work much easier.

First one is simple: imagine that you need a list of computers with less than 10GB free space left on the C drive before installing some huge OS update or a new software product. This can be achieved rather quickly:
Open the Table reports tab, copy the existing Logical disks template or create a similar one. …

Part 2: “Filters”.

And we are continuing our series of tutorials. As we promised, today we’re going to describe the most popular filters and advise how to apply them best.

All filters are located right under the “Software” and “Licenses” tabs and have the following form:

While filters are not enabled, the main list will display all of the software from all scanned workstations.

Use “Asset filter” to display a list of software on specific workstations. Select a device, several devices (make sure that the “Multiple selection” box is checked) or a group in the network tree to …

Usually, when someone visits the “Software accounting” tab for the first time, he just doesn’t know from where to start. Well, software and license accounting in networks has never been too easy. We decided to release a series of blog posts for those who have just begun to use this module or avoided using it for some reason. We are going to advise you from where to start and what kind of information may prove to be most useful.

Part 1: “Getting Started”.

First, you need to pay attention to the menu in the upper left corner. This is where …

We haven’t been updating our Total Network Inventory user manual for a long time, now it’s time to fix this.

First of all, a new section dedicated to the professional version of TNI has been added. It describes how to operate the software and license management modules.

software asset management

The new section consists of four parts:

Software asset management

We admit that software accounting and license management isn’t the most trivial task for a corporate network. However, our team has tried to make the interface simple and friendly. We believe that our new user manual …